WorldWideScience

Sample records for environmental threat posed

  1. Level of environmental threat posed by horticultural trade in Cactaceae.

    Science.gov (United States)

    Novoa, Ana; Le Roux, Johannes J; Richardson, David M; Wilson, John R U

    2017-10-01

    Ornamental horticulture has been identified as an important threat to plant biodiversity and is a major pathway for plant invasions worldwide. In this context, the family Cactaceae is particularly challenging because it is considered the fifth most threatened large taxonomic group in the world; several species are among the most widespread and damaging invasive species; and Cactaceae is one of the most popular horticultural plant groups. Based on the Convention on International Trade in Endangered Species of Wild Flora and Fauna and the 11 largest online auction sites selling cacti, we documented the international cactus trade. To provide an in-depth look at the dynamics of the industry, we surveyed the businesses involved in the cactus trade in South Africa (a hotspot of cactus trade and invasions). We purchased seeds of every available species and used DNA barcoding to identify species to the genus level. Although <20% of this trade involved threatened species and <3% involved known invasive species, many species were identified by a common name. However, only 0.02% of the globally traded cacti were collected from wild populations. Despite a large commercial network, all South African imports (of which 15% and 1.5% were of species listed as threatened and invasive, respectively) came from the same source. With DNA barcoding, we identified 24% of the species to genus level. Based on our results, we believe that if trade restrictions are placed on the small proportion of cacti that are invasive and there is no major increase in harvesting of native populations, then the commercial trade in cactus poses a negligible environmental threat. However, there are currently no effective methods for easily identifying which cacti are traded, and both the illicit harvesting of cacti from the wild and the informal trade in invasive taxa pose on-going conservation challenges. © 2017 Society for Conservation Biology.

  2. Cultural adaptations to the differential threats posed by hot versus cold climates.

    Science.gov (United States)

    Murray, Damian R

    2013-10-01

    Hot and cold climates have posed differential threats to human survival throughout history. Cold temperatures can pose direct threats to survival in themselves, whereas hot temperatures may pose threats indirectly through higher prevalence of infectious disease. These differential threats yield convergent predictions for the relationship between more demanding climates and freedom of expression, but divergent predictions for freedom from discrimination.

  3. Personal privacy, information assurance, and the threat posed by malware techology

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2006-04-01

    In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.

  4. Laser Remediation of Threats Posed by Small Orbital Debris

    Science.gov (United States)

    Fork, Richard L.; Rogers, Jan R.; Hovater, Mary A.

    2012-01-01

    The continually increasing amount of orbital debris in near Earth space poses an increasing challenge to space situational awareness. Recent collisions of spacecraft caused abrupt increases in the density of both large and small debris in near Earth space. An especially challenging class of threats is that due to the increasing density of small (1 mm to 10 cm dimension) orbital debris. This small debris poses a serious threat since: (1) The high velocity enables even millimeter dimension debris to cause serious damage to vulnerable areas of space assets, e.g., detector windows; (2) The small size and large number of debris elements prevent adequate detection and cataloguing. We have identified solutions to this threat in the form of novel laser systems and novel ways of using these laser systems. While implementation of the solutions we identify is challenging we find approaches offering threat mitigation within time frames and at costs of practical interest. We base our analysis on the unique combination of coherent light specifically structured in both space and time and applied in novel ways entirely within the vacuum of space to deorbiting small debris. We compare and contrast laser based small debris removal strategies using ground based laser systems with strategies using space based laser systems. We find laser systems located and used entirely within space offer essential and decisive advantages over groundbased laser systems.

  5. Introduced organisms pose the most significant threat to the ...

    African Journals Online (AJOL)

    spamer

    Introduced organisms pose the most significant threat to the conservation status of oceanic islands (e.g.. Williamson 1996). Subantarctic Prince Edward Island, the smaller of the two islands in the Prince Edward. Island group, has few introduced organisms; it is cur- rently known to support only three introduced animals.

  6. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  7. Health and environmental threats associated with the destruction of chemical weapons.

    Science.gov (United States)

    Matousek, Jirí

    2006-09-01

    Still existing arsenals of chemical weapons (CW) pose not only security threats for possible use in hostilities by state actors or misuse by terrorists but also safety threats to humans and biota due to leakages and possible accidents. The Chemical Weapons Convention (CWC) commits the States Parties (SPs) to destroy CW using technologies taking into consideration human health and environmental protection. It does not allow methods, routinely used up to the 1970s, such as earth burial, open-pit burning, and sea dumping. Long-term health and environmental threats and some accidents that have already occurred in the known localities of the sea-dumped and earth-buried arsenals of Nazi-German armed forces in the Baltic Region and of Imperial Japanese forces in the Far East Region are analyzed according to the impact of major CW and ammunition types (i.e., sulfur mustard--HD, tabun--GA, arsenicals--DA, DC, DM, arsine oil, and chloroacetophenone--CN). Any possible operations and handling with CW envisaged by the CWC as well as their verification are summarized taking into account the health threat they pose. CW and toxic armament waste to be destroyed and applied technologies (both developed and under current use in operational CW destruction facilities [CWDF]) are reviewed as are systems of health safety and environmental protection of the destruction/demilitarization stems from the extraordinary high toxicity of supertoxic lethal agents in man and biota. Problems of currently used Russian and U.S. standards for maximum allowable workplace concentrations and general population limits and possibilities of their determination by available analytical instrumentation are discussed.

  8. The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups

    Science.gov (United States)

    2015-05-21

    terrorist attacks of September 11th, 2001 researchers have sought to better understand the macroeconomic consequences of terrorism. Despite a...The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups A Monograph by MAJ Joshua Glonek...SUBTITLE The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups 5a. CONTRACT NUMBER 5b. GRANT

  9. Invasive Lionfish (Pterosis volitans) Pose Public Health Threats.

    Science.gov (United States)

    Diaz, James H

    2015-01-01

    The lionfish, Pterosis volitans, a native of Indo-Pacific oceans, is a popular saltwater aquarium fish despite venomous spines on its fins. Lionfish were inadvertently introduced into the western Atlantic from Florida in the early 1990s and have overpopulated and dispersed widely into the Caribbean Sea and Gulf of Mexico. Initiatives to control lionfish populations were launched, including the National Oceanographic and Atmospheric Administration (NOAA)-sponsored "Lionfish as Food Campaign".2 Recently, scientists from the Food and Drug Administration (FDA) reported that lionfish caught off the US Virgin Islands contained ciguatoxins and could cause ciguatera fish poisoning (CFP); a seafood-borne poisoning without an antidote or any specific treatment, and a potential for prolonged neurotoxicity. Lionfish pose several public health threats. New strategies to control the lionfish population explosion in coastal waters and offshore fisheries are needed now to ensure seafood safety and public health. The lionfish, Pterosis volitans, is native to the reefs of the western Indian and Pacific Oceans (Figure 1). Brightly colored with red, white, and black stripes and adorned with feathery fins, the lionfish is a popular saltwater aquarium fish despite venomous spines on its fins (Figure 2). Lionfish were introduced into the western North Atlantic from Florida in the early 1990s after some specimens were discarded by dissatisfied amateur aquarists and others escaped from hurricane-flooded public aquariums.1 Since lionfish are voracious carnivores, have few natural predators, and reproduce prolifically, they have overpopulated and dispersed widely from Cape Hatteras to Florida, throughout the Caribbean Sea, and into the Gulf of Mexico.1 The population density of lionfish in its new, invaded territory now exceeds that of its native habitat.1 As a result, campaigns to control lionfish populations were launched in Florida and the Caribbean. Lionfish now pose several public

  10. Assessing exposure risks for aquatic organisms posed by Tamiflu use under seasonal influenza and pandemic conditions

    International Nuclear Information System (INIS)

    Chen, Wei-Yu; Lin, Chia-Jung; Liao, Chung-Min

    2014-01-01

    Environmental pollution by anti-influenza drugs is increasingly recognized as a threat to aquatic environments. However, little is known about empirical data on risk effects posed by environmentally relevant concentrations of anti-influenza drug based on recently published ecotoxicological researches in Taiwan. Here we linked ecotoxicology models with an epidemiological scheme to assess exposure risks of aquatic organisms and environmental hazards posed by antiviral oseltamivir (Tamiflu) use in Taiwan. Built on published bioassays, we used probabilistic risk assessment model to estimate potential threats of environmentally relevant hazards on algae, daphnid, and zerbrafish. We found that Tamiflu use was unlikely to pose a significant chronic environmental risk to daphnia and zebrafish during seasonal influenza. However, the chronic environmental risk posed by Tamiflu use during pandemic was alarming. We conclude that no significant risk to algal growth was found during seasonal influenza and high pandemic Tamiflu use. -- Highlights: • Environmentally relevant concentrations of anti-influenza drug have ecotoxicologically important effects. • Tamiflu is unlikely to pose a significant chronic environmental risk during seasonal influenza. • Chronic environmental risk posed by Tamiflu during pandemic is alarming. • Tertiary process in sewage treatment plants is crucial in mitigating Tamiflu exposure risk. -- A probabilistic framework can be used for assessing exposure risks posed by environmentally relevant concentrations of anti-influenza drug in aquatic ecosystems

  11. Understanding the threats posed by non-native species: public vs. conservation managers.

    Directory of Open Access Journals (Sweden)

    Rodolphe E Gozlan

    Full Text Available Public perception is a key factor influencing current conservation policy. Therefore, it is important to determine the influence of the public, end-users and scientists on the prioritisation of conservation issues and the direct implications for policy makers. Here, we assessed public attitudes and the perception of conservation managers to five non-native species in the UK, with these supplemented by those of an ecosystem user, freshwater anglers. We found that threat perception was not influenced by the volume of scientific research or by the actual threats posed by the specific non-native species. Media interest also reflected public perception and vice versa. Anglers were most concerned with perceived threats to their recreational activities but their concerns did not correspond to the greatest demonstrated ecological threat. The perception of conservation managers was an amalgamation of public and angler opinions but was mismatched to quantified ecological risks of the species. As this suggests that invasive species management in the UK is vulnerable to a knowledge gap, researchers must consider the intrinsic characteristics of their study species to determine whether raising public perception will be effective. The case study of the topmouth gudgeon Pseudorasbora parva reveals that media pressure and political debate has greater capacity to ignite policy changes and impact studies on non-native species than scientific evidence alone.

  12. Does nitrate deposition following astrophysical ionizing radiation events pose an additional threat to amphibians?

    OpenAIRE

    Thomas, Brian C.; Honeyman, Michelle D.

    2008-01-01

    It is known that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an add...

  13. What threat do turbidity currents and submarine landslides pose to submarine telecommunications cable infrastructure?

    Science.gov (United States)

    Clare, Michael; Pope, Edward; Talling, Peter; Hunt, James; Carter, Lionel

    2016-04-01

    The global economy relies on uninterrupted usage of a network of telecommunication cables on the seafloor. These submarine cables carry ~99% of all trans-oceanic digital data and voice communications traffic worldwide, as they have far greater bandwidth than satellites. Over 9 million SWIFT banks transfers alone were made using these cables in 2004, totalling 7.4 trillion of transactions per day between 208 countries, which grew to 15 million SWIFT bank transactions last year. We outline the challenge of why, how often, and where seafloor cables are broken by natural causes; primarily subsea landslides and sediment flows (turbidity currents and also debris flows and hyperpycnal flows). These slides and flows can be very destructive. As an example, a sediment flow in 1929 travelled up to 19 m/s and broke 11 cables in the NE Atlantic, running out for ~800 km to the abyssal ocean. The 2006 Pingtung earthquake triggered a sediment flow that broke 22 cables offshore Taiwan over a distance of 450 km. Here, we present initial results from the first statistical analysis of a global database of cable breaks and causes. We first investigate the controls on frequency of submarine cable breaks in different environmental and geological settings worldwide. We assess which types of earthquake pose a significant threat to submarine cable networks. Meteorological events, such as hurricanes and typhoons, pose a significant threat to submarine cable networks, so we also discuss the potential impacts of future climate change on the frequency of such hazards. We then go on to ask what are the physical impacts of submarine sediment flows on submerged cables? A striking observation from past cable breaks is sometimes cables remain unbroken, whilst adjacent cables are severed (and record powerful flows travelling at up to 6 m/s). Why are some cables broken, but neighbouring cables remain intact? We provide some explanations for this question, and outline the need for future in

  14. Buckling-driven delamination growth in composite laminates: Guidelines for assessing the threat posed by interlaminar matrix delamination

    DEFF Research Database (Denmark)

    Bhushan, Karihaloo; Stang, Henrik

    2008-01-01

    This paper is concerned with development of a simple procedure to assess the threat posed by interlaminar matrix delaminations to the integrity of composite laminates when they are situated in a compressive stress field. Depending upon the size of the delamination, its location below the surface...

  15. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  16. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  17. Development of a semi-quantitative risk assessment model for evaluating environmental threat posed by the three first EU watch-list pharmaceuticals to urban wastewater treatment plants: An Irish case study.

    Science.gov (United States)

    Tahar, Alexandre; Tiedeken, Erin Jo; Clifford, Eoghan; Cummins, Enda; Rowan, Neil

    2017-12-15

    Contamination of receiving waters with pharmaceutical compounds is of pressing concern. This constitutes the first study to report on the development of a semi-quantitative risk assessment (RA) model for evaluating the environmental threat posed by three EU watch list pharmaceutical compounds namely, diclofenac, 17-beta-estradiol and 17-alpha-ethinylestradiol, to aquatic ecosystems using Irish data as a case study. This RA model adopts the Irish Environmental Protection Agency Source-Pathway-Receptor concept to define relevant parameters for calculating low, medium or high risk score for each agglomeration of wastewater treatment plant (WWTP), which include catchment, treatments, operational and management factors. This RA model may potentially be used on a national scale to (i) identify WWTPs that pose a particular risk as regards releasing disproportionally high levels of these pharmaceutical compounds, and (ii) help identify priority locations for introducing or upgrading control measures (e.g. tertiary treatment, source reduction). To assess risks for these substances of emerging concern, the model was applied to 16 urban WWTPs located in different regions in Ireland that were scored for the three different compounds and ranked as low, medium or high risk. As a validation proxy, this case study used limited monitoring data recorded at some these plants receiving waters. It is envisaged that this semi-quantitative RA approach may aid other EU countries investigate and screen for potential risks where limited measured or predicted environmental pollutant concentrations and/or hydrological data are available. This model is semi-quantitative, as other factors such as influence of climate change and drug usage or prescription data will need to be considered in a future point for estimating and predicting risks. Copyright © 2017 Elsevier B.V. All rights reserved.

  18. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  19. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    Science.gov (United States)

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  20. Association study of multiple antibiotic resistance and virulence: a strategy to assess the extent of risk posed by bacterial population in aquatic environment.

    Science.gov (United States)

    Singh, Santosh Kumar; Ekka, Roseleen; Mishra, Mitali; Mohapatra, Harapriya

    2017-07-01

    The present study explored the association between multiple antibiotic resistance (MAR) index and virulence index to determine what percent of environmental antibiotic-resistant (eARB) bacteria could pose threat as potential pathogen. 16srRNA-based sequencing of 113 non-duplicate isolates identified majority of them to be gram negative belonging to Enterobacter, Pseudomonas, Aeromonas, Proteus, Acinetobacter, and Klebsiella. Statistical comparison of MAR indices of the abovementioned genera indicated differences in the median values among the groups (p  Klebsiella = Acinetobacter > Proteus > Aeromonas > Enterobacter. Association between MAR index and virulence index revealed that 25% of isolates in the population under study posed high threat to human/animal or both; out of which 75% isolates belonged to genus Pseudomonas. Based on observations of comparative analysis of the six gram-negative genera, it could be concluded that Pseudomonas isolates from environment pose significantly high threat as potential pathogens while Enterobacter isolates posed no threat.

  1. Counterintelligence Screening Needed lo Reduce Security Threat That Unscreened Local National Linguists Pose to U.S. Forces (REDACTED)

    Science.gov (United States)

    2012-12-07

    Logistics Civil Augmentation Program MEP Mission Essential Personnel MFR Memorandum for Record OCI Organizational Conflict of Interest OCONUS Outside...reports would draw conclusions and recollllllel1dations on the retention, hir.ing, or threat posed by the LNs. MEP would send thjl MFRs to tlie...office responsible for issning badges on the local installations if the MFRs had no negative CI infonnation. If the MFRs had CI exploitable information

  2. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    OpenAIRE

    Klonek, Florian E.; G?ntner, Amelie V.; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  3. Landscape, Legal, and Biodiversity Threats that Windows Pose to Birds: A Review of an Important Conservation Issue

    Directory of Open Access Journals (Sweden)

    Daniel Klem Jr.

    2014-03-01

    Full Text Available Windows in human residential and commercial structures in urban, suburban, and rural landscapes contribute to the deaths of billions of birds worldwide. International treaties, federal, provincial, state, and municipal laws exist to reduce human-associated avian mortality, but are most often not enforced for bird kills resulting from window strikes. As an additive, compared to a compensatory mortality factor, window collisions pose threats to the sustainability and overall population health of common as well as species of special concern. Several solutions to address the window hazard for birds exist, but the most innovative and promising need encouragement and support to market, manufacture, and implement.

  4. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  5. An alternative approach to risk rank chemicals on the threat they pose to the aquatic environment.

    Science.gov (United States)

    Johnson, Andrew C; Donnachie, Rachel L; Sumpter, John P; Jürgens, Monika D; Moeckel, Claudia; Pereira, M Gloria

    2017-12-01

    This work presents a new and unbiased method of risk ranking chemicals based on the threat they pose to the aquatic environment. The study ranked 12 metals, 23 pesticides, 11 other persistent organic pollutants (POPs), 13 pharmaceuticals, 10 surfactants and similar compounds and 2 nanoparticles (total of 71) of concern against one another by comparing their median UK river water and median ecotoxicity effect concentrations. To complement this, by giving an assessment on potential wildlife impacts, risk ranking was also carried out by comparing the lowest 10th percentile of the effects data with the highest 90th percentile of the exposure data. In other words, risk was pared down to just toxicity versus exposure. Further modifications included incorporating bioconcentration factors, using only recent water measurements and excluding either lethal or sub-lethal effects. The top ten chemicals, based on the medians, which emerged as having the highest risk to organisms in UK surface waters using all the ecotoxicity data were copper, aluminium, zinc, ethinylestradiol (EE2), linear alkylbenzene sulfonate (LAS), triclosan, manganese, iron, methomyl and chlorpyrifos. By way of contrast, using current UK environmental quality standards as the comparator to median UK river water concentrations would have selected 6 different chemicals in the top ten. This approach revealed big differences in relative risk; for example, zinc presented a million times greater risk then metoprolol and LAS 550 times greater risk than nanosilver. With the exception of EE2, most pharmaceuticals were ranked as having a relatively low risk. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Zebra Mussels Pose a Threat to Virginia's Waters

    OpenAIRE

    Helfrich, Louis A. (Louis Anthony), 1942-; Weigmann, Diana L.; Speenburgh, Renee M.; Neves, Richard J.; Kitchel, Lisie; Bruenderman, Sue A., 1962-

    2005-01-01

    Provides an brief introduction to the invasion of the zebra mussel into American waters, explains the economic consequences they pose, and discusses if Virginia will inherit the problem, what the public can do to help, the general lifecycle of the zebra mussel and if they can be controlled, and who is working on the zebra mussel problem.

  7. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  8. Assessing the Biological Threat Posed by Suicide Bombers

    Science.gov (United States)

    2016-02-01

    the test by about 350’, it is clear some aerosol particles “ surfed ” the shockwave from the blast and were carried a distance upwind. Had the sampling...projectiles implantation in victims of suicide bombings and implications for health and emergency care provideres: the 7/7 experience, Ann R Coll Surg Engl...Ebola in East Africa and Implications for Global Health and Security, Global Policy 2013. (8) Ustun, C.; Ozgurler, O., Ebola: A Significant Threat as

  9. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    OpenAIRE

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  10. Victims’ Reactions to the Interpersonal Threat to Public Identity Posed by Copycats

    Directory of Open Access Journals (Sweden)

    Stephen Reysen

    2014-06-01

    Full Text Available Interpersonal threats to public identity consist of situations where another person intentionally attempts to illegitimately undermine one’s ability to display a valued and distinctive public identity. In three studies, we examined victims’ reactions to copycatting as an interpersonal threat to public identity to test each component of this definition. In Study, participants expressed the greatest degree of anger when the copying was illegitimate and intentional. In Study 2, participants expressed a greater degree of anger to copying of an important (vs. unimportant characteristic. In Study 3, we manipulated the number of identity characteristics copied. A structural model showed that as the number of copied characteristics increased, participants’ perception of the situation as illegitimate and the copying as intentional predicted a threat to one’s freedom, which in turn predicted felt reactance predicting an unfavorable impression and a desire to confront the copycat. Together, the results support the definition of interpersonal threats to public identity and copycatting as such a situation.

  11. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    with other subsystems like South East Asia may have different approaches to global governance, international constitutional order, or particular cases such as the measure of infringement of human rights when targeting individuals suspected of terrorist links. Yet international law remains the key part of the Asian and global security regime. The hypothesis of this study is that the "void of governance" regime in territorial and international waters provides lucrative environment for developing terrorism, piracy, environmental degradation, and other criminal activities that pose untraditional threats to the regional security. This "void of governance" regime can be caused by either, or both, de jure or de facto insufficient control over particular marine territories.

  12. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  13. Environmental management systems

    OpenAIRE

    Misiak, Małgorzata

    2016-01-01

    Considering environmental protection requirements in business operations may, in the long run, determine if a lasting comparative advantage can be achieved. That is why our textbook, rich in case studies, identifies not only the threats a business may pose to the environment but stresses the ways of reducing its negative impact. It discusses, among other things, the concept of corporate social responsibility, environmental management systems, methods and the importance of eco-labelling goods ...

  14. Mitigating the Risk of Environmental Hazards in Mexico

    Science.gov (United States)

    2011-10-28

    wildfires.9 Infectious hazards in Mexico pose an intermediate risk of disease and include food or waterborne illness, hepatitis, dengue fever , Valley Fever ...the type of health threat that is posed. 12 Nanotechnology: Within the Latin American region , Brazil , Argentina and Mexico are leaders in...07/25/ dengue -on-the-loose/ (accessed 11 October 2011). 41. Environmental Protection Agency, State of the Border Region Indicators Report 2005, EPA

  15. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  16. Zoonotic pathogens from feral swine that pose a significant threat to public health.

    Science.gov (United States)

    Brown, V R; Bowen, R A; Bosco-Lauth, A M

    2018-06-01

    The natural fecundity of suids, great ability to adapt to new habitats and desire for local hunting opportunities leading to translocation of feral pigs to regions where they are not yet established have all been instrumental in the home range expansion of feral swine. Feral swine populations in the United States continue to expand, wreaking havoc on agricultural lands, further compromising threatened and endangered species, and posing a microbiological threat to humans, domestic livestock and companion animals. This manuscript thoroughly reviews zoonotic diseases of concern including brucellosis, bovine tuberculosis, leptospirosis, enteric pathogens, both Salmonella spp. and shiga toxin-producing Escherichia coli, and hepatitis E. These pathogens are not a comprehensive list of microbes that are capable of infecting both humans and feral swine, but rather have been selected as they are known to infect US feral swine, direct transmission between wild suids and humans has previously been documented, or they have been shown to be readily transmitted during processing or consumption of feral swine pork. Humans that interact directly or indirectly with feral swine are at much higher risk for the development of a number of zoonotic pathogens. Numerous case reports document transmission events from feral swine and wild boar to humans, and the resulting diseases may be mild and self-limiting, chronic or fatal. Individuals that interact with feral swine should take preventative measures to minimize the risk of disease transmission and all meat should be thoroughly cooked. Additionally, public health campaigns to increase knowledge of the risks associated with feral swine are imperative. © 2018 Blackwell Verlag GmbH.

  17. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    NARCIS (Netherlands)

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation

  18. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  19. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  20. West African Research and Training Hub on Environmental and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The initial research focuses on documenting and reducing health threats associated with processing electronic waste (e-waste), small-scale gold mining, and air pollution impacts from the informal transport sector. All three economic activities produce significant levels of environmental contamination and pose elevated ...

  1. Hg-contaminated terrestrial spiders pose a potential risk to songbirds at Caddo Lake (Texas/Louisiana, USA).

    Science.gov (United States)

    Gann, Gretchen L; Powell, Cleveland H; Chumchal, Matthew M; Drenner, Ray W

    2015-02-01

    Methylmercury (MeHg) is an environmental contaminant that can have adverse effects on wildlife. Because MeHg is produced by bacteria in aquatic ecosystems, studies of MeHg contamination of food webs historically have focused on aquatic organisms. However, recent studies have shown that terrestrial organisms such as songbirds can be contaminated with MeHg by feeding on MeHg-contaminated spiders. In the present study, the authors examined the risk that MeHg-contaminated terrestrial long-jawed orb weaver spiders (Tetragnatha sp.) pose to songbirds at Caddo Lake (Texas/Louisiana, USA). Methylmercury concentrations in spiders were significantly different in river, wetland, and open-water habitats. The authors calculated spider-based wildlife values (the minimum spider MeHg concentrations causing physiologically significant doses in consumers) to assess exposure risks for arachnivorous birds. Methylmercury concentrations in spiders exceeded wildlife values for Carolina chickadee (Poecile carolinensis) nestlings, with the highest risk in the river habitat. The present study indicates that MeHg concentrations in terrestrial spiders vary with habitat and can pose a threat to small-bodied nestling birds that consume large amounts of spiders at Caddo Lake. This MeHg threat to songbirds may not be unique to Caddo Lake and may extend throughout the southeastern United States. © 2014 SETAC.

  2. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  3. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  4. Would an obese person whistle vivaldi? Targets of prejudice self-present to minimize appearance of specific threats.

    Science.gov (United States)

    Neel, Rebecca; Neufeld, Samantha L; Neuberg, Steven L

    2013-05-01

    How do targets of stigma manage social interactions? We built from a threat-specific model of prejudice to predict that targets select impression-management strategies that address the particular threats other people see them to pose. We recruited participants from two groups perceived to pose different threats: overweight people, who are heuristically associated with disease and targeted with disgust, and Black men, who are perceived to be dangerous and targeted with fear. When stereotypes and prejudices toward their groups were made salient, overweight people (Studies 1 and 2) and Black men (Study 2) selectively prioritized self-presentation strategies to minimize apparent disease threat (wearing clean clothes) or physical-violence threat (smiling), respectively. The specific threat a group is seen to pose plays an important but underexamined role in the psychology of being a target of prejudice.

  5. Do New Mobile Devices in Enterprises Pose A Serious Security Threat?

    OpenAIRE

    Ali A Altalbe

    2013-01-01

    The purpose of this paper is to introduce a research proposal designed to explore the network securityissues concerning mobile devices protection. Many threats exist and they harm not only computers but handheld devices as well. The mobility of phones and their excessive use make them more vulnerable. The findings suggest a list of protections that can provide high level of security for new mobile devices.

  6. Climate Change and Requirement of Transfer of Environmentally Sound Technology

    DEFF Research Database (Denmark)

    Uddin, Mahatab

    that developed the technology, to another that adopts, adapts, and uses it. As different kinds of threats posed by climate change are continuously increasing all over the world the issue of “technology transfer” especially the transfer of environmentally sound technologies has become one of the key topics...

  7. Environmental challenges posed by veld fires in fragile regions: The case of the Bulilima and Mangwe districts in southern Zimbabwe

    Directory of Open Access Journals (Sweden)

    Ernest Dube

    2015-11-01

    Full Text Available This original research confronted challenges to environmental management and sustainability posed by veld fires in the Bulilima and Mangwe Districts of Matabeleland in the South Province in southern Zimbabwe. Veld fires have affected the fauna and flora, polluted air and water, and destroyed livelihoods. The study aimed at establishing challenges to environmental sustainability posed by veld fires, identifying the type of environment upon which veld fires have impacted, analysing legal issues and other interventions surrounding the control of veld fires and suggesting new control measures for veld fires. A qualitative research design and quota sampling were used. The study involved 30 participants. Data was collected through a questionnaire, an interview guide and participant observation. Challenges to environmental management and sustainability posed by veld fires include property damage, reduced soil fertility, destruction of vegetation, air and water pollution and destruction of wildlife. Most veld fires are a result of human actions that emanate from the disposal of cigarettes, the burning of vegetation when preparing fields, the use of fire by hunters, smoking out bees and the making of fires by motorists along highways. The government should consider reviewing the current environmental statues. Fireguards should be wide enough to lessen veld-fire impact. Lastly, veld-fire campaigns and rehearsals should be run on a regular basis. It is hoped that this work would make a significant contribution through improving the current thinking about environmental management and sustainability, thereby benefiting policy makers, practitioners and stakeholders.

  8. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  9. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy.

    Science.gov (United States)

    O'Brolcháin, Fiachra; Jacquemard, Tim; Monaghan, David; O'Connor, Noel; Novitzky, Peter; Gordijn, Bert

    2016-02-01

    The rapid evolution of information, communication and entertainment technologies will transform the lives of citizens and ultimately transform society. This paper focuses on ethical issues associated with the likely convergence of virtual realities (VR) and social networks (SNs), hereafter VRSNs. We examine a scenario in which a significant segment of the world's population has a presence in a VRSN. Given the pace of technological development and the popularity of these new forms of social interaction, this scenario is plausible. However, it brings with it ethical problems. Two central ethical issues are addressed: those of privacy and those of autonomy. VRSNs pose threats to both privacy and autonomy. The threats to privacy can be broadly categorized as threats to informational privacy, threats to physical privacy, and threats to associational privacy. Each of these threats is further subdivided. The threats to autonomy can be broadly categorized as threats to freedom, to knowledge and to authenticity. Again, these three threats are divided into subcategories. Having categorized the main threats posed by VRSNs, a number of recommendations are provided so that policy-makers, developers, and users can make the best possible use of VRSNs.

  10. Incinerators, Hazardous Waste, To identify and locate abandoned oil production facilities and apparatus which pose a potential threat for creating an oil spill through either natural or accidental causes., Published in 1998, 1:24000 (1in=2000ft) scale, Louisiana State University (LSU).

    Data.gov (United States)

    NSGIC Education | GIS Inventory — Incinerators, Hazardous Waste dataset current as of 1998. To identify and locate abandoned oil production facilities and apparatus which pose a potential threat for...

  11. Science priorities for reducing the threat of invasive species

    Science.gov (United States)

    E. A. Chornesky; A. M. Bartuska; G. H. Aplet; J. Cummings-Carlson; F. W. Davis; J. Eskow; D. R. Gordon; K. W. Gottschalk; R. A. Haack; A. J. Hansen; R. N. Mack; F. J. Rahel; M. A. Shannon; L. A. Wainger; T. B. Wigley

    2005-01-01

    Invasive species pose a major, yet poorly addressed, threat to sustainable forestry. Here we set forth an interdisciplinary science strategy of research, development, and applications to reduce this threat. To spur action by public and private entities that too often are slow, reluctant, or unable to act, we recommend (a) better integrating invasive species into...

  12. Foreign-funded M&A Poses No Threatto China’s Economic Security

    Institute of Scientific and Technical Information of China (English)

    王志乐

    2007-01-01

    Foreign funded M■A(Mergers ■ Acquisitions) activity is becoming increasingly common in China.In this article Wang Zhile assesses the effects and risks associated with M■A,finding that foreign funded M■A activity is immensely beneficial to China and poses no threat to economic security.

  13. Report on the costs of domestic and international emergencies and on the threats posed by the Kuwaiti oil fires as required by P. L. 102-55

    Energy Technology Data Exchange (ETDEWEB)

    1991-06-01

    The report fulfills the requirements of Public Law 12-55, the FY 1992 dire emergency supplemental appropriations bill, signed by the President on June 13, 1991. This law required the Director of the Office of Management and Budget to prepare and submit to the appropriate committees of Congress a report on: unfunded costs of dire emergencies because of floods, droughts, tornadoes, unemployment, and other disasters in the United States; unfunded costs, including food assistance, of international disaster emergencies existing because of floods, droughts, tornadoes, and other disasters; and the threats to oil supply, human health, and the environment that the Kuwaiti oil fires might pose.

  14. Hybrid Wars: The 21 st -Century's New Threats to Global Peace and ...

    African Journals Online (AJOL)

    cyber-terrorism' and 'cyber-war' against the backdrop of Russia's 'Ukrainian Spring' and the continuing threat posed by radical Islamist groups in Africa and the Middle East. It also discusses the findings of an on-going hybrid threat project by ...

  15. 2007 accomplishment report for the Eastern and Western forest environmental threat assessment centers

    Science.gov (United States)

    Danny C. Lee; Jerome S. Beatty

    2008-01-01

    As chance would have it, the Eastern Forest and Western Wildland Environmental Threat Assessment Centers were created the same year (2005) that the Forest Service celebrated its centennial anniversary as an agency of the U.S. Department of Agriculture. The historic birth of the Forest Service provides a nice backdrop to view our own more modest beginnings. Both events...

  16. Environmental surveillance at Los Alamos during 1991. Environmental protection group

    Energy Technology Data Exchange (ETDEWEB)

    Dewart, J.; Kohen, K.L. [comps.

    1993-08-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1991. Routine monitoring for radiation and for radioactive and chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1991 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment.

  17. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  18. Simulating sanitation and waste flows and their environmental impacts in East African urban centres

    NARCIS (Netherlands)

    Oyoo, R.

    2014-01-01

    Simulating Sanitation and Waste Flows and their Environmental Impacts in East African Urban Centres

    Abstract

    If improperly managed, urban waste flows can pose a significant threat to the quality of both the natural environment and public health.

  19. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  20. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  1. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  2. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  3. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  4. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  5. 75 FR 30002 - Federal Advisory Committee; Threat Reduction Advisory Committee

    Science.gov (United States)

    2010-05-28

    ... management; c. Nuclear deterrence transformation; d. Weapons effects; and e. Other Office of the Under... Reduction Agency on the following: a. Reducing the threat posed by nuclear, biological, chemical...

  6. The Political Economy of Alternative Trade: Social and Environmental Certification in the South African Wine Industry

    Science.gov (United States)

    McEwan, Cheryl; Bek, David

    2009-01-01

    Despite recent critical analyses of the nature and impacts of social and environmental certification, the increasingly complex landscape of voluntary, industry and third-party codes and certification processes that have emerged in specific sectors is poorly understood. In particular, little is known about the potential threats posed by an…

  7. Experimental estimation of snare detectability for robust threat monitoring

    OpenAIRE

    O Kelly, H. J.; Rowcliffe, M.; Durant, S.; Milner-Gulland, E. J.

    2018-01-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccess...

  8. COST action TD1407: network on technology-critical elements (NOTICE)--from environmental processes to human health threats.

    Science.gov (United States)

    Cobelo-García, A; Filella, M; Croot, P; Frazzoli, C; Du Laing, G; Ospina-Alvarez, N; Rauch, S; Salaun, P; Schäfer, J; Zimmermann, S

    2015-10-01

    The current socio-economic, environmental and public health challenges that countries are facing clearly need common-defined strategies to inform and support our transition to a sustainable economy. Here, the technology-critical elements (which includes Ga, Ge, In, Te, Nb, Ta, Tl, the Platinum Group Elements and most of the rare-earth elements) are of great relevance in the development of emerging key technologies-including renewable energy, energy efficiency, electronics or the aerospace industry. In this context, the increasing use of technology-critical elements (TCEs) and associated environmental impacts (from mining to end-of-life waste products) is not restricted to a national level but covers most likely a global scale. Accordingly, the European COST Action TD1407: Network on Technology-Critical Elements (NOTICE)-from environmental processes to human health threats, has an overall objective for creating a network of scientists and practitioners interested in TCEs, from the evaluation of their environmental processes to understanding potential human health threats, with the aim of defining the current state of knowledge and gaps, proposing priority research lines/activities and acting as a platform for new collaborations and joint research projects. The Action is focused on three major scientific areas: (i) analytical chemistry, (ii) environmental biogeochemistry and (iii) human exposure and (eco)-toxicology.

  9. STATISTICAL METHODS FOR ENVIRONMENTAL APPLICATIONS USING DATA SETS WITH BELOW DETECTION LIMIT OBSERVATIONS AS INCORPORTED IN PROUCL 4.0

    Science.gov (United States)

    Nondetect (ND) or below detection limit (BDL) results cannot be measured accurately, and, therefore, are reported as less than certain detection limit (DL) values. However, since the presence of some contaminants (e.g., dioxin) in environmental media may pose a threat to human he...

  10. Environmental report for 1989

    International Nuclear Information System (INIS)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Brown, M.G.; Gallegos, G.M.

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance efforts for 1989. To enable evaluation of the effect of LLNL operations on the local environment, measurements were made at both the Livermore site and nearby Site 300 of direct radiation and a variety of radionuclides and chemical pollutants in ambient air, soil, sewage effluent, surface water, groundwater, vegetation, and foodstuff. Evaluations were made of LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment. The monitoring data demonstrate that LLNL was in compliance with environmental laws and regulations concerning emission and discharge of materials to the environment. In addition, the monitoring data demonstrate that the environmental impacts of LLNL are minimal and pose no threat to the public or the environment. 98 refs., 40 figs., 77 tabs

  11. Environmental report for 1989

    Energy Technology Data Exchange (ETDEWEB)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Brown, M.G.; Gallegos, G.M. (eds.)

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance efforts for 1989. To enable evaluation of the effect of LLNL operations on the local environment, measurements were made at both the Livermore site and nearby Site 300 of direct radiation and a variety of radionuclides and chemical pollutants in ambient air, soil, sewage effluent, surface water, groundwater, vegetation, and foodstuff. Evaluations were made of LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment. The monitoring data demonstrate that LLNL was in compliance with environmental laws and regulations concerning emission and discharge of materials to the environment. In addition, the monitoring data demonstrate that the environmental impacts of LLNL are minimal and pose no threat to the public or the environment. 98 refs., 40 figs., 77 tabs.

  12. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  13. Site environmental report for 1991

    International Nuclear Information System (INIS)

    Cassady, C.K.; Gordon, K.W.; Holland, R.C.

    1992-01-01

    This report describes the results of the Environmental Protection Program conducted at Sandia National Laboratories, Livermore, in calendar year 1991. This program routinely monitors radioactive and chemical materials at the Sandia site and in the surrounding area. The Environmental Protection Department of SNL, Livermore, prepared this report in accordance with the requirements of Department of Energy Orders 5484.1 and 5400.1. It documents, evaluates, and interprets effluent and environmental monitoring data. These data are used in part to determine Sandia's compliance with environmental laws and regulations. Much of the off-site monitoring data presented in this report has been collected by Lawrence Livermore National Laboratory (LLNL), which provides off-site environmental monitoring for both facilities. The Environmental Monitoring Program at SNL, Livermore, augments LLNL's program by performing on-site and perimeter monitoring, and by monitoring airborne and liquid effluents. Based on comparison to appropriate safety standards and background measurements, operations at SNL, Livermore, in 1991 posed no significant threat to the public or the environment

  14. Site environmental report for 1990

    International Nuclear Information System (INIS)

    Brekke, D.D.

    1991-01-01

    This report describes the results of the Environmental Monitoring Program conducted at Sandia National Laboratories, Livermore, in calendar year 1990. This program routinely monitors radioactive and chemical materials at the Sandia site and in the surrounding area. The Environmental Protection Division of SNL, Livermore, prepared this report in accordance with the requirements of Department of Energy Orders 5484.1 and 5400.1. It documents, evaluates, and interprets effluent and environmental monitoring data. These data are used to determine Sandia's compliance with environmental laws and regulations. Much of the off-site monitoring data presented in this report has been collected by Lawrence Livermore National Laboratory (LLNL), which provides off-site environmental monitoring for both facilities. The Environmental Monitoring Program at SNL, Livermore, augments LLNL's program by performing on-site and perimeter monitoring, and by monitoring airborne and liquid effluents. Based on comparison to appropriate safety standards and background measurements, operations at SNL, Livermore, in 1990 posed no significant threat to Laboratory employees, the public, or the environment

  15. Hymenoptera of Afghanistan and the central command area of operations: assessing the threat to deployed U.S. service members with insect venom hypersensitivity.

    Science.gov (United States)

    Turbyville, Joseph C; Dunford, James C; Nelson, Michael R

    2013-01-01

    Insect venom hypersensitivity can pose a threat to personnel deployed to a combat zone but the exposure risk in Afghanistan is currently unknown. This study was designed to assess the threat of Hymenoptera stings and associated allergic reactions in Afghanistan. Hymenoptera species were collected during a deployment to southern Afghanistan from June 2010 through January 2011. The literature was also reviewed to determine species of medically important Hymenoptera recorded in the region. The U.S. Army theater electronic medical data system was mined for ICD-9 codes associated with insect stings to determine the number of theater medical clinic encounters addressing insect sting reactions. Three species of flying hymenoptera were commonly encountered during the study period: Vespa orientalis L., Polistes wattii Cameron, and Vespula germanica (F.). A literature review also confirms the presence of honeybees (Apidae), numerous velvet ant (Mutillidae) species, and various ant (Formicidae) species all capable of stinging. No evidence was identified to suggest that fire ants (Solenopsis ssp.) are a threat in the region. Based on electronic medical records from the U.S. Central Command area of operations over a 2-year period, roughly 1 in 500 clinic visits involved a patient with a diagnosis of insect bite or sting. Cross-reactive members of all five flying Hymenoptera species commonly assessed for in Hymenoptera allergy evaluations are present in Afghanistan. The review of in-theater medical records confirms that insect stings pose an environmental threat to deployed service members.

  16. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  17. MILITARY TRADE UNIONS: A THREAT TO NATIONAL SECURITY ...

    African Journals Online (AJOL)

    sacrificed at the altar of soldiers' constitutional rights to form and join trade unions .... includes a rights-based culture, a rise in individualism, a change in the acceptance of ... military leadership with the military unions that poses the greatest threat to civil– ... 10 European Organisation of Military Associations, available at ...

  18. A preliminary approach to quantifying the overall environmental risks posed by development projects during environmental impact assessment.

    Science.gov (United States)

    Nicol, Sam; Chadès, Iadine

    2017-01-01

    Environmental impact assessment (EIA) is used globally to manage the impacts of development projects on the environment, so there is an imperative to demonstrate that it can effectively identify risky projects. However, despite the widespread use of quantitative predictive risk models in areas such as toxicology, ecosystem modelling and water quality, the use of predictive risk tools to assess the overall expected environmental impacts of major construction and development proposals is comparatively rare. A risk-based approach has many potential advantages, including improved prediction and attribution of cause and effect; sensitivity analysis; continual learning; and optimal resource allocation. In this paper we investigate the feasibility of using a Bayesian belief network (BBN) to quantify the likelihood and consequence of non-compliance of new projects based on the occurrence probabilities of a set of expert-defined features. The BBN incorporates expert knowledge and continually improves its predictions based on new data as it is collected. We use simulation to explore the trade-off between the number of data points and the prediction accuracy of the BBN, and find that the BBN could predict risk with 90% accuracy using approximately 1000 data points. Although a further pilot test with real project data is required, our results suggest that a BBN is a promising method to monitor overall risks posed by development within an existing EIA process given a modest investment in data collection.

  19. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  20. Conceptualizing threats to tobacco control from international economic agreements: the Brazilian experience.

    Science.gov (United States)

    Drope, Jeffrey; McGrady, Benn; Bialous, Stella Aguinaga; Lencucha, Raphael; Silva, Vera Luiza da Costa E

    2017-10-19

    Using the results of dozens of interviews with key actors involved in tobacco control policymaking, we examine these actors' perceptions of threats to tobacco control policy efforts from international economic policies on trade and investment. We also evaluate, from a legal perspective, the genuine threats that exist or potential challenges that economic policies may pose to the Brazilian government's public health efforts. We find that most actors did not perceive these economic policies as a major threat to tobacco control. Objectively, we found that some threats do exist. For example, Brazil's attempt to ban most tobacco additives and flavorings continues to met resistance at the World Trade Organization.

  1. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2008

    Energy Technology Data Exchange (ETDEWEB)

    West Valley Environmental Services LLC (WVES) and URS - Washington Division

    2009-09-24

    Annual Site Environmental Report for the West Valley Demonstration Project (WVDP) for Calendar Year 2008. The report summarizes the calendar year (CY) 2008 environmental monitoring program data at the WVDP so as to describe the performance of the WVDP’s environmental management system (EMS), confirm compliance with standards and regulations, and highlight important programs. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of the environment, continual improvement, prevention and/or minimization of pollution, public outreach, and stakeholder involvement. In addition to demonstrating compliance with environmental regulations and directives, evaluation of data collected in 2008 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  2. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2008

    International Nuclear Information System (INIS)

    2009-01-01

    Annual Site Environmental Report for the West Valley Demonstration Project (WVDP) for Calendar Year 2008. The report summarizes the calendar year (CY) 2008 environmental monitoring program data at the WVDP so as to describe the performance of the WVDP's environmental management system (EMS), confirm compliance with standards and regulations, and highlight important programs. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of the environment, continual improvement, prevention and/or minimization of pollution, public outreach, and stakeholder involvement. In addition to demonstrating compliance with environmental regulations and directives, evaluation of data collected in 2008 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  3. Threat Is a Multidimensional Construct: Exploring the Role of Children's Threat Appraisals in the Relationship between Interparental Conflict and Child Adjustment

    Science.gov (United States)

    Atkinson, Erin R.; Dadds, Mark R.; Chipuer, Heather; Dawe, Sharon

    2009-01-01

    Past research has emphasised the importance of children's appraisals of the threat posed by parent conflict for understanding links between interparental conflict and child outcomes. However, little is known about what it is that children actually find threatening about parent conflict. Children (n = 236) aged 10-16 years were recruited to examine…

  4. Combating Terrorism: Linking Threats to Strategies and Resources

    National Research Council Canada - National Science Library

    2000-01-01

    ...) gathers intelligence and assesses the threat posed by domestic sources of terrorism. According to the U.S. intelligence community, conventional explosives and firearms continue to be the weapons of choice for terrorists. The intelligence community (both foreign and domestic agencies) reports an increased possibility that terrorists may use CBRN agents in the next decade.

  5. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    International Nuclear Information System (INIS)

    Winson, A; Kinvig, H; Gottsmann, J; Partington, E; Geyer, A

    2008-01-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  6. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    Energy Technology Data Exchange (ETDEWEB)

    Winson, A; Kinvig, H; Gottsmann, J; Partington, E; Geyer, A [Department of Earth Sciences, University of Bristol (United Kingdom)

    2008-10-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  7. Environmental surveillance at Los Alamos during 1992

    International Nuclear Information System (INIS)

    Kohen, K.; Stoker, A.; Stone, G.

    1994-07-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory during 1992. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring results to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1992 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, laboratory employees, or the environment

  8. Environmental surveillance at Los Alamos during 1991

    International Nuclear Information System (INIS)

    Dewart, J.; Kohen, K.L.

    1993-08-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1991. Routine monitoring for radiation and for radioactive and chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1991 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment

  9. Environmental surveillance at Los Alamos during 1995

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-10-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory (LANL or the Laboratory) during 1995. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring result to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1995 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, Laboratory employees, or the environment.

  10. Environmental surveillance at Los Alamos during 1992

    Energy Technology Data Exchange (ETDEWEB)

    Kohen, K.; Stoker, A.; Stone, G. [and others

    1994-07-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory during 1992. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring results to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1992 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, laboratory employees, or the environment.

  11. Environmental surveillance at Los Alamos during 1995

    International Nuclear Information System (INIS)

    1996-10-01

    This report describes the environmental surveillance program at Los Alamos National Laboratory (LANL or the Laboratory) during 1995. The Laboratory routinely monitors for radiation and for radioactive and nonradioactive materials at (or on) Laboratory sites as well as in the surrounding region. LANL uses the monitoring result to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1995 to assess external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Using comparisons with standards, regulations, and background levels, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, Laboratory employees, or the environment

  12. Environmental surveillance at Los Alamos during 1990

    International Nuclear Information System (INIS)

    1992-03-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1990. Routine monitoring for radiation and radioactive or chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1990 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment

  13. A preliminary approach to quantifying the overall environmental risks posed by development projects during environmental impact assessment.

    Directory of Open Access Journals (Sweden)

    Sam Nicol

    Full Text Available Environmental impact assessment (EIA is used globally to manage the impacts of development projects on the environment, so there is an imperative to demonstrate that it can effectively identify risky projects. However, despite the widespread use of quantitative predictive risk models in areas such as toxicology, ecosystem modelling and water quality, the use of predictive risk tools to assess the overall expected environmental impacts of major construction and development proposals is comparatively rare. A risk-based approach has many potential advantages, including improved prediction and attribution of cause and effect; sensitivity analysis; continual learning; and optimal resource allocation. In this paper we investigate the feasibility of using a Bayesian belief network (BBN to quantify the likelihood and consequence of non-compliance of new projects based on the occurrence probabilities of a set of expert-defined features. The BBN incorporates expert knowledge and continually improves its predictions based on new data as it is collected. We use simulation to explore the trade-off between the number of data points and the prediction accuracy of the BBN, and find that the BBN could predict risk with 90% accuracy using approximately 1000 data points. Although a further pilot test with real project data is required, our results suggest that a BBN is a promising method to monitor overall risks posed by development within an existing EIA process given a modest investment in data collection.

  14. Threats to Security Posed by ISIS in Syria: A Human Security Approach

    Directory of Open Access Journals (Sweden)

    Lee-Ann Louw

    2017-02-01

    Full Text Available The civil war in Syria coupled with the attacks by ISIS, has resulted in one of the largest humanitarian crises since World War II. Although international efforts have resulted in regaining control of important cities, these military approaches have escalated and inflamed the violence of which innocent civilians bear the consequences. The continuing violence and resulting threats or insecurities negatively affect the lives, freedom, dignity and development of the people to name but a few. For that reason, the aim is to explore the applicability of a human security approach to the conflict in Syria that focuses on, among other aspects, minimising violence, mitigating the effects of the conflict, protecting people, restoring peace and eliminating the grounds that resulted in the development of these conditions in the first place.

  15. Project risk as identity threat: explaining the development and consequences of risk discourse in an infrastructure project

    NARCIS (Netherlands)

    van Os, A.; van Berkel, F.J.F.W.; de Gilder, T.C.; van Dyck, C.; Groenewegen, P.

    2015-01-01

    This paper explores the role of social identity threat in risk discourse in an infrastructure project, and the consequences risk discourse has for cooperation between stakeholders. We show that risks posed a threat to the identity of the project team, resulting in a discourse focused on attributing

  16. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  17. Responding to the Threat of Weapons of Mass Destruction After September 11, 2001

    National Research Council Canada - National Science Library

    Lewy, Donald

    2002-01-01

    This paper addresses the threat posed by weapons of mass destruction as it is understood following the events of 11 September 2001 and the anthrax attacks directed at congressional and media offices...

  18. Status of Environmental Management Initiatives to Accelerate the Reduction of Environmental Risks and Challenges Posed by the Legacy of the Cold War

    International Nuclear Information System (INIS)

    2009-01-01

    Fifty years of nuclear weapons production and energy research in the United States during the Cold War generated large amounts of radioactive wastes, spent nuclear fuel (SNF), excess plutonium and uranium, thousands of contaminated facilities, and contaminated soil and groundwater. During most of that half century, the Nation did not have the environmental regulatory structure or nuclear waste cleanup technologies that exist today. The result was a legacy of nuclear waste that was stored and disposed of in ways now considered unacceptable. Cleaning up and ultimately disposing of these wastes is the responsibility of the U.S. Department of Energy (DOE). In 1989, DOE established the Office of Environmental Management (EM) to solve the large scale and technically challenging risks posed by the world's largest nuclear cleanup. This required EM to build a new nuclear cleanup infrastructure, assemble and train a technically specialized workforce, and develop the technologies and tools required to safely decontaminate, disassemble, stabilize, disposition, and remediate unique radiation hazards. The sites where nuclear activities produced legacy waste and contamination include the original Manhattan Project sites--Los Alamos, New Mexico; Hanford, Washington; and Oak Ridge, Tennessee--as well as major Cold War sites, such as Savannah River Site, South Carolina; the Idaho National Laboratory, Idaho; Rocky Flats Plant, Colorado; and Fernald, Ohio. Today EM has responsibility for nuclear cleanup activities at 21 sites covering more than two million acres in 13 states, and employs more than 30,000 Federal and contractor employees, including scientists, engineers and hazardous waste technicians. This cleanup poses unique, technically complex problems, which must be solved under the most hazardous of conditions, and which will require billions of dollars a year for several more decades. The EM program focus during its first 10 years was on managing the most urgent risks and

  19. Status of Environmental Management Initiatives to Accelerate the Reduction of Environmental Risks and Challenges Posed by the Legacy of the Cold War

    Energy Technology Data Exchange (ETDEWEB)

    None

    2009-01-01

    Fifty years of nuclear weapons production and energy research in the United States during the Cold War generated large amounts of radioactive wastes, spent nuclear fuel (SNF), excess plutonium and uranium, thousands of contaminated facilities, and contaminated soil and groundwater. During most of that half century, the Nation did not have the environmental regulatory structure or nuclear waste cleanup technologies that exist today. The result was a legacy of nuclear waste that was stored and disposed of in ways now considered unacceptable. Cleaning up and ultimately disposing of these wastes is the responsibility of the U.S. Department of Energy (DOE). In 1989, DOE established the Office of Environmental Management (EM) to solve the large scale and technically challenging risks posed by the world's largest nuclear cleanup. This required EM to build a new nuclear cleanup infrastructure, assemble and train a technically specialized workforce, and develop the technologies and tools required to safely decontaminate, disassemble, stabilize, disposition, and remediate unique radiation hazards. The sites where nuclear activities produced legacy waste and contamination include the original Manhattan Project sites--Los Alamos, New Mexico; Hanford, Washington; and Oak Ridge, Tennessee--as well as major Cold War sites, such as Savannah River Site, South Carolina; the Idaho National Laboratory, Idaho; Rocky Flats Plant, Colorado; and Fernald, Ohio. Today EM has responsibility for nuclear cleanup activities at 21 sites covering more than two million acres in 13 states, and employs more than 30,000 Federal and contractor employees, including scientists, engineers and hazardous waste technicians. This cleanup poses unique, technically complex problems, which must be solved under the most hazardous of conditions, and which will require billions of dollars a year for several more decades. The EM program focus during its first 10 years was on managing the most urgent risks and

  20. Hantaviruses: an emerging public health threat in India? A review

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    is to increase awareness of these emerging pathogens and the threats they pose to the public health system. [Chandy S, Abraham P and ..... distribution of the hosts through international shipping routes. The majority of SEOV-related .... Dalrymple J M 1994 Serological relationships among viruses in the Hantavirus genus, ...

  1. Swazi Journalism and the 'Muslim Threat' | Rooney | Lwati: A ...

    African Journals Online (AJOL)

    ... Swaziland constitution; (ii) a report that Muslims were enticing university students to convert to Islam in return for scholarships; and (iii) a public symposium run on the subject of Islam. It concludes that Swazi newspapers frame Muslims as warlike people who are plotting against the kingdom and who pose a threat to Swazi ...

  2. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  3. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  4. Environmental surveillance at Los Alamos during 1987

    International Nuclear Information System (INIS)

    1988-05-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1987. Routine monitoring for radiation and radioactive or chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1987 cover: external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface and ground waters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are insignificant and do not pose a threat to the public, Laboratory employees, or the environment. 113 refs., 33 figs., 120 tabs

  5. Environmental surveillance at Los Alamos during 1989

    International Nuclear Information System (INIS)

    1990-12-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1989. Routine monitoring for radiation and radioactive or chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1989 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface and ground waters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment. 58 refs., 31 figs., 39 tabs

  6. Environmental surveillance at Los Alamos during 1987

    Energy Technology Data Exchange (ETDEWEB)

    1988-05-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1987. Routine monitoring for radiation and radioactive or chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1987 cover: external penetrating radiation; quantities of airborne emissions and liquid effluents; concentrations of chemicals and radionuclides in ambient air, surface and ground waters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are insignificant and do not pose a threat to the public, Laboratory employees, or the environment. 113 refs., 33 figs., 120 tabs.

  7. The market for environmental efficient technology; Markedet for miljoeeffektiv teknologi

    Energy Technology Data Exchange (ETDEWEB)

    Engbo Rasmussen, Peter; Madsen, Peter G. [COWI (Denmark)

    2006-08-31

    As part of governmental preparation of a Danish action plan for environmental efficient technology, COWI has made an analysis of the global market for technological solutions to important environmental challenges. The analysis focuses on technology for solving environmental challenges connected with climate changes, exploitation of water resources as well as pollution that poses a threat to health including air pollution and chemicals. The Analysis is based on reports made in Denmark, significant export countries, the European Union and different international organizations e.g. OECD and the International Energy Agency. This report presents results of the analysis. Due to the fact that the analysis was completed late in 2005 it is solely based on data and reports known at the time. (BA)

  8. Zika Virus: An Emerging Worldwide Threat

    OpenAIRE

    Irfan A. Rather; Jameel B. Lone; Vivek K. Bajpai; Woon K. Paek; Jeongheui Lim

    2017-01-01

    ZIKA virus (ZIKV) poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV) and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is bei...

  9. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    National Research Council Canada - National Science Library

    Shawhan, Karl

    2001-01-01

    .... Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased U.S. military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms...

  10. The globalization of public health, I: Threats and opportunities.

    Science.gov (United States)

    Yach, D; Bettcher, D

    1998-01-01

    The globalization of public health poses new threats to health but also holds important opportunities in the coming century. This commentary identifies the major threats and opportunities presented by the process of globalization and emphasizes the need for transnational public health approaches to take advantage of the positive aspects of global change and to minimize the negative ones. Transnational public health issues are areas of mutual concern for the foreign policies of all countries. These trends indicate a need for cross-national comparisons (e.g., in the areas of health financing and policy development) and for the development of a transnational research agenda in public health. PMID:9585736

  11. The Influence of Combat Experience on Psychologically Healthy Soldiers' Attentiveness to Environmental Threats.

    Science.gov (United States)

    Ranes, Bethany; Long, Chris P; Traynham, Stephanie; Hayes, Amanda

    2017-07-01

    In contrast to previous research that has primarily examined how psychological disorders (e.g., post-traumatic stress disorder [PTSD], anxiety) are affected by and affect individuals' threat perceptions, this study examines the relationship between combat experience and threat-monitoring in psychologically healthy Soldiers. Existing research has established how prolonged or intense experiences with war-related stressors can lead individuals to undergo an unconscious fear-conditioning process that affects the circuitry of the prefrontal cortex, hippocampus, amygdala, and anterior cingulate cortex regions of the brain. We predict that the intensity of one's combat experience positively influences Soldiers' attention to environmental threats. Participants included U. S. Army Soldiers with a score of 50 or below on the PTSD Checklist-Military Version. Participants completed the Combat Exposure Scale and the State-Trait Anxiety Inventory. The experimental prediction task we employed assesses the expectation of an intrusively loud white noise sound that occurred on three variable patterns in a pseudorandomized order. Each tone pattern was used 20 times over a total of 60 trials. The experimental prediction task included two neutral tones (700 and 1,300 Hz) that were presented in a repeated pattern along with a 100-dB burst of white noise (0.5-second duration). In each trial, one of three possible tone combinations was presented. To assess their attentiveness to threats, participants were asked to continuously rate their expectancy of the burst of white noise using a visual analogue scale (VAS) ranging from 0 to 100. VAS ratings were collected at controlled points throughout the task. None of the participants reported scores on any of the diagnostic surveys that met standards for clinical significance. A repeated-measures analysis of variance was conducted to assess the overall effect of the three prediction conditions on participants' VAS ratings. There was a significant

  12. Environmental surveillance and compliance at Los Alamos during 1996

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-09-01

    This report presents environmental data that characterize environmental performance and addresses compliance with environmental standards and requirements at Los Alamos National Laboratory (LANL or the Laboratory) during 1996. The Laboratory routinely monitors for radiation and for radioactive nonradioactive materials at Laboratory sites as well as in the surrounding region. LANL uses the monitoring results to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1996 to assess external penetrating radiation; quantities of airborne emissions; and concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, the municipal water supply, soils and sediments, and foodstuffs. Using comparisons with standards and regulations, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, Laboratory employees, or the environment. Laboratory operations were in compliance with all major environmental regulations.

  13. Environmental surveillance and compliance at Los Alamos during 1996

    International Nuclear Information System (INIS)

    1997-09-01

    This report presents environmental data that characterize environmental performance and addresses compliance with environmental standards and requirements at Los Alamos National Laboratory (LANL or the Laboratory) during 1996. The Laboratory routinely monitors for radiation and for radioactive nonradioactive materials at Laboratory sites as well as in the surrounding region. LANL uses the monitoring results to determine compliance with appropriate standards and to identify potentially undesirable trends. Data were collected in 1996 to assess external penetrating radiation; quantities of airborne emissions; and concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, the municipal water supply, soils and sediments, and foodstuffs. Using comparisons with standards and regulations, this report concludes that environmental effects from Laboratory operations are small and do not pose a demonstrable threat to the public, Laboratory employees, or the environment. Laboratory operations were in compliance with all major environmental regulations

  14. A study of insider threat in nuclear security analysis using game theoretic modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Yim, Man-Sung; Schneider, Erich

    2017-01-01

    Highlights: • Implications of an insider threat in nuclear security were quantitatively analyzed. • The analysis was based on of a hypothetical nuclear facility and using game theoretic approach. • Through a sensitivity analysis, vulnerable paths and important parameters were identified. • The methodology can be utilized to prioritize the implementation of PPS improvements in a facility. - Abstract: An Insider poses a greater threat to the security system of a nuclear power plant (NPP) because of their ability to take advantage of their access rights and knowledge of a facility, to bypass dedicated security measures. If an insider colludes with an external terrorist group, this poses a key threat to the safety-security interface. However, despite the importance of the insider threat, few studies have been conducted to quantitatively analyze an insider threat. This research examines the quantitative framework for investigating the implications of insider threat, taking a novel approach. Conventional tools assessing the security threats to nuclear facilities focus on a limited number of attack pathways. These are defined by the modeler and are based on simple probabilistic calculations. They do not capture the adversary’s intentions nor do they account for their response and adaptation to defensive investments. As an alternative way of performing physical protection analysis, this research explores the use of game theoretic modeling of Physical Protection Systems (PPS) analysis by incorporating the implications of an insider threat, to address the issues of intentionality and interactions. The game theoretic approach has the advantage of modeling an intelligent adversary and insider who has an intention to do harm and complete knowledge of the facility. Through a quantitative assessment and sensitivity analysis, vulnerable but important parameters in this model were identified. This made it possible to determine which insider threat is more important. The

  15. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  16. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  17. The effect of education on the knowledge of environmental threats on health in students of elementary schools in Bushehr port

    Directory of Open Access Journals (Sweden)

    Maryam Ravanipour

    2006-02-01

    Full Text Available Background: More than one fourth of diseases around the world are caused by environmental threats. These threats have multifactorial effects on children's health. So, it needs collaboration between teachers, parents, students, and public health authorities to decrease them and improve health. Methods: A total of 18 primary schools were selected using random cluster sampling. After a need assessment analysis about environmental threads, the 3rd and 4th degree students of selected primary schools were invited to draw posters about air pollution, water sanitation, food contamination, natural disaster, solid waste pollution, and sea and beach pollution. Then, a booklet based on the initial need assessment about environmental threads was designed and used for a six weeks educational course. The students drew a second poster after the educational course taught by their teachers. The posters were scored for technical aspects and health concepts by independent examiners. Results: The mean score of students' knowledge about environmental threads increased after intervention (P<0.05. There was no difference between 4th graders and 5th graders, but girls showed a higher score than boys. Conclusion: In primary schools, booklet-based education was effective in promotion of the students' knowledge about environmental threads on health. Therefore, a booklet-based education, designed according to local need assessments, is recommended as a complementary education in primary schools.

  18. Problem-Posing in Education: Transformation of the Practice of the Health Professional.

    Science.gov (United States)

    Casagrande, L. D. R.; Caron-Ruffino, M.; Rodrigues, R. A. P.; Vendrusculo, D. M. S.; Takayanagui, A. M. M.; Zago, M. M. F.; Mendes, M. D.

    1998-01-01

    Studied the use of a problem-posing model in health education. The model based on the ideas of Paulo Freire is presented. Four innovative experiences of teaching-learning in environmental and occupational health and patient education are reported. Notes that the problem-posing model has the capability to transform health-education practice.…

  19. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2011

    Energy Technology Data Exchange (ETDEWEB)

    none,

    2012-09-27

    The West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2011. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2011. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE’s effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations, and directives, evaluation of data collected in 2011 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  20. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2012

    Energy Technology Data Exchange (ETDEWEB)

    Rendall, John D. [CH2M HILL • B& amp; W West Valley, LLC (CHBWV); Steiner, Alison F. [URS Professional Solutions (URSPS); Klenk, David P. [CH2M HILL • B& amp; W West Valley, LLC (CHBWV)

    2013-09-19

    The West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2012. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2012. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE’s effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations, and directives, evaluation of data collected in 2012 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  1. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2010

    International Nuclear Information System (INIS)

    2011-01-01

    The West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2010. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2010. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE's effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations and directives, evaluation of data collected in 2010 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  2. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2013

    Energy Technology Data Exchange (ETDEWEB)

    Rendall, John D. [CH2MHILL • B& W West Valley, LLC (CHBWV); Steiner, Alison F. [CH2MHILL • B& W West Valley, LLC (CHBWV); Pendl, Michael P. [CH2MHILL • B& W West Valley, LLC (CHBWV)

    2014-09-16

    West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2013. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2013. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE’s effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations, and directives, evaluation of data collected in 2013 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  3. Problem Posing

    OpenAIRE

    Šilhavá, Marie

    2009-01-01

    This diploma thesis concentrates on problem posing from the students' point of view. Problem posing can be either seen as a teaching method which can be used in the class, or it can be used as a tool for researchers or teachers to assess the level of students' understanding of the topic. In my research, I compare three classes, one mathematics specialist class and two generalist classes, in their ability of problem posing. As an assessment tool it seemed that mathemathics specialists were abl...

  4. Climate change poses additional threat to the future of ash resources in the eastern United States

    Science.gov (United States)

    Anantha Prasad; Louis Iverson; Stephen Matthews; Matthew Peters

    2010-01-01

    It is becoming increasingly clear that climate change has the potential to alter the distribution of plant species all over the world. In the United States, ash (Fraxinus spp.) is encountering the double threat of short-term emerald ash borer (EAB) infestation, which could decimate ash throughout the country, and longer term perturbations due to...

  5. Environmental assessment for 881 Hillside (High Priority Sites) interim remedial action

    International Nuclear Information System (INIS)

    1990-01-01

    This Environmental Assessment evaluates the impact of an interim remedial action proposed for the High Priority Sites (881 Hillside Area) at the Rocky Flats Plant (RFP). This interim action is to be conducted to minimize the release of hazardous substances from the 881 Hillside Area that pose a potential long-term threat to public health and the environment. This document integrates current site characterization data and environmental analyses required by the Comprehensive Environmental Response, Compensation and Liability Act (CERCLA) or ''Superfund'' process, into an environmental assessment pursuant to the National Environmental Policy Act (NEPA). Characterization of the 881 Hillside Area is continuing. Consequently, a final remedial action has not yet been proposed. Environmental impacts associated with the proposed interim remedial action and reasonable alternatives designed to remove organic and inorganic contaminants, including radionuclides, from alluvial groundwater in the 881 Hillside Area are addressed. 24 refs., 5 figs., 23 tabs

  6. West Valley Demonstration Project Annual Site Environmental Report (ASER) Calendar Year (2016)

    Energy Technology Data Exchange (ETDEWEB)

    Steiner, Alison F. [CH2M Hill BWXT West Valley, LLC, NY (United States); Pendl, Michael P. [CH2M Hill BWXT West Valley, LLC, NY (United States); Steiner, II, Robert E. [CH2M Hill BWXT West Valley, LLC, NY (United States); Fox, James R. [CH2M Hill BWXT West Valley, LLC, NY (United States); Hoch, Jerald J. [CH2M Hill BWXT West Valley, LLC, NY (United States); Williams, Janice D. [CH2M Hill BWXT West Valley, LLC, NY (United States); Wrotniak, Chester M. [CH2M Hill BWXT West Valley, LLC, NY (United States); Werchowski, Rebecca L. [CH2M Hill BWXT West Valley, LLC, NY (United States)

    2017-09-12

    West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2016. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2016. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE’s effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations, and directives, evaluation of data collected in 2016 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  7. Enemies within: Christian Extremism, a Threat to the Homeland

    Science.gov (United States)

    2016-06-10

    promotes fear of Muslim radical groups that perpetuate violence in the name of religion , while ignoring the threat Christian extremism poses on...those within the homeland that threaten the very liberty and freedom intended by the founding fathers for all Americans. This thesis and many more...the safety and freedom of Americans are protected. 15. SUBJECT TERMS Christian Extremism 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF

  8. Lawrence Livermore National Laboratory environmental report for 1990

    Energy Technology Data Exchange (ETDEWEB)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Balke, B.K.; Steenhoven, J.C.; Schwoegler, D.R. (eds.)

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance for 1990. To evaluate the effect of LLNL operations on the local environment, measurements of direct radiation and a variety of radionuclides and chemical compounds in ambient air, soil, sewage effluent surface water, groundwater, vegetation, and foodstuff were made at both the Livermore site and at Site 300 nearly. LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment was evaluated. Aside from an August 13 observation of silver concentrations slightly above guidelines for discharges to the sanitary sewer, all the monitoring data demonstrated LLNL compliance with environmental laws and regulations governing emission and discharge of materials to the environment. In addition, the monitoring data demonstrated that the environmental impacts of LLNL are minimal and pose no threat to the public to or to the environment. 114 refs., 46 figs., 79 tabs.

  9. Lawrence Livermore National Laboratory environmental report for 1990

    International Nuclear Information System (INIS)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Balke, B.K.; Steenhoven, J.C.; Schwoegler, D.R.

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance for 1990. To evaluate the effect of LLNL operations on the local environment, measurements of direct radiation and a variety of radionuclides and chemical compounds in ambient air, soil, sewage effluent surface water, groundwater, vegetation, and foodstuff were made at both the Livermore site and at Site 300 nearly. LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment was evaluated. Aside from an August 13 observation of silver concentrations slightly above guidelines for discharges to the sanitary sewer, all the monitoring data demonstrated LLNL compliance with environmental laws and regulations governing emission and discharge of materials to the environment. In addition, the monitoring data demonstrated that the environmental impacts of LLNL are minimal and pose no threat to the public to or to the environment. 114 refs., 46 figs., 79 tabs

  10. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  11. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2009

    Energy Technology Data Exchange (ETDEWEB)

    West Valley Environmental Services LLC (WVES) and URS Corporation

    2010-09-17

    The West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2009. The report, prepared by the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2009. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE’s effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program by the DOE ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental regulations and directives, evaluation of data collected in 2009 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  12. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2010

    Energy Technology Data Exchange (ETDEWEB)

    None, None

    2011-09-28

    The West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2010. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2010. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE's effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations and directives, evaluation of data collected in 2010 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  13. West Valley Demonstration Project Annual Site Environmental Report Calendar Year 2009

    International Nuclear Information System (INIS)

    2010-01-01

    The West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2009. The report, prepared by the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2009. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE's effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program by the DOE ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental regulations and directives, evaluation of data collected in 2009 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  14. No Imminent Threat to Catholic Colleges' Freedom Seen in Vatican Ban on Teacher.

    Science.gov (United States)

    Ingalls, Zoe

    1986-01-01

    Observers say the Vatican's revocation of a prominent scholar's license to teach theology at the Catholic University of America poses no immediate threat to academic freedom at other Roman Catholic colleges and universities but could make theologians at those institutions hesitate to express opinions. (MSE)

  15. Initial perspectives on process threat management

    International Nuclear Information System (INIS)

    Whiteley, James R. Rob; Mannan, M. Sam

    2004-01-01

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this 'inside the gate' response as process threat management. The authors have initiated a joint industry/academia study to address: - the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and; - identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study

  16. How Do Environmental Issues Contribute to Regional Instability? and Which Regions Will Pose the Greatest Threat to U.S. Security as a Result of Environmental Degredation?

    National Research Council Canada - National Science Library

    Schantz, Blair

    1998-01-01

    .... The primary objective of this research is to determine and define how environmental issues contribute to regional political, economic or physical instability and then apply this definition to the regions of the world...

  17. West Valley Demonstration Project Annual Site Environmental Report (ASER) for Calendar Year 2015

    International Nuclear Information System (INIS)

    Rendall, John D.; Steiner, Alison F.; Pendl, Michael P.; Biedermann, Charles A.; Steiner II, Robert E.; Fox, James R.; Hoch, Jerald J.; Wrotniak, Chester M.; Werchowski, Rebecca L.

    2016-01-01

    West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2015. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2015. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE's effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations, and directives, evaluation of data collected in 2015 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  18. West Valley Demonstration Project Annual Site Environmental Report (ASER) for Calendar Year 2014

    Energy Technology Data Exchange (ETDEWEB)

    Rendall, John D. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Steiner, Alison F. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Pendl, Michael P. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Biedermann, Charles A. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Steiner, II, Robert E. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Fox, James R. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Hoch, Jerald J. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Werchowski, Rebecca L. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States)

    2015-09-15

    West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2014. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2014. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE’s effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations, and directives, evaluation of data collected in 2014 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  19. West Valley Demonstration Project Annual Site Environmental Report (ASER) for Calendar Year 2015

    Energy Technology Data Exchange (ETDEWEB)

    Rendall, John D. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Steiner, Alison F. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Pendl, Michael P. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Biedermann, Charles A. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Steiner, II, Robert E. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Fox, James R. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Hoch, Jerald J. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Wrotniak, Chester M. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States); Werchowski, Rebecca L. [CH2M HILL BWXT West Valley, LLC, West Valley, NY (United States)

    2016-09-15

    West Valley Demonstration Project (WVDP) Annual Site Environmental Report (ASER) for Calendar Year 2015. The report, prepared for the U.S. Department of Energy West Valley Demonstration Project office (DOE-WVDP), summarizes the environmental protection program at the WVDP for calendar year (CY) 2015. Monitoring and surveillance of the facilities used by the DOE are conducted to verify protection of public health and safety and the environment. The report is a key component of DOE’s effort to keep the public informed of environmental conditions at the WVDP. The quality assurance protocols applied to the environmental monitoring program ensure the validity and accuracy of the monitoring data. In addition to demonstrating compliance with environmental laws, regulations, and directives, evaluation of data collected in 2015 continued to indicate that WVDP activities pose no threat to public health or safety, or to the environment.

  20. Exotic mosquito threats require strategic surveillance and response planning.

    Science.gov (United States)

    Webb, Cameron E; Doggett, Stephen L

    2016-12-14

    Mosquito-borne diseases caused by endemic pathogens such as Ross River, Barmah Forest and Murray Valley encephalitis viruses are an annual concern in New South Wales (NSW), Australia. More than a dozen mosquito species have been implicated in the transmission of these pathogens, with each mosquito occupying a specialised ecological niche that influences their habitat associations, host feeding preferences and the environmental drivers of their abundance. The NSW Arbovirus Surveillance and Mosquito Monitoring Program provides an early warning system for potential outbreaks of mosquito-borne disease by tracking annual activity of these mosquitoes and their associated pathogens. Although the program will effectively track changes in local mosquito populations that may increase with a changing climate, urbanisation and wetland rehabilitation, it will be less effective with current surveillance methodologies at detecting or monitoring changes in exotic mosquito threats, where different surveillance strategies need to be used. Exotic container-inhabiting mosquitoes such as Aedes aegypti and Ae. albopictus pose a threat to NSW because they are nuisance-biting pests and vectors of pathogens such as dengue, chikungunya and Zika viruses. International movement of humans and their belongings have spread these mosquitoes to many regions of the world. In recent years, these two mosquitoes have been detected by the Australian Government Department of Agriculture and Water Resources at local airports and seaports. To target the detection of these exotic mosquitoes, new trapping technologies and networks of surveillance locations are required. Additionally, incursions of these mosquitoes into urban areas of the state will require strategic responses to minimise substantial public health and economic burdens to local communities.

  1. Environmental consequences of nuclear war

    Energy Technology Data Exchange (ETDEWEB)

    Toon, Owen B. [Department of Atmospheric and Oceanic Sciences, Laboratory for Atmospheric and Space Physics, University of Colorado, Boulder, Colorado (United States); Robock, Alan [Department of Environmental Sciences, Rutgers University, New Brunswick, New Jersey (United States); Turco, Richard P. [Department of Atmospheric and Oceanic Sciences, University of California, Los Angeles, Los Angeles, California (United States)

    2014-05-09

    A regional war involving 100 Hiroshima-sized weapons would pose a worldwide threat due to ozone destruction and climate change. A superpower confrontation with a few thousand weapons would be catastrophic.

  2. Yoga Poses Increase Subjective Energy and State Self-Esteem in Comparison to 'Power Poses'.

    Science.gov (United States)

    Golec de Zavala, Agnieszka; Lantos, Dorottya; Bowden, Deborah

    2017-01-01

    Research on beneficial consequences of yoga focuses on the effects of yogic breathing and meditation. Less is known about the psychological effects of performing yoga postures. The present study investigated the effects of yoga poses on subjective sense of energy and self-esteem. The effects of yoga postures were compared to the effects of 'power poses,' which arguably increase the sense of power and self-confidence due to their association with interpersonal dominance (Carney et al., 2010). The study tested the novel prediction that yoga poses, which are not associated with interpersonal dominance but increase bodily energy, would increase the subjective feeling of energy and therefore increase self-esteem compared to 'high power' and 'low power' poses. A two factorial, between participants design was employed. Participants performed either two standing yoga poses with open front of the body ( n = 19), two standing yoga poses with covered front of the body ( n = 22), two expansive, high power poses ( n = 21), or two constrictive, low power poses ( n = 20) for 1-min each. The results showed that yoga poses in comparison to 'power poses' increased self-esteem. This effect was mediated by an increased subjective sense of energy and was observed when baseline trait self-esteem was controlled for. These results suggest that the effects of performing open, expansive body postures may be driven by processes other than the poses' association with interpersonal power and dominance. This study demonstrates that positive effects of yoga practice can occur after performing yoga poses for only 2 min.

  3. The Four Dimensions of the Foreign Fighter Threat : Making Sense of an Evolving Phenomenon

    NARCIS (Netherlands)

    Reed, A.G., Pohl, J. and M. Jegerings.

    2017-01-01

    In light of Islamic State’s decreasing military power and growing emphasis on a decentralised operational strategy, the threat posed by foreign fighters is shifting, with some aspects becoming less threatening as others become more salient. This Policy Brief provides a concise outline of four main

  4. Political instability and the ability of local government to respond to reputational threats in unison

    DEFF Research Database (Denmark)

    Grøn, Caroline Louise Howard; Salomonsen, Heidi Houlberg

    2017-01-01

    This article investigates whether local governments are able to act in a unified manner when responding to reputational threats posed by negative media coverage. Based on an argument that local governments facing political instability are less able to perform in unison, the article investigates a...

  5. Boneless Pose Editing and Animation

    DEFF Research Database (Denmark)

    Bærentzen, Jakob Andreas; Hansen, Kristian Evers; Erleben, Kenny

    2007-01-01

    In this paper, we propose a pose editing and animation method for triangulated surfaces based on a user controlled partitioning of the model into deformable parts and rigid parts which are denoted handles. In our pose editing system, the user can sculpt a set of poses simply by transforming...... the handles for each pose. Using Laplacian editing, the deformable parts are deformed to match the handles. In our animation system the user can constrain one or several handles in order to define a new pose. New poses are interpolated from the examples poses, by solving a small non-linear optimization...... problem in order to obtain the interpolation weights. While the system can be used simply for building poses, it is also an animation system. The user can specify a path for a given constraint and the model is animated correspondingly....

  6. Threats to the Internal Validity of Experimental and Quasi-Experimental Research in Healthcare.

    Science.gov (United States)

    Flannelly, Kevin J; Flannelly, Laura T; Jankowski, Katherine R B

    2018-01-24

    The article defines, describes, and discusses the seven threats to the internal validity of experiments discussed by Donald T. Campbell in his classic 1957 article: history, maturation, testing, instrument decay, statistical regression, selection, and mortality. These concepts are said to be threats to the internal validity of experiments because they pose alternate explanations for the apparent causal relationship between the independent variable and dependent variable of an experiment if they are not adequately controlled. A series of simple diagrams illustrate three pre-experimental designs and three true experimental designs discussed by Campbell in 1957 and several quasi-experimental designs described in his book written with Julian C. Stanley in 1966. The current article explains why each design controls for or fails to control for these seven threats to internal validity.

  7. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    Science.gov (United States)

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

  8. Environmental Pollution: An Under-recognized Threat to Children's Health, Especially in Low- and Middle-Income Countries.

    Science.gov (United States)

    Suk, William A; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R; Sly, Leith; Sly, Peter D; Stein, Renato T; van den Berg, Martin; Zar, Heather; Landrigan, Philip J

    2016-03-01

    Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children's health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease.

  9. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  10. Subsurface Interim Measures/Interim Remedial Action Plan/ Environmental Assessment and Decision Document, Operable Unit No. 2

    International Nuclear Information System (INIS)

    1992-01-01

    The subject Interim Measures/Interim Remedial Action plan/Environmental Assessment (IM/IRAP/EA) addresses residual free-phase volatile organic compound (VOC) contamination suspected in the subsurface within an area identified as Operable Unit No. 2 (OU2). This IM/IRAP/EA also addresses radionuclide contamination beneath the 903 Pad at OU2. Although subsurface VOC and radionuclide contamination on represent a source of OU2 ground-water contamination, they pose no immediate threat to public health or the environment. This volume contains five appendices

  11. Hot Under the Collar: Lessons from the 2003 Heatwave in France and the Security Implications for Coping with Environmental Threats in the EU

    Directory of Open Access Journals (Sweden)

    Paul J. Stephenson

    2009-08-01

    Full Text Available In the sweltering temperatures of August 2003 there were over 15,000 fatalities in France, the majority among the elderly. The heatwave (canicule was the greatest natural catastrophe in Europe for 50 years. Political mismanagement contributed to the death toll and government initially to blame medical services. However, other politico-cultural, societal and psychological factors may have contributed to the failure to protect the most vulnerable citizens. This article identifies 20 obstacles (“pathogens” to ensuring effective response in the face of environmental or weather-related threats, distinguishing between state-institutional and individual-community barriers, most of which have a cultural dimension. These factors require greater consideration by policy-makers to improve preparedness for environmental threats in the EU. The case raises questions about crisis management and how best to reduce risk for elderly populations, illustrating the limits of the state in offering social protection through institutionalised solidarity mechanisms, and recognises calls to strengthen community-capacity.

  12. The Urban Crisis in Sub-Saharan Africa: A Threat to Human Security and Sustainable Development

    Directory of Open Access Journals (Sweden)

    Mediel Hove

    2013-03-01

    Full Text Available Urban centres have existed and have been evolving for many centuries across the world. However, the accelerated growth of urbanisation is a relatively recent phenomenon. The enormous size of urban populations and more significantly, the rapidity with which urban areas have been and are growing in many developing countries have severe social, economic and physical repercussions. This paper argues that the accelerated growth of urbanisation has amplified the demand for key services. However, the provision of shelter and basic services such as water and sanitation, education, public health, employment and transport has not kept pace with this increasing demand. Furthermore, accelerated and poorly managed urbanisation has resulted in various types of atmospheric, land and water pollution thereby jeopardising human security. This paper offers the conclusion that the increased environmental, social and economic problems associated with rapid urbanisation pose a threat to sustainable development, human security and, crucially, peace.

  13. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  14. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  15. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  16. Gender-Atypical Mental Illness as Male Gender Threat.

    Science.gov (United States)

    Michniewicz, Kenneth S; Bosson, Jennifer K; Lenes, Joshua G; Chen, Jason I

    2016-07-01

    The present study examined whether men view gender-atypical (i.e., feminine) psychological disorders as threats to their gender status. Men and women (N = 355) rated their expectations of gender status loss, feelings of distress, and help-seeking intentions in response to 10 different stereotypically masculine and feminine psychological disorders. Men as compared to women expected greater gender status loss for, and reported more distress to, gender-atypical versus gender-typical disorders. Expectations of gender status loss partially mediated the link between participant gender and distress at the thought of gender-atypical disorders. These findings suggest that feminine disorders pose more powerful gender status threats for men than masculine disorders do and that men's expectations of gender status loss for feminine disorders drive their negative reactions to these mental illnesses. The discussion emphasizes the importance of considering the gender-typicality of disorders, and the implications of these findings for clinical interventions. © The Author(s) 2015.

  17. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  18. Environmental issues in cities and mega cities

    International Nuclear Information System (INIS)

    Ahmad, M.

    2005-01-01

    Environmental deterioration is one of the major issues of today's world. It not only poses serious threats to human life, health and property at local level but also presents big challenges for the sustain ability of global environment The developing countries like Pakistan are facing much bigger problems due to their rapid urbanization and lack of resources to meet the increasing demands of urban areas. Although, the problems have global dimensions, their solution lies at the local level. This paper presents an overview of the environmental issues with special reference to Pakistan and identifies the role of various stakes holders including the national, provincial and local governments, industrial and trade community, NGO's and citizens for rehabilitation and improvement of the environment. The combination of a large population and poor resource environment means that judicious means of energy use and minimum waste systems of production as well as lifestyles must be employed for sustainable development.(author)

  19. Turkey's response to threats of weapons of mass destruction

    OpenAIRE

    Al, Guray.

    2001-01-01

    Unlike most of its NATO allies, Turkey did not emerge from the Cold War with enhanced security. The acquisition of weapons of mass destruction (WMD) and ballistic missiles by its neighbors in the Middle Eastâ Iran, Iraq and Syriaâ creates a serious security concern for Turkey. This thesis analyzes the numerous threats posed to Turkey by its neighborsα nuclear, chemical and biological weapons programs and their ballistic missiles. It evaluates Turkeyαs defense options to counter these thre...

  20. The art of problem posing

    CERN Document Server

    Brown, Stephen I

    1990-01-01

    Updated and expanded, this second edition satisfies the same philosophical objective as the first -- to show the importance of problem posing. Although interest in mathematical problem solving increased during the past decade, problem posing remained relatively ignored. The Art of Problem Posing draws attention to this equally important act and is the innovator in the field. Special features include: * an exploration ofthe logical relationship between problem posing and problem solving * a special chapter devoted to teaching problem posing as a separate course * sketches, drawings, diagrams, and cartoons that illustrate the schemes proposed * a special section on writing in mathematics.

  1. Cosmetic Ingredients as Emerging Pollutants of Environmental and Health Concern. A Mini-Review

    Directory of Open Access Journals (Sweden)

    Claudia Juliano

    2017-04-01

    Full Text Available Cosmetic and personal care products are used in huge quantities throughout the world; as a result of their regular use, they are continuously released into the environment in very large amounts. Many of these products are biologically active and are characterized by persistence and bioaccumulation potential, posing a threat to ecosystem and human health. On the basis of the most recent scientific literature available on this subject, this paper provides an overview of some cosmetic ingredients that are considered environmental emerging pollutants of particular concern such as UV filters, some preservatives (parabens, triclosan, and microplastics.

  2. Challenges Posed by Novel Psychoactive Substances – Middle East Perspective

    Directory of Open Access Journals (Sweden)

    Maciej J. Bogusz

    2017-04-01

    Full Text Available New psychoactive substances (NPS are defined as substances of abuse, either in a pure form or a preparation, that are not controlled by the 1961 Single Convention on Narcotic Drugs or the 1971 Convention on Psychotropic Substances, but which may pose a public health threat. In this context, the term “new” does not necessarily refer to new inventions but to substances that have recently become available or popular in a given society or country. This definition indicates that the problem of NPS is not new; however, the availability of any information via new communication technologies in the 21st century has enabled the spread of unwanted and socially harmful information, like information on the commercial availability of various NPS, offered in rising amounts and brands.

  3. Environmental risks and future generations: Criteria for public policy

    Energy Technology Data Exchange (ETDEWEB)

    Howarth, R.B.

    1992-10-01

    This paper examines alternative normative approaches to the policy challenges posed by long-term environmental problems such as toxic and radioactive waste disposal, stratospheric ozone depletion, and climate change. The paper argues that cost-benefit analysis is limited in its ability to handle the issues of intergenerational equity and uncertainty that are intrinsic to such problems. Also considered is the precautionary principle, which holds that policies should seek to reduce threats to the welfare of future generations if the costs of doing so would not significantly reduce the subjective well-being of existing persons. Although the precautionary principle depends on an explicit value judgement, it yields a policy criterion that is operationally decisive under a wide array of circumstances.

  4. Environmental Pollution: An Under-recognized Threat to Children’s Health, Especially in Low- and Middle-Income Countries

    Science.gov (United States)

    Suk, William A.; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O.; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R.; Sly, Leith; Sly, Peter D.; Stein, Renato T.; van den Berg, Martin; Zar, Heather; Landrigan, Philip J.

    2016-01-01

    Summary Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children’s health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease. PMID:26930243

  5. Scenario-targeted toxicity assessment through multiple endpoint bioassays in a soil posing unacceptable environmental risk according to regulatory screening values.

    Science.gov (United States)

    Rodriguez-Ruiz, A; Etxebarria, J; Boatti, L; Marigómez, I

    2015-09-01

    Lanestosa is a chronically polluted site (derelict mine) where the soil (Lanestosa (LA) soil) exceeds screening values (SVs) of regulatory policies in force (Basque Country; Europe) for Zn, Pb and Cd. A scenario-targeted toxicity assessment was carried out on the basis of a multi-endpoint bioassay approach. Acute and chronic toxicity bioassays were conducted with selected test species (Vibrio fischeri, Dictyostelium discoideum, Lactuca sativa, Raphanus sativus and Eisenia fetida) in combination with chemical analysis of soils and elutriates and with bioaccumulation studies in earthworms. Besides, the toxicity profile was compared with that of the mine runoff (RO) soil and of a fresh artificially polluted soil (LAAPS) resembling LA soil pollutant profile. Extractability studies in LA soil revealed that Pb, Zn and Cd were highly available for exchange and/or release into the environment. Indeed, Pb and Zn were accumulated in earthworms and LA soil resulted to be toxic. Soil respiration, V. fischeri, vegetative and developmental cycles of D. discoideum and survival and juvenile production of E. fetida were severely affected. These results confirmed that LA soil had unacceptable environmental risk and demanded intervention. In contrast, although Pb and Zn concentrations in RO soil revealed also unacceptable risk, both metal extractability and toxicity were much lower than in LA soil. Thus, within the polluted site, the need for intervention varied between areas that posed dissimilar risk. Besides, since LAAPS, with a high exchangeable metal fraction, was the most toxic, ageing under in situ natural conditions seemingly contributed to attenuate LA soil risk. As a whole, combining multi-endpoint bioassays with scenario-targeted analysis (including leaching and ageing) provides reliable risk assessment in soils posing unacceptable environmental risk according to SVs, which is useful to optimise the required intervention measures.

  6. Perceptions of Threats to Physical Safety, Sexual Autonomy, Values, and of Discrimination Drive LGB Prejudices Toward Heterosexuals.

    Science.gov (United States)

    Pirlott, Angela G; Rusten, Marta L; Butterfuss, Reese M

    2016-09-01

    Many studies have investigated heterosexuals' prejudices toward nonheterosexuals, yet LGB's prejudices toward heterosexuals remain largely unexplored. Therefore, we sought to determine the threats and opportunities (i.e., affordances) LGB perceive heterosexuals to pose and whether those affordances explain their sexual prejudices toward heterosexuals. Study 1 analyzed LGB's reasons for liking and disliking heterosexuals, which determined whether the threats predicted to be salient for LGB mirrored the affordances they generated. Study 2 measured these perceived affordances and examined the extent to which they drove LGB's prejudices toward heterosexuals. Generally, perceptions of discrimination and unreciprocated sexual interest threats drove anger, physical safety and sexual autonomy threats drove fear, and values threats drove moral disgust toward heterosexuals, although results varied slightly by perceiver and target groups. Goals to alleviate the tensions between heterosexuals and LGB require an understanding of the dynamics between these groups. This research provides preliminary insights into understanding those dynamics. © 2016 by the Society for Personality and Social Psychology, Inc.

  7. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  8. Site environmental report for calendar year 1992

    International Nuclear Information System (INIS)

    Naidu, J.R.; Royce, B.A.; Miltenberger, R.P.

    1993-05-01

    This report documents the results of the Environmental Monitoring Program at BNL and presents summary information about environmental compliance for 1992. To evaluate the effect of BNL operations on the local environment, measurements of direct radiation, and a variety of radionuclides and chemical compounds in ambient air, soil, sewage effluent, surface water, ground water and vegetation were made at the BNL site and at sites adjacent to the Laboratory. Brookhaven National Laboratory's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment were evaluated. Among the permitted facilities, only the discharge from the Sewage Treatment Plant (STP) to the Peconic River exceeded, on occasion only, the fecal and total coliform concentration limits at the discharge point. This was later attributed to off-site Contractor Laboratory quality assurance problems. The environmental monitoring data has continued to demonstrate, besides the site specific contamination of ground water and soil resulting from past operations, that compliance was achieved with environmental laws and regulations governing emission and discharge of materials to the environment, and that the environmental impacts at BNL are minimal and pose no threat to the public or to the environment. This report meets the requirements of DOE Orders 5484.1, Environmental Protection, Safety, and Health Protection Information reporting requirements and 5400.1, General Environmental Protection Programs

  9. Meeting the challenge of interacting threats in freshwater ecosystems: A call to scientists and managers

    Directory of Open Access Journals (Sweden)

    Laura S. Craig

    2017-12-01

    Full Text Available Human activities create threats that have consequences for freshwater ecosystems and, in most watersheds, observed ecological responses are the result of complex interactions among multiple threats and their associated ecological alterations. Here we discuss the value of considering multiple threats in research and management, offer suggestions for filling knowledge gaps, and provide guidance for addressing the urgent management challenges posed by multiple threats in freshwater ecosystems. There is a growing literature assessing responses to multiple alterations, and we build off this background to identify three areas that require greater attention: linking observed alterations to threats, understanding when and where threats overlap, and choosing metrics that best quantify the effects of multiple threats. Advancing science in these areas will help us understand existing ecosystem conditions and predict future risk from multiple threats. Because addressing the complex issues and novel ecosystems that arise from the interaction of multiple threats in freshwater ecosystems represents a significant management challenge, and the risks of management failure include loss of biodiversity, ecological goods, and ecosystem services, we also identify actions that could improve decision-making and management outcomes. These actions include drawing insights from management of individual threats, using threat attributes (e.g., causes and spatio-temporal dynamics to identify suitable management approaches, testing management strategies that are likely to be successful despite uncertainties about the nature of interactions among threats, avoiding unintended consequences, and maximizing conservation benefits. We also acknowledge the broadly applicable challenges of decision-making within a socio-political and economic framework, and suggest that multidisciplinary teams will be needed to innovate solutions to meet the current and future challenge of interacting

  10. Meeting the challenge of interacting threats in freshwater ecosystems: A call to scientists and managers

    Science.gov (United States)

    Craig, Laura S.; Olden, Julian D.; Arthington, Angela; Entrekin, Sally; Hawkins, Charles P.; Kelly, John J.; Kennedy, Theodore A.; Maitland, Bryan M.; Rosi, Emma J.; Roy, Allison; Strayer, David L.; Tank, Jennifer L.; West, Amie O.; Wooten, Matthew S.

    2017-01-01

    Human activities create threats that have consequences for freshwater ecosystems and, in most watersheds, observed ecological responses are the result of complex interactions among multiple threats and their associated ecological alterations. Here we discuss the value of considering multiple threats in research and management, offer suggestions for filling knowledge gaps, and provide guidance for addressing the urgent management challenges posed by multiple threats in freshwater ecosystems. There is a growing literature assessing responses to multiple alterations, and we build off this background to identify three areas that require greater attention: linking observed alterations to threats, understanding when and where threats overlap, and choosing metrics that best quantify the effects of multiple threats. Advancing science in these areas will help us understand existing ecosystem conditions and predict future risk from multiple threats. Because addressing the complex issues and novel ecosystems that arise from the interaction of multiple threats in freshwater ecosystems represents a significant management challenge, and the risks of management failure include loss of biodiversity, ecological goods, and ecosystem services, we also identify actions that could improve decision-making and management outcomes. These actions include drawing insights from management of individual threats, using threat attributes (e.g., causes and spatio-temporal dynamics) to identify suitable management approaches, testing management strategies that are likely to be successful despite uncertainties about the nature of interactions among threats, avoiding unintended consequences, and maximizing conservation benefits. We also acknowledge the broadly applicable challenges of decision-making within a socio-political and economic framework, and suggest that multidisciplinary teams will be needed to innovate solutions to meet the current and future challenge of interacting threats in

  11. Water management in the framework of environmental management systems in Bulgarian seaports

    Science.gov (United States)

    Quynh, Le Xuan; Hens, Luc; Stoyanov, Stoyan

    Seaports or harbours are major hub of economic activities, connecting sea routes with the hinterland via rail, road and inland waterway. At the same time, they are hubs of environmental issues, resulting from its diversified operations involving vessels, machines, vehicles and industries. The Black Sea Commission in 2007 pointed out that water pollution at the ports around Black Sea, including the ports of Bourgas and Varna, poses a great threat to the overall water quality of the Black Sea and the quality of the Mediterranean Sea. The two ports, and their facilities, are the black spots of pollution that need immediate intervention to safeguard the Black Sea. The first steps of an environmental management system were implemented at both ports. Environmental protection objectives are identified and initial actions are being implemented. However, assessment of the environmental performance of both ports based on concrete indicators was not done. Further efforts are needed to advance the environmental management system to contribute more to the protection of the Mediterranean and Black Sea region.

  12. Pose Space Surface Manipulation

    Directory of Open Access Journals (Sweden)

    Yusuke Yoshiyasu

    2012-01-01

    Full Text Available Example-based mesh deformation techniques produce natural and realistic shapes by learning the space of deformations from examples. However, skeleton-based methods cannot manipulate a global mesh structure naturally, whereas the mesh-based approaches based on a translational control do not allow the user to edit a local mesh structure intuitively. This paper presents an example-driven mesh editing framework that achieves both global and local pose manipulations. The proposed system is built with a surface deformation method based on a two-step linear optimization technique and achieves direct manipulations of a model surface using translational and rotational controls. With the translational control, the user can create a model in natural poses easily. The rotational control can adjust the local pose intuitively by bending and twisting. We encode example deformations with a rotation-invariant mesh representation which handles large rotations in examples. To incorporate example deformations, we infer a pose from the handle translations/rotations and perform pose space interpolation, thereby avoiding involved nonlinear optimization. With the two-step linear approach combined with the proposed multiresolution deformation method, we can edit models at interactive rates without losing important deformation effects such as muscle bulging.

  13. Harnessing cyber-infrastructure for local scale climate change research in Africa

    CSIR Research Space (South Africa)

    Vahed, A

    2012-05-01

    Full Text Available Climate change poses a major threat to environmental sustainability. Africa in particular, is vulnerable with projected worsening food security, increased threats to public health, increased stress on surface water resources and a general increase...

  14. Rising environmental cadmium levels in developing countries ...

    African Journals Online (AJOL)

    olayemitoyin

    metabolic antagonist to Zinc (Zn), an important micronutrient involved in numerous molecular activities. ... widely acknowledged, the occult threat it poses to genome stability largely through ... zinc well recognized for its role in DNA repair.

  15. Transactional costs of the interaction between business and government as a threat to the economic security of the state

    Directory of Open Access Journals (Sweden)

    Evmenov Aleksandr

    2018-01-01

    Full Text Available The article considers the costs of the interaction between the state and business as a threat to the development of the economy of the Russian Federation from the point of view of ensuring economic security. The authors identified significant obstacles both from the business and from the government side, which pose a threat to economic security. The study is of interest for the further development of a system of providing the economic security of the Russian Federation.

  16. Statistical Model-Based Face Pose Estimation

    Institute of Scientific and Technical Information of China (English)

    GE Xinliang; YANG Jie; LI Feng; WANG Huahua

    2007-01-01

    A robust face pose estimation approach is proposed by using face shape statistical model approach and pose parameters are represented by trigonometric functions. The face shape statistical model is firstly built by analyzing the face shapes from different people under varying poses. The shape alignment is vital in the process of building the statistical model. Then, six trigonometric functions are employed to represent the face pose parameters. Lastly, the mapping function is constructed between face image and face pose by linearly relating different parameters. The proposed approach is able to estimate different face poses using a few face training samples. Experimental results are provided to demonstrate its efficiency and accuracy.

  17. Reducing the global threat of radiological terrorism in Central Asia and Caucus regions. The global threat reduction initiative approach to radioactive source security

    International Nuclear Information System (INIS)

    Smith, E.

    2010-01-01

    The security of radioactive sources is of worldwide concern, due to their wide use in civilian commerce and the potentially devastating effects of their misuse. In cooperation with host countries and international partners, the Global Threat Reduction Initiative has utilized a proven process for providing technical and financial assistance to protect radioactive sources in diverse uses and unique circumstances at hundreds of sites worldwide. The mission of the Department of Energy, National Nuclear Security Administration's program includes reducing the risk posed by vulnerable radiological materials that could be used in a Radioactive Dispersal Device). The program's objectives are to identify, consolidate, secure, and/or dispose of high-activity radiological materials to prevent their theft and malicious use. The Global Threat Reduction Initiative Program's scope is global, with projects in over 100 countries at more than 755 radiological sites, including industrial, medical and commercial facilities. In addition to working bilaterally, the Program works closely with the International Atomic Energy Agency (IAEA) and other partner countries. (author)

  18. Jihadist Foreign Fighter Phenomenon in Western Europe: A Low-Probability, High-Impact Threat

    Directory of Open Access Journals (Sweden)

    Edwin Bakker

    2015-11-01

    Full Text Available The phenomenon of foreign fighters in Syria and Iraq is making headlines. Their involvement in the atrocities committed by terrorist groups such as the so-called “Islamic State” and Jabhat al-Nusra have caused grave concern and public outcry in the foreign fighters’ European countries of origin. While much has been written about these foreign fighters and the possible threat they pose, the impact of this phenomenon on Western European societies has yet to be documented. This Research Paper explores four particular areas where this impact is most visible: a violent incidents associated with (returned foreign fighters, b official and political responses linked to these incidents, c public opinion, and d anti-Islam reactions linked to these incidents. The authors conclude that the phenomenon of jihadist foreign fighters in European societies should be primarily regarded as a social and political threat, not a physical one. They consider the phenomenon of European jihadist foreign fighters a “low-probability, high-impact” threat.

  19. An In-Air Passive Acoustic Surveillance System for Urban Threats Detection and Classification

    NARCIS (Netherlands)

    Donisi, D.; Bonamente, M.; Capitanelli, A.; Radziulis, J.; Dąbrowski, R.; Hołubowicz, W.; Simon, G.; Perlepes, L.; Mylonas, G.; Chatzigiannakis, I.; Benders, F.P.A.; Beerens, S.P.

    2013-01-01

    Recent military operations in urban environments are changing the requirements imposed on sensing technologies. The final goal remains threat mapping within the area of operation, but the environmental constraints and the intrinsic nature of urban threats are radically novel. AUDIS (Acoustic Urban

  20. Defending against the Advanced Persistent Threat: An Optimal Control Approach

    Directory of Open Access Journals (Sweden)

    Pengdeng Li

    2018-01-01

    Full Text Available The new cyberattack pattern of advanced persistent threat (APT has posed a serious threat to modern society. This paper addresses the APT defense problem, that is, the problem of how to effectively defend against an APT campaign. Based on a novel APT attack-defense model, the effectiveness of an APT defense strategy is quantified. Thereby, the APT defense problem is modeled as an optimal control problem, in which an optimal control stands for a most effective APT defense strategy. The existence of an optimal control is proved, and an optimality system is derived. Consequently, an optimal control can be figured out by solving the optimality system. Some examples of the optimal control are given. Finally, the influence of some factors on the effectiveness of an optimal control is examined through computer experiments. These findings help organizations to work out policies of defending against APTs.

  1. Strategic management of health risks posed by buried transuranic wastes

    International Nuclear Information System (INIS)

    Jump, R.A.

    1994-01-01

    A strategy is presented for reducing health risks at sites contaminated with buried transuranic (TRU) wastes by first taking measures to immobilize the contaminants until the second step, final action, becomes cost-effective and poses less risk to the remediation workers. The first step of this strategy does not preclude further action if it is warranted and is in harmony with environmental laws and regulations

  2. Environmental and radiological remediation under Canada's global partnership program 2004-11 - 59185

    International Nuclear Information System (INIS)

    Washer, Michael J.

    2012-01-01

    Following the '911' attack on the USA in 2001 the international community under Canada's G8 leadership established a $20 billion Global Partnership initiative in 2002 to collaboratively address threats to global security posed by the proliferation and potential terrorist use of Weapons and Materials of Mass Destruction (WMMD) and related materials and knowledge. This major international initiative addressed four priority areas: (1) Chemical Weapon Destruction (2) Nuclear powered submarine eliminations (3) Nuclear and radiological security; and (4) Employment for former weapon scientists. Additionally the initiative has addressed Biological Non- Proliferation. Canada's execution of all these program areas has resulted in substantial environmental benefits aside from the eradication and securing of WMMD. This paper reviews the environmental and radiological remediation achievements of the four primary Global Partnership program areas addressed under Canadian funding 2004 through 2011. (author)

  3. Toxic industrial chemicals (TICs) as asymmetric weapons: the design basis threat

    International Nuclear Information System (INIS)

    Skinner, L.

    2009-01-01

    Asymmetric warfare concepts relate well to the use of improvised chemical weapons against urban targets. Sources of information on toxic industrial chemicals (TICs) and lists of high threat chemicals are available that point to likely choices for an attack. Accident investigations can be used as a template for attacks, and to judge the possible effectiveness of an attack using TICs. The results of a chlorine rail car accident in South Carolina, USA and the Russian military assault on a Moscow theater provide many illustrative points for similar incidents that mighty be carried out deliberately. Computer modeling of outdoor releases shows how an attack might take into consideration issues of stand-off distance and dilution. Finally, the preceding may be used to estimate with some accuracy the design basis threat posed by the used of TICs as weapons.(author)

  4. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies

    Science.gov (United States)

    Mackey, Tim K.; Nayyar, Gaurvika

    2016-01-01

    Background Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. Sources of data A review was conducted of the English literature with search terms ‘online pharmacies’, ‘Internet pharmacies’, ‘cyber pharmacies’, ‘rogue pharmacies’, and ‘e-pharmacies’ using PubMed, JSTOR, and Google Scholar from 1999–2005. Areas of agreement Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Areas of controversy Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Growing points Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. Areas timely for developing research There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. PMID:27151957

  5. Digital danger: a review of the global public health, patient safety and cybersecurity threats posed by illicit online pharmacies.

    Science.gov (United States)

    Mackey, Tim K; Nayyar, Gaurvika

    2016-06-01

    Amidst the rise of e-commerce, there has been a proliferation of illicit online pharmacies that threaten global patient safety by selling drugs without a prescription directly to the consumer. Despite this clear threat, little is known about the key risk characteristics, central challenges and current legal, regulatory and law enforcement responses. A review was conducted of the English literature with search terms 'online pharmacies', 'Internet pharmacies', 'cyber pharmacies', 'rogue pharmacies', and 'e-pharmacies' using PubMed, JSTOR, and Google Scholar from 1999-2005. Illicit online pharmacies are a rapidly growing public health threat and are characterized by a number of complex and interrelated risk factors. Solutions are varied and are of questionable utility in the face of evolving technology that enables this form of transnational cybercrime. Legal, regulatory and technology solutions must address the entire illicit online pharmacy ecosystem in order to be effective. There is a critical need to build international consensus, conduct additional research and develop technology to combat illicit online pharmacies. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  6. Explaining opposition to refugee resettlement: The role of NIMBYism and perceived threats.

    Science.gov (United States)

    Ferwerda, Jeremy; Flynn, D J; Horiuchi, Yusaku

    2017-09-01

    One week after President Donald Trump signed a controversial executive order to reduce the influx of refugees to the United States, we conducted a survey experiment to understand American citizens' attitudes toward refugee resettlement. Specifically, we evaluated whether citizens consider the geographic context of the resettlement program (that is, local versus national) and the degree to which they are swayed by media frames that increasingly associate refugees with terrorist threats. Our findings highlight a collective action problem: Participants are consistently less supportive of resettlement within their own communities than resettlement elsewhere in the country. This pattern holds across all measured demographic, political, and geographic subsamples within our data. Furthermore, our results demonstrate that threatening media frames significantly reduce support for both national and local resettlement. Conversely, media frames rebutting the threat posed by refugees have no significant effect. Finally, the results indicate that participants in refugee-dense counties are less responsive to threatening frames, suggesting that proximity to previously settled refugees may reduce the impact of perceived security threats.

  7. Stereotypes as stumbling-blocks: how coping with stereotype threat affects life outcomes for people with physical disabilities.

    Science.gov (United States)

    Silverman, Arielle M; Cohen, Geoffrey L

    2014-10-01

    Stereotype threat, the concern about being judged in light of negative stereotypes, causes underperformance in evaluative situations. However, less is known about how coping with stereotypes can aggravate underperformance over time. We propose a model in which ongoing stereotype threat experiences threaten a person's sense of self-integrity, which in turn prompts defensive avoidance of stereotype-relevant situations, impeding growth, achievement, and well-being. We test this model in an important but understudied population: the physically disabled. In Study 1, blind adults reporting higher levels of stereotype threat reported lower self-integrity and well-being and were more likely to be unemployed and to report avoiding stereotype-threatening situations. In Study 2's field experiment, blind students in a compensatory skill-training program made more progress if they had completed a values-affirmation, an exercise that bolsters self-integrity. The findings suggest that stereotype threat poses a chronic threat to self-integrity and undermines life outcomes for people with disabilities. © 2014 by the Society for Personality and Social Psychology, Inc.

  8. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    Science.gov (United States)

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  9. Migration in the Anthropocene: how collective navigation, environmental system and taxonomy shape the vulnerability of migratory species.

    Science.gov (United States)

    Hardesty-Moore, Molly; Deinet, Stefanie; Freeman, Robin; Titcomb, Georgia C; Dillon, Erin M; Stears, Keenan; Klope, Maggie; Bui, An; Orr, Devyn; Young, Hillary S; Miller-Ter Kuile, Ana; Hughey, Lacey F; McCauley, Douglas J

    2018-05-19

    Recent increases in human disturbance pose significant threats to migratory species using collective movement strategies. Key threats to migrants may differ depending on behavioural traits (e.g. collective navigation), taxonomy and the environmental system (i.e. freshwater, marine or terrestrial) associated with migration. We quantitatively assess how collective navigation, taxonomic membership and environmental system impact species' vulnerability by (i) evaluating population change in migratory and non-migratory bird, mammal and fish species using the Living Planet Database (LPD), (ii) analysing the role of collective navigation and environmental system on migrant extinction risk using International Union for Conservation of Nature (IUCN) classifications and (iii) compiling literature on geographical range change of migratory species. Likelihood of population decrease differed by taxonomic group: migratory birds were more likely to experience annual declines than non-migrants, while mammals displayed the opposite pattern. Within migratory species in IUCN, we observed that collective navigation and environmental system were important predictors of extinction risk for fishes and birds, but not for mammals, which had overall higher extinction risk than other taxa. We found high phylogenetic relatedness among collectively navigating species, which could have obscured its importance in determining extinction risk. Overall, outputs from these analyses can help guide strategic interventions to conserve the most vulnerable migrations.This article is part of the theme issue 'Collective movement ecology'. © 2018 The Author(s).

  10. Pengenalan Pose Tangan Menggunakan HuMoment

    Directory of Open Access Journals (Sweden)

    Dina Budhi Utami

    2017-02-01

    Full Text Available Computer vision yang didasarkan pada pengenalan bentuk memiliki banyak potensi dalam interaksi manusia dan komputer. Pose tangan dapat dijadikan simbol interaksi manusia dengan komputer seperti halnya pada penggunaan berbagai pose tangan pada bahasa isyarat. Berbagai pose tangan dapat digunakan untuk menggantikan fungsi mouse, untuk mengendalikan robot, dan sebagainya. Penelitian ini difokuskan pada pembangunan sistem pengenalan pose tangan menggunakan HuMoment. Proses pengenalan pose tangan dimulai dengan melakukan segmentasi citra masukan untuk menghasilkan citra ROI (Region of Interest yaitu area telapak tangan. Selanjutnya dilakukan proses deteksi tepi. Kemudian dilakukan ekstraksi nilai HuMoment. Nilai HuMoment dikuantisasikan ke dalam bukukode yang dihasilkan dari proses pelatihan menggunakan K-Means. Proses kuantisasi dilakukan dengan menghitung nilai Euclidean Distance terkecil antara nilai HuMomment citra masukan dan bukukode. Berdasarkan hasil penelitian, nilai akurasi sistem dalam mengenali pose tangan adalah 88.57%.

  11. Feature and Pose Constrained Visual Aided Inertial Navigation for Computationally Constrained Aerial Vehicles

    Science.gov (United States)

    Williams, Brian; Hudson, Nicolas; Tweddle, Brent; Brockers, Roland; Matthies, Larry

    2011-01-01

    A Feature and Pose Constrained Extended Kalman Filter (FPC-EKF) is developed for highly dynamic computationally constrained micro aerial vehicles. Vehicle localization is achieved using only a low performance inertial measurement unit and a single camera. The FPC-EKF framework augments the vehicle's state with both previous vehicle poses and critical environmental features, including vertical edges. This filter framework efficiently incorporates measurements from hundreds of opportunistic visual features to constrain the motion estimate, while allowing navigating and sustained tracking with respect to a few persistent features. In addition, vertical features in the environment are opportunistically used to provide global attitude references. Accurate pose estimation is demonstrated on a sequence including fast traversing, where visual features enter and exit the field-of-view quickly, as well as hover and ingress maneuvers where drift free navigation is achieved with respect to the environment.

  12. Brookhaven National Laboratory site environmental report for calendar year 1995

    Energy Technology Data Exchange (ETDEWEB)

    Naidu, J.R.; Paquette, D.E.; Schroeder, G.L. [eds.] [and others

    1996-12-01

    This report documents the results of the Environmental Monitoring Program at Brookhaven National Laboratory and summarizes information about environmental compliance for 1995. To evaluate the effect of Brookhaven National Laboratory`s operations on the local environment, measurements of direct radiation, and of a variety of radionuclides and chemical compounds in the ambient air, soil, sewage effluent, surface water, groundwater, fauna, and vegetation were made at the Brookhaven National Laboratory site and at adjacent sites. The report also evaluates the Laboratory`s compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions and effluents to the environment. Areas of known contamination are subject to Remedial Investigation/Feasibility Studies under the Inter Agency Agreement established by the Department of Energy, Environmental Protection Agency and the New York Department of Environmental Conservation. Except for identified areas of soil and groundwater contamination, the environmental monitoring data has continued to demonstrate that compliance was achieved with the applicable environmental laws and regulations governing emission and discharge of materials to the environment. Also, the data show that the environmental impacts at Brookhaven National Laboratory are minimal and pose no threat to the public nor to the environment. This report meets the requirements of Department of Energy Orders 5484.1, Environmental Protection, Safety, and Health Protection Information reporting requirements and 5400.1, General Environmental Protection Programs.

  13. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  14. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  15. Hunted woolly monkeys (Lagothrix poeppigii show threat-sensitive responses to human presence.

    Directory of Open Access Journals (Sweden)

    Sarah Papworth

    Full Text Available Responding only to individuals of a predator species which display threatening behaviour allows prey species to minimise energy expenditure and other costs of predator avoidance, such as disruption of feeding. The threat sensitivity hypothesis predicts such behaviour in prey species. If hunted animals are unable to distinguish dangerous humans from non-dangerous humans, human hunting is likely to have a greater effect on prey populations as all human encounters should lead to predator avoidance, increasing stress and creating opportunity costs for exploited populations. We test the threat sensitivity hypothesis in wild Poeppigi's woolly monkeys (Lagothrix poeppigii in Yasuní National Park, Ecuador, by presenting human models engaging in one of three behaviours "hunting", "gathering" or "researching". These experiments were conducted at two sites with differing hunting pressures. Visibility, movement and vocalisations were recorded and results from two sites showed that groups changed their behaviours after being exposed to humans, and did so in different ways depending on the behaviour of the human model. Results at the site with higher hunting pressure were consistent with predictions based on the threat sensitivity hypothesis. Although results at the site with lower hunting pressure were not consistent with the results at the site with higher hunting pressure, groups at this site also showed differential responses to different human behaviours. These results provide evidence of threat-sensitive predator avoidance in hunted primates, which may allow them to conserve both time and energy when encountering humans which pose no threat.

  16. Environmental and public health implications of wastewater quality

    African Journals Online (AJOL)

    user

    2011-03-28

    Mar 28, 2011 ... metals are one of the most persistent pollutants in waste- water. Unlike organic ... nitrate levels that affect infants do not pose a direct threat to older children ...... Rybicki S (1997). Advanced Wastewater Treatment: Phosphorus.

  17. Environmental accident and its treatment in a developing country: a case study on China.

    Science.gov (United States)

    Hou, Yu

    2012-08-01

    Along with their rapid progress, developing countries have had to deal with more environmental problems, which have been a cause for concern among policy makers and the public in general. This study cites two accidents that happened in China in 2006 that caused serious environmental problems in nearby communities and discusses the problems these accidents created and the resulting disputes among the concerned people. Pollution-causing accidents not only pose threats to the health of the victims but also give rise to environmental disputes that jeopardise national security and social stability. Conflicts normally ensue following a pollution-causing accident, which are more likely to happen within a development zone or industrial park. Few environmental conflicts in the past decades were resolved through litigation. Nevertheless, there are lapses in the regulatory system, which have to be addressed to ensure that the public's rights and interests are protected. Currently, reports on pollution-causing accidents are difficult to obtain and are often released very late. A majority of industrial firms operate without environmental clearance, thus highlighting the government's inefficiency in environmental management. It is about time that the Chinese government takes seriously the use of the Environmental Impact Assessment.

  18. Low impact of exposure to environmentally relevant doses of 226Ra in Atlantic cod (Gadus morhua) embryonic cells

    International Nuclear Information System (INIS)

    Olsvik, Pål A.; Berntssen, Marc H.G.; Hylland, Ketil; Eriksen, Dag Ø.; Holen, Elisabeth

    2012-01-01

    The aim of this study was to investigate whether 226 Ra, a radionuclide present in produced water from oil platforms in the North Sea and other offshore drilling areas, could affect vulnerable early life stages of Atlantic cod (Gadus morhua). Blastula-stage embryonic cells (EC) from fertilized eggs of Atlantic cod were isolated and exposed to environmental relevant concentrations of 226 Ra and transcription of selected genes quantified. The results showed a weak, but significant up-regulation of GPx3 and HSP70 transcripts after 48 h of exposure to 2.11 Bq/L. In EC exposed to three 226 Ra concentrations (2.11, 23 and 117 Bq/L) for 12 h, metallothionein, HSP90AA, thioredoxin and caspase 8 were significantly up-regulated in cells exposed to 117 Bq/L, whereas thioredoxin was also significantly up-regulated in EC exposed to 23 Bq/L. When EC were exposed to the same 226 Ra concentrations for 48 h, only heme oxygenase was significantly up-regulated in the 23 Bq/L exposure group. The results suggest that environmentally relevant activities of 226 Ra may induce oxidative stress and apoptosis in fish ECs. Exposure of Atlantic cod EC to Cd, selected as a model toxicant, supported the ability of EC around blastula stage to respond to toxicants by altered transcription. Due to dilution, environmentally relevant concentrations of radionuclides present in produced water would be expected to pose a minor threat to early life stages of fish. - Highlights: ► 226 Ra affects the transcription of genes in Atlantic cod embryonic cells. ► 226 Ra may induce oxidative stress and apoptosis in fish embryonic cells. ► 226 Ra not expected to pose a major threat to early life stages of marine fish.

  19. Assessing the Environmental Conditions of Higher Education: In a Theoretical Approach Using Porter’s Five Forces Model

    Directory of Open Access Journals (Sweden)

    Oya TAMTEKİN AYDIN

    2017-08-01

    Full Text Available Increased demand for higher education and the change and competition it has brought have been a subject for many studies. In Porter’s five forces model, forces termed as the threat of new entrants, threat of substitute products, bargaining power of suppliers, bargaining power of customers, and established rivals between the companies are used to understand the threats and opportunities posed by the industry’s environmental circumstances. The five forces model has been extensively used as an analytical tool to determine the intensity of rivalry and levels of profitability. Thus, managers can develop strategies and discover ways to defend their companies against competitive forces. Although there have been numerous studies conducted with this model for various sectors, the studies implementing this theory to higher education are very scarce due to uncertainty about whether higher education could be regarded as an industry together with its profitability and rivalry components. Specifically, in Turkey, with the idea of considering higher education to be an industry being disputable compared with western countries and even regarded as unmannerly and disloyal to academia explains the lack of studies on this subject. In this study, within the scope of the related literature, the five forces model will be discussed in conjunction with higher education. Subsequently, the factors and evaluations that are shown within this scope will be associated with the external environmental conditions of Turkish higher education. Since there is a lack of well-written sources and sufficient data, the association with Turkish higher education will not be deeply detailed. To perceive the threats and opportunities to higher education from external environmental conditions, an overall approach will be achieved. The theoretical substructure introduced by this study will bring a different viewpoint to politicians, university directors and academicians, along with being

  20. Global Threat Reduction Initiative International Partners' Conference. Summary of the proceedings and findings of the conference

    International Nuclear Information System (INIS)

    2004-01-01

    The Global Threat Reduction Initiative (GTRI) International Partners' Conference took place in Vienna, Austria, from September 18-19, 2004. More than 590 representatives from 100 International Atomic Energy Agency (IAEA) Member States attended the GTRI International Partners' Conference on September 18-19, 2004, in Vienna, Austria. Representatives from ten non-governmental and international organizations were also present during the conference. The Governments of the United States and the Russian Federation co-sponsored the International Partners Conference, with support from the International Atomic Energy Agency. The purpose of the International Partners' Conference was to build and broaden international support for efforts by national authorities to identify, secure, recover, and/or facilitate the disposition of high-risk nuclear and radioactive materials that pose a potential threat to the international community. One of the significant outcomes of the International Partners Conference was reaching agreement on the Findings of the Conference (enclosed in this document) by participating Member States that outlined a broadly shared opinion of participating Member States on efforts to reduce the potential threat posed by vulnerable, unsecured nuclear and other radioactive material. It is hoped that this document can be used as a framework to consolidate, expand, and accelerate domestic, regional, and IAEA programs that address unsecured vulnerable nuclear and radioactive materials, as deemed necessary by Member States. As a first step, participating members states urged the international community to note additional opportunities to further build support for activities related to GTRI

  1. Potential Threats Posed by Tetrodotoxins in UK Waters: Examination of Detection Methodology Used in Their Control

    Directory of Open Access Journals (Sweden)

    Andrew D. Turner

    2015-12-01

    Full Text Available Tetrodotoxin is a neurotoxin responsible for many human fatalities, most commonly following the consumption of pufferfish. Whilst the source of the toxin has not been conclusively proven, it is thought to be associated with various species of marine bacteria. Whilst the toxins are well studied in fish and gastropods, in recent years, there have been a number of reports of tetrodotoxin occurring in bivalve shellfish, including those harvested from the UK and other parts of Europe. This paper reviews evidence concerning the prevalence of tetrodotoxins in the UK together with methodologies currently available for testing. Biological, biomolecular and chemical methods are reviewed, including recommendations for further work. With the recent development of quantitative chromatographic methods for these and other hydrophilic toxins, as well as the commercial availability of rapid testing kits, there are a number of options available to ensure consumers are protected against this threat.

  2. Amazonian freshwater habitats experiencing environmental and socioeconomic threats affecting subsistence fisheries.

    Science.gov (United States)

    Alho, Cleber J R; Reis, Roberto E; Aquino, Pedro P U

    2015-09-01

    Matching the trend seen among the major large rivers of the globe, the Amazon River and its tributaries are facing aquatic ecosystem disruption that is affecting freshwater habitats and their associated biodiversity, including trends for decline in fishery resources. The Amazon's aquatic ecosystems, linked natural resources, and human communities that depend on them are increasingly at risk from a number of identified threats, including expansion of agriculture; cattle pastures; infrastructure such as hydroelectric dams, logging, mining; and overfishing. The forest, which regulates the hydrological pulse, guaranteeing the distribution of rainfall and stabilizing seasonal flooding, has been affected by deforestation. Flooding dynamics of the Amazon Rivers are a major factor in regulating the intensity and timing of aquatic organisms. This study's objective was to identify threats to the integrity of freshwater ecosystems, and to seek instruments for conservation and sustainable use, taking principally fish diversity and fisheries as factors for analysis.

  3. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Directory of Open Access Journals (Sweden)

    Bettina J Casad

    2016-01-01

    Full Text Available Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  4. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Science.gov (United States)

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681

  5. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.

    Science.gov (United States)

    Casad, Bettina J; Bryant, William J

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  6. Active Sites Environmental Monitoring Program: FY 1990 annual report

    International Nuclear Information System (INIS)

    Wickliff, D.S.; Morrissey, C.M.; Ashwood, T.L.

    1991-10-01

    Chapter 3 of US Department of Energy (DOE) Order 5820.2A (DOE 1988) sets forth requirements for environmental monitoring of active low-level waste (LLW) disposal sites. Active sites are defined as those LLW facilities that were in use on or after the date of the order (September 1988). The transuranic (TRU) waste storage areas in Solid Waste Storage Area (SWSA) 5 North are covered by Chap. 2 of the order. In both chapters, monitoring is required to provide for early warning of leaks before those leaks pose a threat to human health or the environment. Chapter 3 also requires that monitoring be conducted to evaluate the short- and long-term performance of LLW disposal facilities. In accordance with this order, the Solid Waste Operations Department at Oak Ridge National Laboratory (ORNL) has established an Active Sites Environmental Monitoring Program (ASEMP) that is implemented by staff of the Environmental Sciences Division (ESD) at ORNL. This report summarizes data from ASEMP monitoring activities for the final 6 months of FY 1990. A brief summary of the monitoring methodology for each site is presented also

  7. NATO Advanced Research Workshop on Preparedness for Nuclear and Radiological Threats

    CERN Document Server

    Diamond, David

    2015-01-01

    The nuclear crisis in Fukushima and growing threats of nuclear terrorism must serve as a wake-up call, prompting greater action to prepare ourselves for nuclear and radiological disasters. Our strategy to prepare for these threats is multi-layered and the events of these past years have proved the necessity to re-evaluate the national and international preparedness goals on a scale never before considered. The programme of NATO Advanced Research Workshop on “Preparedness for Nuclear and Radiological Threats” has been focused on science and technology challenges associated with our need to improve the national and international capacity and capability to prevent, protect against, mitigate the effects of, respond to, and recover from the nuclear and radiological disasters, including nuclear and radiological accident, terrorist attack by Improvised Nuclear Device (IND) or by “Dirty Bomb”-Radiological Dispersal Device (RDD), that pose the greatest risk to the national and international security and safety...

  8. Problem posing reflections and applications

    CERN Document Server

    Brown, Stephen I

    2014-01-01

    As a result of the editors' collaborative teaching at Harvard in the late 1960s, they produced a ground-breaking work -- The Art Of Problem Posing -- which related problem posing strategies to the already popular activity of problem solving. It took the concept of problem posing and created strategies for engaging in that activity as a central theme in mathematics education. Based in part upon that work and also upon a number of articles by its authors, other members of the mathematics education community began to apply and expand upon their ideas. This collection of thirty readings is a tes

  9. One Health Perspectives on Emerging Public Health Threats

    Directory of Open Access Journals (Sweden)

    Sukhyun Ryu

    2017-11-01

    Full Text Available Antimicrobial resistance and emerging infectious diseases, including avian influenza, Ebola virus disease, and Zika virus disease have significantly affected humankind in recent years. In the premodern era, no distinction was made between animal and human medicine. However, as medical science developed, the gap between human and animal science grew deeper. Cooperation among human, animal, and environmental sciences to combat emerging public health threats has become an important issue under the One Health Initiative. Herein, we presented the history of One Health, reviewed current public health threats, and suggested opportunities for the field of public health through better understanding of the One Health paradigm.

  10. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  11. Human action recognition based on estimated weak poses

    Science.gov (United States)

    Gong, Wenjuan; Gonzàlez, Jordi; Roca, Francesc Xavier

    2012-12-01

    We present a novel method for human action recognition (HAR) based on estimated poses from image sequences. We use 3D human pose data as additional information and propose a compact human pose representation, called a weak pose, in a low-dimensional space while still keeping the most discriminative information for a given pose. With predicted poses from image features, we map the problem from image feature space to pose space, where a Bag of Poses (BOP) model is learned for the final goal of HAR. The BOP model is a modified version of the classical bag of words pipeline by building the vocabulary based on the most representative weak poses for a given action. Compared with the standard k-means clustering, our vocabulary selection criteria is proven to be more efficient and robust against the inherent challenges of action recognition. Moreover, since for action recognition the ordering of the poses is discriminative, the BOP model incorporates temporal information: in essence, groups of consecutive poses are considered together when computing the vocabulary and assignment. We tested our method on two well-known datasets: HumanEva and IXMAS, to demonstrate that weak poses aid to improve action recognition accuracies. The proposed method is scene-independent and is comparable with the state-of-art method.

  12. A brief multi-disciplinary review on antimicrobial resistance in medicine and its linkage to the global environmental microbiota

    DEFF Research Database (Denmark)

    Cantas, L.; Shah, Syed Q A; Cavaco, Lina

    2013-01-01

    The discovery and introduction of antimicrobial agents to clinical medicine was one of the greatest medical triumphs of the 20th century that revolutionized the treatment of bacterial infections. However, the gradual emergence of populations of antimicrobial-resistant pathogenic bacteria resulting...... from use, misuse, and abuse of antimicrobials has today become a major global health concern. Antimicrobial resistance (AMR) genes have been suggested to originate from environmental bacteria, as clinically relevant resistance genes have been detected on the chromosome of environmental bacteria....... As only a few new antimicrobials have been developed in the last decade, the further evolution of resistance poses a serious threat to public health. Urgent measures are required not only to minimize the use of antimicrobials for prophylactic and therapeutic purposes but also to look for alternative...

  13. Hazard to man and the environment posed by the use of urban waste compost: A review

    Energy Technology Data Exchange (ETDEWEB)

    Deportes, Isabelle; Benoit-Guyod, Jean-Louis [Gedexe, Meylan (France); Zmirou, Denis [Public Health Laboratory, School of Medicine and Pharmacy, Joseph Fourier University, La Tronche (France)

    1995-09-29

    This review presents the current state of knowledge on the relationship between the environment and the use of municipal waste compost in terms of health risk assessment. The hazards stem from chemical and microbiological agents whose nature and magnitude depend heavily on the degree of sorting and on the composting methods. Three main routes of exposure can be determined and are quantified in the literature: (1) The ingestion of soil/compost mixtures by children, mostly in cases of pica, can be a threat because of the amount of lead, chromium, cadmium, PCDD/F and fecal streptococci that can be absorbed; (2) Though concern about contamination through the food chain is weak when compost is used in agriculture, some authors anticipate accumulation of pollutants after several years of disposal, which might lead to future hazards; (3) Exposure is also associated with atmospheric dispersion of compost organic dust that convey microorganisms and toxicants. Data on hazard posed by organic dust from municipal composts to the farmer or the private user is scarce. To date, microorganisms are only measured at composting plants, thus raising the issue of extrapolation to environmental situations. Lung damage and allergies may occur because of organic dust, Gram negative bacteria, actinomycetes and fungi. Further research is needed on the risk related to inhalation of chemical compounds

  14. Unpacking Terrorism, Revolution and Insurgency in Yemen: Real and Imagined Threats to Regional Security

    Directory of Open Access Journals (Sweden)

    Alexandra Lewis

    2013-10-01

    Full Text Available Recent months have seen a seeming escalation in the international threat posed by Al Qaeda in the Arabian Peninsula (AQAP, a terrorist network that has taken Yemen as its regional base of operations. In light of recent attacks, and resulting embassy closures, Yemen is a rising priority in the Western-led War on Terror. However, this has resulted in a side-lining of other security threats in Yemen, which may cause serious challenges to the authority of the Yemeni Government. In reality, the role of AQAP has been heavily manipulated throughout Yemen’s contemporary history: this was most evident during the 2011 Arab Spring, when both sides in the conflict claimed that Al Qaeda operatives were working with members of the other. Two years later, the true nature of the AQAP threat in Yemen is rarely questioned by external observers, yet remains largely shrouded in mystery. There is a need for more critical approaches to the AQAP challenges, which take the broader context of Yemeni security into account.

  15. What About the Children? The Threat of Nuclear War and Our Responsibility to Preserve this Planet for Future Generations.

    Science.gov (United States)

    Hawkes, Glenn W.

    Part of a global effort, this brochure was written to increase understanding of the threat nuclear war poses to children. Several issues are raised and briefly discussed, including (1) the present capacity for annihilating the next generation or ending human life on this planet, (2) the inadequacy of deterrence, (3) the suffering of children after…

  16. Anticipating and Communicating Plausible Environmental and Health Concerns Associated with Future Disasters: The ShakeOut and ARkStorm Scenarios as Examples

    Science.gov (United States)

    Plumlee, G. S.; Morman, S. A.; Alpers, C. N.; Hoefen, T. M.; Meeker, G. P.

    2010-12-01

    Disasters commonly pose immediate threats to human safety, but can also produce hazardous materials (HM) that pose short- and long-term environmental-health threats. The U.S. Geological Survey (USGS) has helped assess potential environmental health characteristics of HM produced by various natural and anthropogenic disasters, such as the 2001 World Trade Center collapse, 2005 hurricanes Katrina and Rita, 2007-2009 southern California wildfires, various volcanic eruptions, and others. Building upon experience gained from these responses, we are now developing methods to anticipate plausible environmental and health implications of the 2008 Great Southern California ShakeOut scenario (which modeled the impacts of a 7.8 magnitude earthquake on the southern San Andreas fault, http://urbanearth.gps.caltech.edu/scenario08/), and the recent ARkStorm scenario (modeling the impacts of a major, weeks-long winter storm hitting nearly all of California, http://urbanearth.gps.caltech.edu/winter-storm/). Environmental-health impacts of various past earthquakes and extreme storms are first used to identify plausible impacts that could be associated with the disaster scenarios. Substantial insights can then be gleaned using a Geographic Information Systems (GIS) approach to link ShakeOut and ARkStorm effects maps with data extracted from diverse database sources containing geologic, hazards, and environmental information. This type of analysis helps constrain where potential geogenic (natural) and anthropogenic sources of HM (and their likely types of contaminants or pathogens) fall within areas of predicted ShakeOut-related shaking, firestorms, and landslides, and predicted ARkStorm-related precipitation, flooding, and winds. Because of uncertainties in the event models and many uncertainties in the databases used (e.g., incorrect location information, lack of detailed information on specific facilities, etc.) this approach should only be considered as the first of multiple steps

  17. British National Party representations of Muslims in the month after the London bombings: homogeneity, threat, and the conspiracy tradition.

    Science.gov (United States)

    Wood, C; Finlay, W M L

    2008-12-01

    This study presents an analysis of articles written by prominent members of the British National Party. Each of these articles discussed Muslims and Islam in the aftermath of the 7 July 2005 London bombings. Two prominent discursive themes are discussed here. The first concerned the writers' constructions of the threat that Muslims and Islam pose to Britain. Central to this theme were constructions of Muslims as 'fascists', anti-white racists, and all potentially dangerous, although there was variability in this. Using the Koran as evidence, the articles present a vision of a faith which intends to take over the country; in this way, a homogenous, culturally essentialist version of Muslims is worked up. The second theme illustrates how the writers challenge those who believe that creating a British multicultural society is possible, and in doing so construct liberals and multiculturalists as also posing a threat to the country. The ways in which this represents a variety of conspiracy theory, and the implications of these constructions for social action, are discussed.

  18. Methodology for national risk analysis and prioritization of toxic industrial chemicals.

    Science.gov (United States)

    Taxell, Piia; Engström, Kerstin; Tuovila, Juha; Söderström, Martin; Kiljunen, Harri; Vanninen, Paula; Santonen, Tiina

    2013-01-01

    The identification of chemicals that pose the greatest threat to human health from incidental releases is a cornerstone in public health preparedness for chemical threats. The present study developed and applied a methodology for the risk analysis and prioritization of industrial chemicals to identify the most significant chemicals that pose a threat to public health in Finland. The prioritization criteria included acute and chronic health hazards, physicochemical and environmental hazards, national production and use quantities, the physicochemical properties of the substances, and the history of substance-related incidents. The presented methodology enabled a systematic review and prioritization of industrial chemicals for the purpose of national public health preparedness for chemical incidents.

  19. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  20. Threats of Password Pattern Leakage Using Smartwatch Motion Recognition Sensors

    Directory of Open Access Journals (Sweden)

    Jihun Kim

    2017-06-01

    Full Text Available Thanks to the development of Internet of Things (IoT technologies, wearable markets have been growing rapidly. Smartwatches can be said to be the most representative product in wearable markets, and involve various hardware technologies in order to overcome the limitations of small hardware. Motion recognition sensors are a representative example of those hardware technologies. However, smartwatches and motion recognition sensors that can be worn by users may pose security threats of password pattern leakage. In the present paper, passwords are inferred through experiments to obtain password patterns inputted by users using motion recognition sensors, and verification of the results and the accuracy of the results is shown.

  1. Multi-task pose-invariant face recognition.

    Science.gov (United States)

    Ding, Changxing; Xu, Chang; Tao, Dacheng

    2015-03-01

    Face images captured in unconstrained environments usually contain significant pose variation, which dramatically degrades the performance of algorithms designed to recognize frontal faces. This paper proposes a novel face identification framework capable of handling the full range of pose variations within ±90° of yaw. The proposed framework first transforms the original pose-invariant face recognition problem into a partial frontal face recognition problem. A robust patch-based face representation scheme is then developed to represent the synthesized partial frontal faces. For each patch, a transformation dictionary is learnt under the proposed multi-task learning scheme. The transformation dictionary transforms the features of different poses into a discriminative subspace. Finally, face matching is performed at patch level rather than at the holistic level. Extensive and systematic experimentation on FERET, CMU-PIE, and Multi-PIE databases shows that the proposed method consistently outperforms single-task-based baselines as well as state-of-the-art methods for the pose problem. We further extend the proposed algorithm for the unconstrained face verification problem and achieve top-level performance on the challenging LFW data set.

  2. Exemplar-based human action pose correction.

    Science.gov (United States)

    Shen, Wei; Deng, Ke; Bai, Xiang; Leyvand, Tommer; Guo, Baining; Tu, Zhuowen

    2014-07-01

    The launch of Xbox Kinect has built a very successful computer vision product and made a big impact on the gaming industry. This sheds lights onto a wide variety of potential applications related to action recognition. The accurate estimation of human poses from the depth image is universally a critical step. However, existing pose estimation systems exhibit failures when facing severe occlusion. In this paper, we propose an exemplar-based method to learn to correct the initially estimated poses. We learn an inhomogeneous systematic bias by leveraging the exemplar information within a specific human action domain. Furthermore, as an extension, we learn a conditional model by incorporation of pose tags to further increase the accuracy of pose correction. In the experiments, significant improvements on both joint-based skeleton correction and tag prediction are observed over the contemporary approaches, including what is delivered by the current Kinect system. Our experiments for the facial landmark correction also illustrate that our algorithm can improve the accuracy of other detection/estimation systems.

  3. An integrated approach to adapt physical protection to the new terrorism threats

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Braun, C.; Bunn, G.

    2002-01-01

    Full text: New terrorism (NT) differs significantly from the traditional form of terrorism insofar as it has the capability to: train and deploy suicide commandos; use sophisticated logistics; implement transnational terrorist operations; infiltrate security and diplomatic communities; and commit acts of mass disturbance and mass killings. NT does not engage in negotiations: it does not discriminate in its attacks between children, adult civilians or military personnel; and it is willing to deploy weapons of mass destruction. These characteristics require that the conventional approach to physical protection of installations dealing with nuclear and other radioactive materials (e.g., Design Basis Threat (DBT)) be adapted accordingly. This integrated approach should encompass: at the international level: revised legally binding conventions and recommendations which are more specific than current versions, providing practically applicable advice reflecting the new threat scenarios; at the national level: introducing an element of transparency for validating the national threat perception and supra-national review of the effectiveness of the counteractions taken such as regulatory approaches implementing these international agreements; at the operational level: enhancing security-related co-operation at the command and control level between the on-site security forces at nuclear installations, the response force, police and the military, as well as upgrading of the force-on-force training; and at the research level: R and D in physical protection technology and practices to keep abreast of the threats posed by the NT. (author)

  4. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    Energy Technology Data Exchange (ETDEWEB)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  5. The environmental and medical geochemistry of potentially hazardous materials produced by disasters

    Science.gov (United States)

    Plumlee, Geoffrey S.; Morman, Suzette A.; Meeker, G.P.; Hoefen, Todd M.; Hageman, Philip L.; Wolf, Ruth E.

    2014-01-01

    Many natural or human-caused disasters release potentially hazardous materials (HM) that may pose threats to the environment and health of exposed humans, wildlife, and livestock. This chapter summarizes the environmentally and toxicologically significant physical, mineralogical, and geochemical characteristics of materials produced by a wide variety of recent disasters, such as volcanic eruptions, hurricanes and extreme storms, spills of mining/mineral-processing wastes or coal extraction by-products, and the 2001 attacks on and collapse of the World Trade Center towers. In describing these characteristics, this chapter also illustrates the important roles that geochemists and other earth scientists can play in environmental disaster response and preparedness. In addition to characterizing in detail the physical, chemical, and microbial makeup of HM generated by the disasters, these roles also include (1) identifying and discriminating potential multiple sources of the materials; (2) monitoring, mapping, and modeling dispersal and evolution of the materials in the environment; (3) understanding how the materials are modified by environmental processes; (4) identifying key characteristics and processes that influence the materials' toxicity to exposed humans and ecosystems; (5) estimating shifts away from predisaster environmental baseline conditions; and (6) using geochemical insights learned from past disasters to help estimate, prepare for, and increase societal resilience to the environmental and related health impacts of future disasters.

  6. CONTAMINANT-INDUCED ENDOCRINE DISRUPTION IN WILDLIFE

    Science.gov (United States)

    Environmental contaminants have posed a threat to the health of wildlife since the onset of the industrial age. Over the last four decades, much concern has focused on the lethal, carcinogenic and/or extreme teratogenic manifestations of environmental pollution. During the last d...

  7. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  8. Environmental management in public hospitals: Environmental management in Colombia

    OpenAIRE

    Juan Pablo Rodríguez-Miranda; César Augusto García-Ubaque; María Camila García-Vaca

    2016-01-01

    Introduction: Activities in hospitals have environmental impacts which may pose risks to human and environmental health if they are not managed correctly. For this reason, it is necessary to implement an environmental management plan in hospitals that not only focuses on solid waste management but includes all aspects associated with health within institutions. Objective: To review environmental management aspects related to public hospitals in order to identify environmental management a...

  9. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  10. Students’ Creativity: Problem Posing in Structured Situation

    Science.gov (United States)

    Amalina, I. K.; Amirudin, M.; Budiarto, M. T.

    2018-01-01

    This is a qualitative research concerning on students’ creativity on problem posing task. The study aimed at describing the students’ creative thinking ability to pose the mathematics problem in structured situations with varied condition of given problems. In order to find out the students’ creative thinking ability, an analysis of mathematics problem posing test based on fluency, novelty, and flexibility and interview was applied for categorizing students’ responses on that task. The data analysis used the quality of problem posing and categorized in 4 level of creativity. The results revealed from 29 secondary students grade 8, a student in CTL (Creative Thinking Level) 1 met the fluency. A student in CTL 2 met the novelty, while a student in CTL 3 met both fluency and novelty and no one in CTL 4. These results are affected by students’ mathematical experience. The findings of this study highlight that student’s problem posing creativity are dependent on their experience in mathematics learning and from the point of view of which students start to pose problem.

  11. Earth in the balance - ecology and the human spirit

    International Nuclear Information System (INIS)

    Gore, A.

    1992-01-01

    This book by Senator Albert Gore presents a global prospective on the environmental crisis facing the Earth. The chapters are framed in the twin ideas of the threat posed by human civilization to the global environment and the threat to human civilization posed by changes in the global environment. Gore first looks at evidence of risk in the environment: historical aspects of climate and civilization; ozone layer; water; land use; food supply; waste disposal. In Part II different aspects of our current approaches to the environment are described: politics; economics; technology; social problems; environmentalism of the human spirit. Finally in Part III, Gore presents his approach to the global environmental crisis, first presenting a section about a global sense of responsibility and purpose and then describing his ideas for A Global Marshal Plan. 169 refs., 4 figs

  12. Sediment quality in the River Clyde catchment

    OpenAIRE

    Lass-Evans, Solveigh; Fordyce, Fiona

    2012-01-01

    Chemical pollution from past industrial development poses current and future environmental threats, as many substances are toxic in high concentrations, and could have longterm implications for ecosystems and human health.

  13. Environmental impacts and sustainability of degraded water reuse

    Energy Technology Data Exchange (ETDEWEB)

    Corwin, D.L.; Bradford, S.A. [USDA ARS, Riverside, CA (United States). US Salin Laboratory

    2008-09-15

    Greater urban demand for finite water resources to meet domestic, agricultural, industrial, and recreational needs; increased frequency of drought resulting from erratic weather; and continued degradation of available water resources from point and nonpoint sources of pollution have focused attention on the reuse of degraded waters as a potential water source. However, short- and long-term detrimental environmental impacts and sustainability of degraded water reuse are not well known or understood. These concerns led to the organization of the 2007 ASA-CSSA-SSSA Symposium entitled Environmental Impacts and Sustainability of Degraded Water Reuse. Out of this symposium came a special collection of 4 review papers and 12 technical research papers focusing on various issues associated with the reuse of agricultural drainage water, well water generated in the production of natural gas from coalbeds, municipal wastewater and biosolids, wastewater from confined animal operations, urban runoff, and food-processing wastewater. Overviews of the papers, gaps in knowledge, and future research directions are presented. The future prognosis of degraded water reuse is promising, provided close attention is paid to managing constituents that pose short- and long-term threats to the environment and the health of humankind.

  14. Scaling range sizes to threats for robust predictions of risks to biodiversity.

    Science.gov (United States)

    Keith, David A; Akçakaya, H Resit; Murray, Nicholas J

    2018-04-01

    Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  15. On the rumors about the silent spring: review of the scientific evidence linking occupational and environmental pesticide exposure to endocrine disruption health effects Rumores de uma primavera silenciosa: uma revisão das evidências científicas sobre a associação entre exposição ocupacional e ambiental a pesticidas e distúrbios endócrinos

    OpenAIRE

    Pierluigi Cocco

    2002-01-01

    Occupational exposure to some pesticides, and particularly DBCP and chlordecone, may adversely affect male fertility. However, apart from the therapeutic use of diethylstilbestrol, the threat to human reproduction posed by "endocrine disrupting" environmental contaminants has not been supported by epidemiological evidence thus far. As it concerns other endocrine effects described in experimental animals, only thyroid inhibition following occupational exposure to amitrole and mancozeb has been...

  16. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  17. The air's got to be far cleaner here: a discursive analysis of place-identity threat.

    Science.gov (United States)

    Hugh-Jones, Siobhan; Madill, Anna

    2009-12-01

    That talk is never disinterested complicates the relationship between the environment and the claims people make about it. Talk about place, and one's self in it, is particularly complex when the environment poses risk or is otherwise problematized. This study, a secondary analysis of interview data, seeks to extend discursive work on place-identity by examining the ways in which 14 residents of a small English village talk about themselves and their locale. The locale accommodates an active quarry, and many residents had lodged complaints to the quarry about dust, noise and vibrations from blasting. Attention to the interactional context of the interviews illustrates the ways in which (simply) interviewing people about their locale can threaten self- and place-identity. When asked about life in the village, interviewees oriented to two main dilemmas in protecting self- and place-identity: (1) how to justify continued residence in a challenging environment and (2) how to complain about the locale whilst maintaining positive place-identity. Discursive responses to these dilemmas drew upon typical identity processes, such as self- and place distinctiveness and the formulation of out-groups, as well as upon constructions of localized power-sharing and morally obligated tolerance of risk. We suggest that research on problematical places, and of environmental risk, needs to be sensitized to how it may constitute a threat to self- and place-identity, and how this may mediate formulations self and place, as well as of environmental risk.

  18. Reproduction Symposium: does grazing on biosolids-treated pasture pose a pathophysiological risk associated with increased exposure to endocrine disrupting compounds?

    Science.gov (United States)

    Evans, N P; Bellingham, M; Sharpe, R M; Cotinot, C; Rhind, S M; Kyle, C; Erhard, H; Hombach-Klonisch, S; Lind, P M; Fowler, P A

    2014-08-01

    Biosolids (processed human sewage sludge), which contain low individual concentrations of an array of contaminants including heavy metals and organic pollutants such as polycyclic aromatic hydrocarbons (PAH), polychlorinated biphenyls (PCB), and polychlorinated dibenzodioxins/polychlorinated dibenzofurans known to cause physiological disturbances, are increasingly being used as an agricultural fertilizer. This could pose a health threat to both humans and domestic and wild animal species. This review summarizes results of a unique model, used to determine the effects of exposure to mixtures of environmentally relevant concentrations of pollutants, in sheep grazed on biosolids-treated pastures. Pasture treatment results in nonsignificant increases in environmental chemical (EC) concentrations in soil. Whereas EC concentrations were increased in some tissues of both ewes and their fetuses, concentrations were low and variable and deemed to pose little risk to consumer health. Investigation of the effects of gestational EC exposure on fetal development has highlighted a number of issues. The results indicate that gestational EC exposure can adversely affect gonadal development (males and females) and that these effects can impact testicular morphology, ovarian follicle numbers and health, and the transcriptome and proteome in adult animals. In addition, EC exposure can be associated with altered expression of GnRH, GnRH receptors, galanin receptors, and kisspeptin mRNA within the hypothalamus and pituitary gland, gonadotroph populations within the pituitary gland, and regional aberrations in thyroid morphology. In most cases, these anatomical and functional differences do not result in altered peripheral hormone concentrations or reproductive function (e.g., lambing rate), indicating physiological compensation under the conditions tested. Physiological compensation is also suggested from studies that indicate that EC effects may be greater when exposure occurs either

  19. Threat Posed by Mounting Vigilantism in Mexico

    Science.gov (United States)

    2011-09-01

    unexamined amid this narco-mayhem are vigilante activities. Rossana Reguillo Cruz , an activ- ist who studies crime and violence at the Jesuit Uni...zero—even though choppers belonging to television networks managed to set down. Mayor Andrés Manuel López Obrador, who narrowly lost the 2006...groundswell of support.3 Rossana Reguillo Cruz , an activist who studies crime and vio- lence at the Jesuit University of Guadalajara, echoed this

  20. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  1. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  2. Environmental statistical modelling of mosquito vectors at different geographical scales

    NARCIS (Netherlands)

    Cianci, D.

    2015-01-01

    Vector-borne diseases are infections transmitted by the bite of infected arthropod vectors, such as mosquitoes, ticks, fleas, midges and flies. Vector-borne diseases pose an increasingly wider threat to global public health, both in terms of people affected and their geographical spread. Mosquitoes

  3. Pose Planning for the Feed Support System of FAST

    Directory of Open Access Journals (Sweden)

    Rui Yao

    2014-01-01

    Full Text Available A six-cable driven parallel manipulator and an A-B rotator in the feed support system of the Five-hundred-meter Aperture Spherical radio Telescope (FAST are adopted for realizing the position and pose of nine feeds. The six-cable driven parallel manipulator is a flexible mechanism, which may not be stably controlled due to a small cable tension. The A-B rotator is a rigid mechanism, and its stability and accuracy can be improved by small pose angle. Based on the different characteristics, a pose planning function is presented. The optimization target of the pose planning function is to get the smallest pose angle of the A-B rotator, and the constraint condition can reflect the controllability of the six-cable driven parallel manipulator. Then, the pose planning realization process of the feed support system is proposed. Based on the pose planning method, optimized pose angles of the feed support system for the nine feeds are obtained, which suggests that the pose angle of the six-cable driven parallel manipulator changes from 0° to 14° and the pose angle of the A-B rotator changes from 0° to 26.4°.

  4. 2D Methods for pose invariant face recognition

    CSIR Research Space (South Africa)

    Mokoena, Ntabiseng

    2016-12-01

    Full Text Available The ability to recognise face images under random pose is a task that is done effortlessly by human beings. However, for a computer system, recognising face images under varying poses still remains an open research area. Face recognition across pose...

  5. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  6. The nucleolus is well-posed

    Science.gov (United States)

    Fragnelli, Vito; Patrone, Fioravante; Torre, Anna

    2006-02-01

    The lexicographic order is not representable by a real-valued function, contrary to many other orders or preorders. So, standard tools and results for well-posed minimum problems cannot be used. We prove that under suitable hypotheses it is however possible to guarantee the well-posedness of a lexicographic minimum over a compact or convex set. This result allows us to prove that some game theoretical solution concepts, based on lexicographic order are well-posed: in particular, this is true for the nucleolus.

  7. Real-Time Head Pose Estimation on Mobile Platforms

    Directory of Open Access Journals (Sweden)

    Jianfeng Ren

    2010-06-01

    Full Text Available Many computer vision applications such as augmented reality require head pose estimation. As far as the real-time implementation of head pose estimation on relatively resource limited mobile platforms is concerned, it is required to satisfy real-time constraints while maintaining reasonable head pose estimation accuracy. The introduced head pose estimation approach in this paper is an attempt to meet this objective. The approach consists of the following components: Viola-Jones face detection, color-based face tracking using an online calibration procedure, and head pose estimation using Hu moment features and Fisher linear discriminant. Experimental results running on an actual mobile device are reported exhibiting both the real- time and accuracy aspects of the developed approach.

  8. Head pose estimation algorithm based on deep learning

    Science.gov (United States)

    Cao, Yuanming; Liu, Yijun

    2017-05-01

    Head pose estimation has been widely used in the field of artificial intelligence, pattern recognition and intelligent human-computer interaction and so on. Good head pose estimation algorithm should deal with light, noise, identity, shelter and other factors robustly, but so far how to improve the accuracy and robustness of attitude estimation remains a major challenge in the field of computer vision. A method based on deep learning for pose estimation is presented. Deep learning with a strong learning ability, it can extract high-level image features of the input image by through a series of non-linear operation, then classifying the input image using the extracted feature. Such characteristics have greater differences in pose, while they are robust of light, identity, occlusion and other factors. The proposed head pose estimation is evaluated on the CAS-PEAL data set. Experimental results show that this method is effective to improve the accuracy of pose estimation.

  9. In-the-wild facial expression recognition in extreme poses

    Science.gov (United States)

    Yang, Fei; Zhang, Qian; Zheng, Chi; Qiu, Guoping

    2018-04-01

    In the computer research area, facial expression recognition is a hot research problem. Recent years, the research has moved from the lab environment to in-the-wild circumstances. It is challenging, especially under extreme poses. But current expression detection systems are trying to avoid the pose effects and gain the general applicable ability. In this work, we solve the problem in the opposite approach. We consider the head poses and detect the expressions within special head poses. Our work includes two parts: detect the head pose and group it into one pre-defined head pose class; do facial expression recognize within each pose class. Our experiments show that the recognition results with pose class grouping are much better than that of direct recognition without considering poses. We combine the hand-crafted features, SIFT, LBP and geometric feature, with deep learning feature as the representation of the expressions. The handcrafted features are added into the deep learning framework along with the high level deep learning features. As a comparison, we implement SVM and random forest to as the prediction models. To train and test our methodology, we labeled the face dataset with 6 basic expressions.

  10. Face pose tracking using the four-point algorithm

    Science.gov (United States)

    Fung, Ho Yin; Wong, Kin Hong; Yu, Ying Kin; Tsui, Kwan Pang; Kam, Ho Chuen

    2017-06-01

    In this paper, we have developed an algorithm to track the pose of a human face robustly and efficiently. Face pose estimation is very useful in many applications such as building virtual reality systems and creating an alternative input method for the disabled. Firstly, we have modified a face detection toolbox called DLib for the detection of a face in front of a camera. The detected face features are passed to a pose estimation method, known as the four-point algorithm, for pose computation. The theory applied and the technical problems encountered during system development are discussed in the paper. It is demonstrated that the system is able to track the pose of a face in real time using a consumer grade laptop computer.

  11. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    Energy Technology Data Exchange (ETDEWEB)

    Goix, Sylvaine [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Lévêque, Thibaut [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); ADEME (French Agency for Environment and Energy Management), 20 Avenue du Grésillé, BP 90406, 49004 Angers Cedex 01 (France); Xiong, Tian-Tian [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Schreck, Eva [Géosciences Environnement Toulouse (GET), Observatoire Midi Pyrénées, Université de Toulouse, CNRS, IRD, 14 Avenue E. Belin, F-31400 Toulouse (France); and others

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.

  12. Experimental estimation of snare detectability for robust threat monitoring.

    Science.gov (United States)

    O'Kelly, Hannah J; Rowcliffe, J Marcus; Durant, Sarah; Milner-Gulland, E J

    2018-02-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccessible areas. As with cryptic animal targets, any approach used to monitor snaring levels must address the issue of imperfect detection, but no standard method exists to do so. We carried out a field experiment in Keo Seima Wildlife Reserve in eastern Cambodia with the following objectives: (1) To estimate the detection probably of wire snares within a tropical forest context, and to investigate how detectability might be affected by habitat type, snare type, or observer. (2) To trial two sets of sampling protocols feasible to implement in a range of challenging field conditions. (3) To conduct a preliminary assessment of two potential analytical approaches to dealing with the resulting snare encounter data. We found that although different observers had no discernible effect on detection probability, detectability did vary between habitat type and snare type. We contend that simple repeated counts carried out at multiple sites and analyzed using binomial mixture models could represent a practical yet robust solution to the problem of monitoring snaring levels both inside and outside of protected areas. This experiment represents an important first step in developing improved methods of threat monitoring, and such methods are greatly needed in southeast Asia, as well as in as many other regions.

  13. Reconcilability of Socio-Economic Development and Environmental Conservation in Sub-Saharan Africa

    Science.gov (United States)

    Rudi, Lisa-Marie; Azadi, Hossein; Witlox, Frank

    2012-04-01

    Are the achievements of sustainable development and the improvement of environmental standards mutually exclusive in the 21st century? Is there a possibility to combine the two? This study is an effort to investigate the mutual exclusiveness of the two policy areas and asks for the necessity and possibility to combine the two with a reference to Sub-Saharan Africa (SSA). After describing the historical, geographical, and climatic backgrounds of SSA, negative effects of global warming and local environmentally harmful practices are discussed. Subsequently, the appropriate development measures for the region are elaborated in order to understand their compatibility with regards to improving the environment. It is concluded that to change the dependency on agriculture, the economy needs to be restructured towards technologies. Furthermore, it is found that there is a direct link between global warming and economic efficiency. Theories, which imply that some regions are simply 'too poor to be green', are investigated and rebutted by another theory, which states that it is indeed possible to industrialize in an environmentally friendly way. It follows that environmental and development measures are interconnected, equally important and can be reconciled. The paper finally concludes that the threat posed by global warming and the previously practised environmentally-harmful local measures might be so pressing that it may be too tragic to go for 'develop first and clean up later' approach.

  14. Threat of heavy metal pollution in halophytic and mangrove plants of Tamil Nadu, India

    Energy Technology Data Exchange (ETDEWEB)

    Agoramoorthy, Govindasamy; Chen, F.-A. [Department of Pharmacy, Tajen University, Yanpu, Pingtung 907, Taiwan (China); Hsu, Minna J. [Department of Biological Sciences, National Sun Yat-sen University, Kaohsiung 80424, Taiwan (China)], E-mail: hsumin@mail.nsysu.edu.tw

    2008-09-15

    Mangrove and halophytic plants occur along the coastal areas of Tamil Nadu, south India and these plants have been used in traditional medicine for centuries. Heavy metals are known to pose a potential threat to terrestrial and aquatic biota. However, little is known on the toxic levels of heavy metals found in mangrove and halophytic plants that are used in traditional medicine in India. To understand heavy metal toxicity, we investigated the bioconcentration factors (BCF) of heavy metals in leaves collected from eight mangroves and five halophytes in the protected Pichavaram mangrove forest reserve in Tamil Nadu State, south India. Data presented in this paper describe the impact of essential (Cu, Fe, Mg, Mn and Zn) and non-essential/environmentally toxic trace metals (Hg, Pb and Sn) in mangrove and halophytic medicinal plants. The concentrations of Pb among 13 plant species were higher than the normal range of contamination reported for plants. The average concentration of Hg in the halophytic plants (0.43 {+-} 0.37 {mu}g/g) was seven times higher than mangrove plants (0.06 {+-} 0.03 {mu}g/g) and it indicated pollutants from industrial sources affecting halophytes more than mangroves. - Metal effects occur in India's mangrove ecosystem.

  15. Threat of heavy metal pollution in halophytic and mangrove plants of Tamil Nadu, India

    International Nuclear Information System (INIS)

    Agoramoorthy, Govindasamy; Chen, F.-A.; Hsu, Minna J.

    2008-01-01

    Mangrove and halophytic plants occur along the coastal areas of Tamil Nadu, south India and these plants have been used in traditional medicine for centuries. Heavy metals are known to pose a potential threat to terrestrial and aquatic biota. However, little is known on the toxic levels of heavy metals found in mangrove and halophytic plants that are used in traditional medicine in India. To understand heavy metal toxicity, we investigated the bioconcentration factors (BCF) of heavy metals in leaves collected from eight mangroves and five halophytes in the protected Pichavaram mangrove forest reserve in Tamil Nadu State, south India. Data presented in this paper describe the impact of essential (Cu, Fe, Mg, Mn and Zn) and non-essential/environmentally toxic trace metals (Hg, Pb and Sn) in mangrove and halophytic medicinal plants. The concentrations of Pb among 13 plant species were higher than the normal range of contamination reported for plants. The average concentration of Hg in the halophytic plants (0.43 ± 0.37 μg/g) was seven times higher than mangrove plants (0.06 ± 0.03 μg/g) and it indicated pollutants from industrial sources affecting halophytes more than mangroves. - Metal effects occur in India's mangrove ecosystem

  16. Threats to North American Forests from Southern Pine Beetle with Warming Winters

    Science.gov (United States)

    Lesk, Corey; Coffel, Ethan; D'Amato, Anthony W.; Dodds, Kevin; Horton, Radley M.

    2016-01-01

    In coming decades, warmer winters are likely to lift range constraints on many cold-limited forest insects. Recent unprecedented expansion of the southern pine beetle (SPB, Dendroctonus frontalis) into New Jersey, New York, Connecticut, and Massachusetts in concert with warming annual temperature minima highlights the risk that this insect pest poses to the pine forests of the northern United States and Canada under continued climate change. Here we present the first projections of northward expansion in SPB-suitable climates using a statistical bioclimatic range modeling approach and current-generation general circulation model (GCM) output under the RCP 4.5 and 8.5 emissions scenarios. Our results show that by the middle of the 21st century, the climate is likely to be suitable for SPB expansion into vast areas of previously unaffected forests throughout the northeastern United States and into southeastern Canada. This scenario would pose a significant economic and ecological risk to the affected regions, including disruption oflocal ecosystem services, dramatic shifts in forest structure, and threats to native biodiversity.

  17. The reduced-risk insecticide azadirachtin poses a toxicological hazard to stingless bee Partamona helleri (Friese, 1900) queens.

    Science.gov (United States)

    Bernardes, Rodrigo Cupertino; Barbosa, Wagner Faria; Martins, Gustavo Ferreira; Lima, Maria Augusta Pereira

    2018-06-01

    Large-scale pesticide application poses a major threat to bee biodiversity by causing a decline in bee populations that, in turn, compromises ecosystem maintenance and agricultural productivity. Biopesticides are considered an alternative to synthetic pesticides with a focus on reducing potential detrimental effects to beneficial organisms such as bees. The production of healthy queen stingless bees is essential for the survival and reproduction of hives, although it remains unknown whether biopesticides influence stingless bee reproduction. In the present study, we investigated the effects of the biopesticide azadirachtin on the survival, behavior, morphology, development, and reproduction of queens of the stingless bee Partamona helleri (Friese, 1900). The neonicotinoid imidacloprid was used as a toxic reference standard. Queens were orally exposed in vitro to a contaminated diet (containing azadirachtin and imidacloprid) during development. Azadirachtin resulted in reduced survival, similarly to imidacloprid, altered development time, caused deformations, and reduced the size of the queens' reproductive organs. All of these factors could potentially compromise colony survival. Results from the present study showed azadirachtin posed a toxicological hazard to P. helleri queens. Copyright © 2018 Elsevier Ltd. All rights reserved.

  18. Climatic threats on the worldwide peace

    International Nuclear Information System (INIS)

    Valantin, J.M.

    2005-06-01

    This book approaches the climatic change under the international relation aspect. It recalls the progressive growth of the collective awareness about the threats of human activities on Earth's climate and analyzes more particularly the policies adopted by the US, UK and the European Union. It evokes also the problems encountered by the developing countries, the energy needs of which are continuously increasing. Finally, it puts the question of the capacity of the international community to solve, by negotiations and not by conflicts, the tensions generated by environmental crises. (J.S.)

  19. Surface Water Interim Measures/Interim Remedial Action Plan/ Environmental and Decision Document, South Walnut Creek Basin, Operable Unit No.2

    International Nuclear Information System (INIS)

    1991-01-01

    Water quality investigations have identified the presence of volatile organic compound (VOC) and radionuclide contamination of surface water at the Rocky Flats Plant (RFP). The subject interim Measures/Interim Remedial Action Plan/Environmental Assessment (IM/IRAP/EA) addresses contaminated surface water in a portion of the South Walnut Creek drainage basin located within an area identified as Operable Unit No. 2 (OU 2). There is no immediate threat to public health and the environment posed by this surface water contamination. The affected surface water is contained within the plant boundary by existing detention ponds, and is treated prior to discharge for removal of volatile contaminants and suspended particulates to which radionuclides, if present, are likely to absorb. However, there is a potential threat and the Department of Energy (DOE) is implementing this Surface Water IM/IRAP at the request of the US Environmental Protection Agency (EPA) and Colorado Department of Health (CDH). Implementation of the Surface Water IM/IRA will enhance the DOE's efforts towards containing and managing contaminated surface water, and will mitigate downgradient migration of contaminants. Another factor in implementing this IM/IRA is the length of time it will take to complete the investigations and engineering studies necessary to determine the final remedy for OU 2. 44 refs., 23 figs., 14 tabs

  20. The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

    Directory of Open Access Journals (Sweden)

    Faga Hemen Philip

    2017-06-01

    Full Text Available This paper is an attempt to draw distinctive lines between the concepts of cybercrime, cyber-attack, and cyber warfare in the current information age, in which it has become difficult to separate the activities of transnational criminals from acts of belligerents using cyberspace. The paper considers the implications of transnational cyber threats in international humanitarian law (IHL with a particular focus on cyber-attacks by non-state actors, the principles of state responsibility, and the implications of targeting non-state perpetrators under IHL. It concludes that current international law constructs are inadequate to address the implications of transnational cyber threats; the author recommends consequential amendments to the laws of war in order to address the challenges posed by transnational cyber threats.

  1. Mercury-Containing Devices and Demolition

    Science.gov (United States)

    Some items inside residential buildings contain mercury, which poses a persistent and toxic human health and environmental threat. These materials should be carefully salvaged for proper recycling to prevent mercury contamination prior to demolition.

  2. An Assessment Of Compliance Of Building Construction Projects ...

    African Journals Online (AJOL)

    indirect impacts on the environment by displacement of communities and ... These pose threats to the existence of man and the sustenance of natural vegetation. Environmental Impact Assessment (EIA) is encapsulated as a practicable ...

  3. Polarizing news? Representations of threat and efficacy in leading US newspapers' coverage of climate change.

    Science.gov (United States)

    Feldman, Lauren; Hart, P Sol; Milosevic, Tijana

    2017-05-01

    This study examines non-editorial news coverage in leading US newspapers as a source of ideological differences on climate change. A quantitative content analysis compared how the threat of climate change and efficacy for actions to address it were represented in climate change coverage across The New York Times, The Wall Street Journal, The Washington Post, and USA Today between 2006 and 2011. Results show that The Wall Street Journal was least likely to discuss the impacts of and threat posed by climate change and most likely to include negative efficacy information and use conflict and negative economic framing when discussing actions to address climate change. The inclusion of positive efficacy information was similar across newspapers. Also, across all newspapers, climate impacts and actions to address climate change were more likely to be discussed separately than together in the same article. Implications for public engagement and ideological polarization are discussed.

  4. Skill Levels of Prospective Physics Teachers on Problem Posing

    Science.gov (United States)

    Cildir, Sema; Sezen, Nazan

    2011-01-01

    Problem posing is one of the topics which the educators thoroughly accentuate. Problem posing skill is defined as an introvert activity of a student's learning. In this study, skill levels of prospective physics teachers on problem posing were determined and their views on problem posing were evaluated. To this end, prospective teachers were given…

  5. Nuclear techniques for the study of environmental pollution and control: experience and facilities at PINSTECH

    International Nuclear Information System (INIS)

    Rajput, M.U.; Butt, N.M.

    2001-01-01

    Environmental pollution is a worldwide problem. Developed countries have already gone in the clutches of pollution. Now the rapid industrialization and modernization process has also started in the developing countries. This is posing a serious threat to their own environment. One of the important factors in the pollution control measures is to investigate the levels of environmental pollution, from time to time, by effective and reliable methods. Nuclear techniques due to their high sensitivities play an important role in this regard. These techniques have the potential to determine the concentration of pollutants in trace level quantities (ppm and ppb) and for locating the possible pollution sources such as power plants, refineries, municipal waste, industries etc. Pakistan Institute of Nuclear Science and Technology (PINSTECH) has qualified and experienced scientists and has nearly all the major nuclear facilities that are needed for environmental research such as mass spectrometry, tracer techniques, neutron activation analysis (NAA), X-ray fluorescence spectrometry (XRFS), atomic absorption spectrometry (AAS), atomic emission spectrometry (AES), inductively coupled plasma-optical emission spectrometry (ICP-OES) etc. This paper discusses the importance of environmental pollution with a particular reference to the pollution aspects in Pakistan and the associated environmental research experience based on nuclear methods available at PINSTECH. 308 refs. (author)

  6. Long-term environmental and health implications of morphological change and sediment transport with respect to contaminants

    Science.gov (United States)

    Sneddon, Christopher; Copplestone, David; Tyler, Andrew; Hunter, Peter; Smith, Nick

    2014-05-01

    The EPSRC-funded Adaptation and Resilience of Coastal Energy Supply (ARCoES) project encompasses four research strands, involving 14 institutions and six PhD studentships. ARCoES aims to determine the threats posed to future energy generation and the distribution network by flooding and erosion, changing patterns of coastal sedimentation, water temperature and the distribution of plants and animals in the coastal zone. Whilst this research has direct benefits for the operation of coastal power stations, ARCoES aims to have a wider stakeholder engagement through assessing how the resilience of coastal communities may be altered by five hundred years of coastal evolution. Coastal evolution will have substantial implications for the energy sector of the North West of England as former waste storage sites are eroded and remobilised within the intertidal environment. The current intertidal environmental stores of radioactivity will also experience reworking as ocean chemistry changes and saltmarsh chronologies are reworked in response to rising sea levels. There is a duel requirement to understand mass sediment movement along the North West coast of England as understanding the sediment transport dynamics is key to modelling long term coastal change and understanding how the environmental store of radioactivity will be reworked. The University of Stirling is researching the long-term environmental and health implications of remobilisation and transport of contaminated sediments around the UK coastline. Using a synergy of hyperspectral and topographic information the mobilisation of sediment bound contaminants within the coastal environment will be investigated. Potential hazards posed by contaminants are determined by a set of environmental impact test criteria which evaluate the bio-accessibility and ionising dose of contaminants. These test criteria will be used to comment on the likely environmental impact of modelled sediment transport and anticipated changes in

  7. The global threat reduction initiative's radiological security cooperation with Russia - 59361

    International Nuclear Information System (INIS)

    Blanchard, Tiffany A.; Abramson, William J.; Russell, James W. Jr.; Roberts, Catherine K.

    2012-01-01

    The United States (U.S.) Department of Energy (DOE) / National Nuclear Security Administration's (NNSA) Global Threat Reduction Initiative (GTRI) supports both U.S. and international threat reduction goals by securing vulnerable nuclear and radiological material located at civilian sites throughout the world. GTRI's approach to reducing the threat posed by vulnerable, high-activity radioactive sources includes removing and disposing of orphan or disused radioactive sources; implementing physical security upgrades at civilian sites containing radioactive sources; and establishing a cooperative sustainability program at sites to ensure that upgrades are maintained. For many years GTRI has collaborated successfully with the Russian Federation and international partners to improve radiological security in Russia. This paper provides a synopsis of GTRI's accomplishments and cooperation with Russia in the following areas: 1.) recovering and disposing of orphan and disused radioactive sources, 2.) recovering and disposing of radioisotope thermoelectric generators (RTGs), and 3.) providing physical security upgrades at civilian sites that contain vulnerable radiological material. The success of GTRI's program to secure radiological material in the Russian Federation over the past decade is due largely to the hard work, technical expertise, and tenacity of the U.S. laboratory teams and the Russian partner organizations with whom GTRI has worked. GTRI plans to continue building on this history of cooperation in order to recover and secure additional, vulnerable radioactive sources in locations throughout Russia. GTRI also is committed to sustainability efforts so that facilities in Russia receiving physical protection equipment and training are prepared to eventually assume responsibility for those security upgrades. In the years to come, GTRI will combine financial support with capacity building to enhance Russia's domestic programs to address these challenges. Through

  8. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  9. Best practices in ranking communicable disease threats: a literature review, 2015.

    Science.gov (United States)

    O'Brien, Eleanor Charlotte; Taft, Rachel; Geary, Katie; Ciotti, Massimo; Suk, Jonathan E

    2016-04-28

    The threat of serious, cross-border communicable disease outbreaks in Europe poses a significant challenge to public health and emergency preparedness because the relative likelihood of these threats and the pathogens involved are constantly shifting in response to a range of changing disease drivers. To inform strategic planning by enabling effective resource allocation to manage the consequences of communicable disease outbreaks, it is useful to be able to rank and prioritise pathogens. This paper reports on a literature review which identifies and evaluates the range of methods used for risk ranking. Searches were performed across biomedical and grey literature databases, supplemented by reference harvesting and citation tracking. Studies were selected using transparent inclusion criteria and underwent quality appraisal using a bespoke checklist based on the AGREE II criteria. Seventeen studies were included in the review, covering five methodologies. A narrative analysis of the selected studies suggests that no single methodology was superior. However, many of the methods shared common components, around which a 'best-practice' framework was formulated. This approach is intended to help inform decision makers' choice of an appropriate risk-ranking study design.

  10. Local Feature Learning for Face Recognition under Varying Poses

    DEFF Research Database (Denmark)

    Duan, Xiaodong; Tan, Zheng-Hua

    2015-01-01

    In this paper, we present a local feature learning method for face recognition to deal with varying poses. As opposed to the commonly used approaches of recovering frontal face images from profile views, the proposed method extracts the subject related part from a local feature by removing the pose...... related part in it on the basis of a pose feature. The method has a closed-form solution, hence being time efficient. For performance evaluation, cross pose face recognition experiments are conducted on two public face recognition databases FERET and FEI. The proposed method shows a significant...... recognition improvement under varying poses over general local feature approaches and outperforms or is comparable with related state-of-the-art pose invariant face recognition approaches. Copyright ©2015 by IEEE....

  11. Strategic environmental policy when the governments are threatened by relocation

    International Nuclear Information System (INIS)

    Greaker, Mads

    2003-01-01

    This paper analyzes how the threat of relocation influences environmental policy. The stringency of environmental policy is determined in a game between two governments. There is one firm in each jurisdiction, and both firms threaten to relocate their production to the other jurisdiction. Because there is asymmetric information about the cost of relocation, the governments do not know the credibility of the threat. We compare the outcome of this game with the outcome of a game in which relocation is not possible. We find that the threat of relocation can increase both the level of environmental regulation and welfare. The profit tax level proves to be the most decisive for the result; that is, the higher the profit tax level, the lower the level of environmental regulation

  12. Threat of land subsidence in and around Kolkata City and East ...

    Indian Academy of Sciences (India)

    ile wetland to minimize the adverse environmental impacts of groundwater development. This study, for the first time, indicates the threat of possible land subsidence due to unrestricted groundwater abstraction in the EKW and also out- lines a groundwater management plan for sustain- able development of groundwater in ...

  13. Person-Independent Head Pose Estimation Using Biased Manifold Embedding

    Directory of Open Access Journals (Sweden)

    Sethuraman Panchanathan

    2008-02-01

    Full Text Available Head pose estimation has been an integral problem in the study of face recognition systems and human-computer interfaces, as part of biometric applications. A fine estimate of the head pose angle is necessary and useful for several face analysis applications. To determine the head pose, face images with varying pose angles can be considered to be lying on a smooth low-dimensional manifold in high-dimensional image feature space. However, when there are face images of multiple individuals with varying pose angles, manifold learning techniques often do not give accurate results. In this work, we propose a framework for a supervised form of manifold learning called Biased Manifold Embedding to obtain improved performance in head pose angle estimation. This framework goes beyond pose estimation, and can be applied to all regression applications. This framework, although formulated for a regression scenario, unifies other supervised approaches to manifold learning that have been proposed so far. Detailed studies of the proposed method are carried out on the FacePix database, which contains 181 face images each of 30 individuals with pose angle variations at a granularity of 1∘. Since biometric applications in the real world may not contain this level of granularity in training data, an analysis of the methodology is performed on sparsely sampled data to validate its effectiveness. We obtained up to 2∘ average pose angle estimation error in the results from our experiments, which matched the best results obtained for head pose estimation using related approaches.

  14. To Strike a Pose: No Stereotype Backlash for Power Posing Women

    Directory of Open Access Journals (Sweden)

    Miriam Rennung

    2016-09-01

    Full Text Available Power posing, the adoption of open and powerful postures, has effects that parallel those of actual social power. This study explored the social evaluation of adopting powerful versus powerless body postures in men and women regarding perceived warmth, competence, and the likelihood of eliciting admiration, envy, pity, and contempt. Previous findings suggest that the display of power by women may have side effects due to gender stereotyping, namely reduced warmth ratings and negative emotional reactions. An experiment (N = 2,473 asked participants to rate pictures of men and women who adopted high-power or low-power body postures. High-power posers were rated higher on competence, admiration, envy, and contempt compared to low-power posers, whereas the opposite was true for pity. There was no impact of power posing on perceived warmth. Contrary to expectations, the poser’s gender did not moderate any of the effects. These findings suggest that nonverbal displays of power do influence fundamental dimensions of social perception and their accompanying emotional reactions but result in comparably positive and negative evaluations for both genders.

  15. Which US States Pose the Greatest Threats to Military Readiness and Public Health? Public Health Policy Implications for a Cross-sectional Investigation of Cardiorespiratory Fitness, Body Mass Index, and Injuries Among US Army Recruits.

    Science.gov (United States)

    Bornstein, Daniel B; Grieve, George L; Clennin, Morgan N; McLain, Alexander C; Whitsel, Laurie P; Beets, Michael W; Hauret, Keith G; Jones, Bruce H; Sarzynski, Mark A

    2018-01-09

    Many states in the southern region of the United States are recognized for higher rates of obesity, physical inactivity, and chronic disease. These states are therefore recognized for their disproportionate public health burden. The purpose of this study was to investigate state-level distributions of cardiorespiratory fitness, body mass index (BMI), and injuries among US Army recruits in order to determine whether or not certain states may also pose disproportionate threats to military readiness and national security. Sex-specific state-level values for injuries and fitness among 165 584 Army recruits were determined. Next, the relationship between median cardiorespiratory fitness and injury incidence at the state level was examined using Spearman correlations. Finally, multivariable Poisson regression models stratified by sex examined state-level associations between fitness and injury incidence, while controlling for BMI, and other covariates. Cardiorespiratory fitness and training-related injury incidence. A cluster of 10 states from the south and southeastern regions (Alabama, Arkansas, Florida, Georgia, Louisiana, Mississippi, North Carolina, South Carolina, Tennessee, and Texas) produced male or female recruits who were significantly less fit and/or more likely to become injured than recruits from other US states. Compared with the "most fit states," the incidence of injuries increased by 22% (95% CI, 17-28; P < .001) and 28% (95% CI, 19-36; P < .001) in male and female recruits from the "least fit states," respectively. The impact of policies, systems, and environments on physical activity behavior, and subsequently fitness and health, has been clearly established. Advocacy efforts aimed at active living policies, systems, and environmental changes to improve population health often fail. However, advocating for active living policies to improve national security may prove more promising, particularly with legislators. Results from this study demonstrate

  16. Utilization of maize (Zea mays) cob as an adsorbent for lead (II ...

    African Journals Online (AJOL)

    STORAGESEVER

    2009-04-20

    Apr 20, 2009 ... heavy metal of great environmental concern and poses threat to .... groups responsible for interaction with metal ions (Dakiky et al., 2002). ... negatively charged. ... was greatly enhanced by shaking except maize cob at 60.

  17. Robust head pose estimation via supervised manifold learning.

    Science.gov (United States)

    Wang, Chao; Song, Xubo

    2014-05-01

    Head poses can be automatically estimated using manifold learning algorithms, with the assumption that with the pose being the only variable, the face images should lie in a smooth and low-dimensional manifold. However, this estimation approach is challenging due to other appearance variations related to identity, head location in image, background clutter, facial expression, and illumination. To address the problem, we propose to incorporate supervised information (pose angles of training samples) into the process of manifold learning. The process has three stages: neighborhood construction, graph weight computation and projection learning. For the first two stages, we redefine inter-point distance for neighborhood construction as well as graph weight by constraining them with the pose angle information. For Stage 3, we present a supervised neighborhood-based linear feature transformation algorithm to keep the data points with similar pose angles close together but the data points with dissimilar pose angles far apart. The experimental results show that our method has higher estimation accuracy than the other state-of-art algorithms and is robust to identity and illumination variations. Copyright © 2014 Elsevier Ltd. All rights reserved.

  18. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  19. The Vapor Plume at Material Disposal Are C in Relation to Pajarito Corridor Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Masse, William B. [Los Alamos National Laboratory

    2012-04-02

    A vapor plume made up of volatile organic compounds is present beneath Material Disposal Area C (MDA C) at Los Alamos National Laboratory (LANL). The location and concentrations within the vapor plume are discussed in relation to existing and planned facilities and construction activities along Pajarito Road (the 'Pajarito Corridor') and in terms of worker health and safety. This document provides information that indicates that the vapor plume does not pose a threat to the health of LANL workers nor will it pose a threat to workers during construction of proposed facilities along Pajarito Road. The Los Alamos National Laboratory (LANL or the Laboratory) monitors emissions, effluents, and environmental media to meet environmental compliance requirements, determine actions to protect the environment, and monitor the long-term health of the local environment. LANL also studies and characterizes 'legacy' waste from past Laboratory operations to make informed decisions regarding eventual corrective actions and the disposition of that waste. Starting in 1969, these activities have been annually reported in the LANL Environmental Report (formerly Environmental Surveillance Report), and are detailed in publicly accessible technical reports meeting environmental compliance requirements. Included among the legacy sites being investigated are several formerly used material disposal areas (MDAs) set aside by the Laboratory for the general on-site disposal of waste from mission-related activities. One such area is MDA C located in Technical Area 50 (TA-50), which was used for waste disposal between 1948 and 1974. The location of TA-50 is depicted in Figure 1. The present paper uses a series of maps and cross sections to address the public concerns raised about the vapor plume at MDA C. As illustrated here, extensive sampling and data interpretation indicate that the vapor plume at MDA C does not pose a threat to the health of LANL workers nor will it pose a

  20. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  1. U.S. Geological Survey environmental health science strategy: Providing environmental health science for a changing world

    Science.gov (United States)

    Bright, Patricia R.; Buxton, Herbert T.; Balistrieri, Laurie S.; Barber, Larry B.; Chapelle, Francis H.; Cross, Paul C.; Krabbenhoft, David P.; Plumlee, Geoffrey S.; Sleeman, Jonathan M.; Tillitt, Donald E.; Toccalino, Patricia L.; Winton, James R.

    2013-01-01

    America has an abundance of natural resources. We have bountiful clean water, fertile soil, and unrivaled national parks, wildlife refuges, and public lands. These resources enrich our lives and preserve our health and wellbeing. These resources have been maintained because of our history of respect for their value and an enduring commitment to their vigilant protection. Awareness of the social, economic, and personal value of the health of our environment is increasing. The emergence of environmentally driven diseases caused by exposure to contaminants and pathogens is a growing concern worldwide. New health threats and patterns of established threats are affected by both natural and anthropogenic changes to the environment. Human activities are key drivers of emerging (new and re-emerging) health threats. Societal demands for land and natural resources, quality of life, and economic prosperity lead to environmental change. Natural earth processes, climate trends, and related climatic events will compound the environmental impact of human activities. These environmental drivers will influence exposure to disease agents, including viral, bacterial, prion, and fungal pathogens, parasites, synthetic chemicals and substances, natural earth materials, toxins, and other biogenic compounds.

  2. University Students' Problem Posing Abilities and Attitudes towards Mathematics.

    Science.gov (United States)

    Grundmeier, Todd A.

    2002-01-01

    Explores the problem posing abilities and attitudes towards mathematics of students in a university pre-calculus class and a university mathematical proof class. Reports a significant difference in numeric posing versus non-numeric posing ability in both classes. (Author/MM)

  3. Students’ Mathematical Creative Thinking through Problem Posing Learning

    Science.gov (United States)

    Ulfah, U.; Prabawanto, S.; Jupri, A.

    2017-09-01

    The research aims to investigate the differences in enhancement of students’ mathematical creative thinking ability of those who received problem posing approach assisted by manipulative media and students who received problem posing approach without manipulative media. This study was a quasi experimental research with non-equivalent control group design. Population of this research was third-grade students of a primary school in Bandung city in 2016/2017 academic year. Sample of this research was two classes as experiment class and control class. The instrument used is a test of mathematical creative thinking ability. Based on the results of the research, it is known that the enhancement of the students’ mathematical creative thinking ability of those who received problem posing approach with manipulative media aid is higher than the ability of those who received problem posing approach without manipulative media aid. Students who get learning problem posing learning accustomed in arranging mathematical sentence become matter of story so it can facilitate students to comprehend about story

  4. Mines and Underwater IEDs in U.S. Ports and Waterways: Context, Threats, Challenges, and Solutions

    National Research Council Canada - National Science Library

    Truver, Scott C

    2008-01-01

    .... The threats of the Cold War are gone, and the United States finds itself operating in an environment where piracy, illegal migration, drug smuggling, terrorism, arms proliferation, and environmental...

  5. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  6. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  7. Manifolds for pose tracking from monocular video

    Science.gov (United States)

    Basu, Saurav; Poulin, Joshua; Acton, Scott T.

    2015-03-01

    We formulate a simple human-pose tracking theory from monocular video based on the fundamental relationship between changes in pose and image motion vectors. We investigate the natural embedding of the low-dimensional body pose space into a high-dimensional space of body configurations that behaves locally in a linear manner. The embedded manifold facilitates the decomposition of the image motion vectors into basis motion vector fields of the tangent space to the manifold. This approach benefits from the style invariance of image motion flow vectors, and experiments to validate the fundamental theory show reasonable accuracy (within 4.9 deg of the ground truth).

  8. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  9. DEVELOPMENT AND VERIFICATION OF A SCREENING MODEL FOR SURFACE SPREADING OF PETROLEUM

    Science.gov (United States)

    Overflows and leakage from aboveground storage tanks and pipelines carrying crude oil and petroleum products occur frequently. The spilled hydrocarbons pose environmental threats by contaminating the surrounding soil and the underlying ground water. Predicting the fate and transp...

  10. The lighter side of advertising: investigating posing and lighting biases.

    Science.gov (United States)

    Thomas, Nicole A; Burkitt, Jennifer A; Patrick, Regan E; Elias, Lorin J

    2008-11-01

    People tend to display the left cheek when posing for a portrait; however, this effect does not appear to generalise to advertising. The amount of body visible in the image and the sex of the poser might also contribute to the posing bias. Portraits also exhibit lateral lighting biases, with most images being lit from the left. This effect might also be present in advertisements. A total of 2801 full-page advertisements were sampled and coded for posing direction, lighting direction, sex of model, and amount of body showing. Images of females showed an overall leftward posing bias, but the biases in males depended on the amount of body visible. Males demonstrated rightward posing biases for head-only images. Overall, images tended to be lit from the top left corner. The two factors of posing and lighting biases appear to influence one another. Leftward-lit images had more leftward poses than rightward, while the opposite occurred for rightward-lit images. Collectively, these results demonstrate that the posing biases in advertisements are dependent on the amount of body showing in the image, and that biases in lighting direction interact with these posing biases.

  11. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  12. Coupled bias-variance tradeoff for cross-pose face recognition.

    Science.gov (United States)

    Li, Annan; Shan, Shiguang; Gao, Wen

    2012-01-01

    Subspace-based face representation can be looked as a regression problem. From this viewpoint, we first revisited the problem of recognizing faces across pose differences, which is a bottleneck in face recognition. Then, we propose a new approach for cross-pose face recognition using a regressor with a coupled bias-variance tradeoff. We found that striking a coupled balance between bias and variance in regression for different poses could improve the regressor-based cross-pose face representation, i.e., the regressor can be more stable against a pose difference. With the basic idea, ridge regression and lasso regression are explored. Experimental results on CMU PIE, the FERET, and the Multi-PIE face databases show that the proposed bias-variance tradeoff can achieve considerable reinforcement in recognition performance.

  13. Animated pose templates for modeling and detecting human actions.

    Science.gov (United States)

    Yao, Benjamin Z; Nie, Bruce X; Liu, Zicheng; Zhu, Song-Chun

    2014-03-01

    This paper presents animated pose templates (APTs) for detecting short-term, long-term, and contextual actions from cluttered scenes in videos. Each pose template consists of two components: 1) a shape template with deformable parts represented in an And-node whose appearances are represented by the Histogram of Oriented Gradient (HOG) features, and 2) a motion template specifying the motion of the parts by the Histogram of Optical-Flows (HOF) features. A shape template may have more than one motion template represented by an Or-node. Therefore, each action is defined as a mixture (Or-node) of pose templates in an And-Or tree structure. While this pose template is suitable for detecting short-term action snippets in two to five frames, we extend it in two ways: 1) For long-term actions, we animate the pose templates by adding temporal constraints in a Hidden Markov Model (HMM), and 2) for contextual actions, we treat contextual objects as additional parts of the pose templates and add constraints that encode spatial correlations between parts. To train the model, we manually annotate part locations on several keyframes of each video and cluster them into pose templates using EM. This leaves the unknown parameters for our learning algorithm in two groups: 1) latent variables for the unannotated frames including pose-IDs and part locations, 2) model parameters shared by all training samples such as weights for HOG and HOF features, canonical part locations of each pose, coefficients penalizing pose-transition and part-deformation. To learn these parameters, we introduce a semi-supervised structural SVM algorithm that iterates between two steps: 1) learning (updating) model parameters using labeled data by solving a structural SVM optimization, and 2) imputing missing variables (i.e., detecting actions on unlabeled frames) with parameters learned from the previous step and progressively accepting high-score frames as newly labeled examples. This algorithm belongs to a

  14. Electrical Signatures of Ethanol-Liquid Mixtures: Implications for Monitoring Biofuels Migration in the Subsurface

    Science.gov (United States)

    Ethanol (EtOH), an emerging contaminant with potential direct and indirect environmental effects, poses threats to water supplies when spilled in large volumes. A series of experiments was directed at understanding the electrical geophysical signatures arising from groundwater co...

  15. Formulas in inverse and ill-posed problems

    CERN Document Server

    Anikonov, Yu E

    1997-01-01

    The Inverse and Ill-Posed Problems Series is a series of monographs publishing postgraduate level information on inverse and ill-posed problems for an international readership of professional scientists and researchers. The series aims to publish works which involve both theory and applications in, e.g., physics, medicine, geophysics, acoustics, electrodynamics, tomography, and ecology.

  16. Fast human pose estimation using 3D Zernike descriptors

    Science.gov (United States)

    Berjón, Daniel; Morán, Francisco

    2012-03-01

    Markerless video-based human pose estimation algorithms face a high-dimensional problem that is frequently broken down into several lower-dimensional ones by estimating the pose of each limb separately. However, in order to do so they need to reliably locate the torso, for which they typically rely on time coherence and tracking algorithms. Their losing track usually results in catastrophic failure of the process, requiring human intervention and thus precluding their usage in real-time applications. We propose a very fast rough pose estimation scheme based on global shape descriptors built on 3D Zernike moments. Using an articulated model that we configure in many poses, a large database of descriptor/pose pairs can be computed off-line. Thus, the only steps that must be done on-line are the extraction of the descriptors for each input volume and a search against the database to get the most likely poses. While the result of such process is not a fine pose estimation, it can be useful to help more sophisticated algorithms to regain track or make more educated guesses when creating new particles in particle-filter-based tracking schemes. We have achieved a performance of about ten fps on a single computer using a database of about one million entries.

  17. Antibiotics as CECs: An Overview of the Hazards Posed by Antibiotics and Antibiotic Resistance

    Directory of Open Access Journals (Sweden)

    Geoffrey Ivan Scott

    2016-04-01

    Full Text Available ABSTRACTMonitoring programs have traditionally monitored legacy contaminants but are shifting focus to Contaminants of Emerging Concern (CECs. CECs present many challenges for monitoring and assessment, because measurement methods don't always exist nor have toxicological studies been fully conducted to place results in proper context. Also some CECs affect metabolic pathways to produce adverse outcomes that are not assessed through traditional toxicological evaluations. Antibiotics are CECs that pose significant environmental risks including development of both toxic effects at high doses and antibiotic resistance at doses well below the Minimum Inhibitory Concentration (MIC which kill bacteria and have been found in nearly half of all sites monitored in the US. Antimicrobial resistance has generally been attributed to the use of antibiotics in medicine for humans and livestock as well as aquaculture operations. The objective of this study was to assess the extent and magnitude of antibiotics in the environment and estimate their potential hazards in the environment. Antibiotics concentrations were measured in a number of monitoring studies which included Waste Water Treatment Plants (WWTP effluent, surface waters, sediments and biota. A number of studies reported levels of Antibiotic Resistant Microbes (ARM in surface waters and some studies found specific ARM genes (e.g. the blaM-1 gene in E. coli which may pose additional environmental risk. High levels of this gene were found to survive WWTP disinfection and accumulated in sediment at levels 100-1000 times higher than in the sewerage effluent, posing potential risks for gene transfer to other bacteria.in aquatic and marine ecosystems. Antibiotic risk assessment approaches were developed based on the use of MICs and MIC Ratios [High (Antibiotic Resistant/Low (Antibiotic Sensitive MIC] for each antibiotic indicating the range of bacterial adaptability to each antibiotic to help define the No

  18. Transfer between Pose and Illumination Training in Face Recognition

    Science.gov (United States)

    Liu, Chang Hong; Bhuiyan, Md. Al-Amin; Ward, James; Sui, Jie

    2009-01-01

    The relationship between pose and illumination learning in face recognition was examined in a yes-no recognition paradigm. The authors assessed whether pose training can transfer to a new illumination or vice versa. Results show that an extensive level of pose training through a face-name association task was able to generalize to a new…

  19. Innovations in sanitation for sustainable urban growth; modernized mixtures in an east african context

    NARCIS (Netherlands)

    Letema, S.; Van Vliet, B.; Van Lier, J.B.

    2012-01-01

    Urbanisation of poverty and informality in East Africa poses a threat to public health and environmental protection, perpetuating social exclusion and inequalities, while it creates service gaps. Neither conventional on-site sanitation nor modern centralised off-site sanitation provisions are

  20. Gas hydrates and clathrates. Flow assurance, environmental and economic perspectives and the Nigerian liquefied natural gas project

    International Nuclear Information System (INIS)

    Gbaruko, B.C.; Igwe, J.C.; Nwokeoma, R.C.; Gbaruko, P.N.

    2007-01-01

    Gas hydrates are nonstoichiometric crystalline compounds that belong to the inclusion group known as clathrates. They occur when water molecules attach themselves together through hydrogen bonding and form cavities which can be occupied by a single gas or volatile liquid molecule. Gas hydrates, asphaltenes and waxes are three major threats to flow assurance that must be well assessed by design team uptime. Gas hydrates are also looked upon as a future energy source and as a potential climate hazard. The purpose of this review is to show the chemistry and mechanism of gas hydrate formation, the problems they pose, especially to flow assurance, their system implications, their environmental and economic perspectives with respect to their prospects as storage and transport alternative to the liquefied natural gas technology. (author)

  1. An improved silhouette for human pose estimation

    Science.gov (United States)

    Hawes, Anthony H.; Iftekharuddin, Khan M.

    2017-08-01

    We propose a novel method for analyzing images that exploits the natural lines of a human poses to find areas where self-occlusion could be present. Errors caused by self-occlusion cause several modern human pose estimation methods to mis-identify body parts, which reduces the performance of most action recognition algorithms. Our method is motivated by the observation that, in several cases, occlusion can be reasoned using only boundary lines of limbs. An intelligent edge detection algorithm based on the above principle could be used to augment the silhouette with information useful for pose estimation algorithms and push forward progress on occlusion handling for human action recognition. The algorithm described is applicable to computer vision scenarios involving 2D images and (appropriated flattened) 3D images.

  2. Pose estimation for mobile robots working on turbine blade

    Energy Technology Data Exchange (ETDEWEB)

    Ma, X.D.; Chen, Q.; Liu, J.J.; Sun, Z.G.; Zhang, W.Z. [Tsinghua Univ., Beijing (China). Key Laboratory for Advanced Materials Processing Technology, Ministry of Education, Dept. of Mechanical Engineering

    2009-03-11

    This paper discussed a features point detection and matching task technique for mobile robots used in wind turbine blade applications. The vision-based scheme used visual information from the robot's surrounding environment to match successive image frames. An improved pose estimation algorithm based on a scale invariant feature transform (SIFT) was developed to consider the characteristics of local images of turbine blades, pose estimation problems, and conditions. The method included a pre-subsampling technique for reducing computation and bidirectional matching for improving precision. A random sample consensus (RANSAC) method was used to estimate the robot's pose. Pose estimation conditions included a wide pose range; the distance between neighbouring blades; and mechanical, electromagnetic, and optical disturbances. An experimental platform was used to demonstrate the validity of the proposed algorithm. 20 refs., 6 figs.

  3. Temporal subtraction of chest radiographs compensating pose differences

    Science.gov (United States)

    von Berg, Jens; Dworzak, Jalda; Klinder, Tobias; Manke, Dirk; Kreth, Adrian; Lamecker, Hans; Zachow, Stefan; Lorenz, Cristian

    2011-03-01

    Temporal subtraction techniques using 2D image registration improve the detectability of interval changes from chest radiographs. Although such methods are well known for some time they are not widely used in radiologic practice. The reason is the occurrence of strong pose differences between two acquisitions with a time interval of months to years in between. Such strong perspective differences occur in a reasonable number of cases. They cannot be compensated by available image registration methods and thus mask interval changes to be undetectable. In this paper a method is proposed to estimate a 3D pose difference by the adaptation of a 3D rib cage model to both projections. The difference between both is then compensated for, thus producing a subtraction image with virtually no change in pose. The method generally assumes that no 3D image data is available from the patient. The accuracy of pose estimation is validated with chest phantom images acquired under controlled geometric conditions. A subtle interval change simulated by a piece of plastic foam attached to the phantom becomes visible in subtraction images generated with this technique even at strong angular pose differences like an anterior-posterior inclination of 13 degrees.

  4. Population structure, behavior, and current threats to the sarus crane (Grus antigone antigone in Nepal

    Directory of Open Access Journals (Sweden)

    Kamal Raj Gosai

    2016-09-01

    Full Text Available The sarus crane (Grus antigone antigone is listed as “vulnerable” in the International Union for Conservation of Nature (IUCN Red List of Threatened Species. Sarus cranes are distributed in the lowlands, but most live outside protected areas, especially in agricultural areas and wetlands of Nepal. The continuous expansion of agricultural land and the reduction of wetland habitats pose the greatest threats to the conservation of the species. We studied the sarus crane in the Rupandehi District of Nepal to understand their population structure, behavior, and current threats. We used the line (i.e., road transect method from August 2013 to February 2014. The study area contained 147 sarus cranes. Agricultural land and wetland areas contained the highest number of sarus cranes. Our analysis showed that the population of sarus crane in the area has declined since 2007. Most sarus cranes lived in pairs. A single flock contained 13 cranes at maximum. Sarus crane behavior was not significantly different before and after the breeding seasons. Human–sarus crane conflict began when cranes started utilizing agricultural areas. The main threats to the hatching success and survival of sarus cranes in the Rupendehi District are egg theft and the hunting of cranes for meat. The findings of this study establish baseline information on the overall conservation status, habitat availability, and ecological behavior of sarus cranes in the district. We propose regular surveys to monitor sarus crane population levels in the face of multiple anthropogenic threats to their survival.

  5. Threat-sensitive anti-intraguild predation behaviour: maternal strategies to reduce offspring predation risk in mites.

    Science.gov (United States)

    Walzer, Andreas; Schausberger, Peter

    2011-01-01

    Predation is a major selective force for the evolution of behavioural characteristics of prey. Predation among consumers competing for food is termed intraguild predation (IGP). From the perspective of individual prey, IGP differs from classical predation in the likelihood of occurrence because IG prey is usually more rarely encountered and less profitable because it is more difficult to handle than classical prey. It is not known whether IGP is a sufficiently strong force to evolve interspecific threat sensitivity in antipredation behaviours, as is known from classical predation, and if so whether such behaviours are innate or learned. We examined interspecific threat sensitivity in antipredation in a guild of predatory mite species differing in adaptation to the shared spider mite prey (i.e. Phytoseiulus persimilis, Neoseiulus californicus and Amblyseius andersoni). We first ranked the players in this guild according to the IGP risk posed to each other: A. andersoni was the strongest IG predator; P. persimilis was the weakest. Then, we assessed the influence of relative IGP risk and experience on maternal strategies to reduce offspring IGP risk: A. andersoni was insensitive to IGP risk. Threat sensitivity in oviposition site selection was induced by experience in P. persimilis but occurred independently of experience in N. californicus. Irrespective of experience, P. persimilis laid fewer eggs in choice situations with the high- rather than low-risk IG predator. Our study suggests that, similar to classical predation, IGP may select for sophisticated innate and learned interspecific threat-sensitive antipredation responses. We argue that such responses may promote the coexistence of IG predators and prey.

  6. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  7. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  8. Treatment of Leptothrix Cells with Ultrapure Water Poses a Threat to Their Viability

    Directory of Open Access Journals (Sweden)

    Tatsuki Kunoh

    2015-01-01

    Full Text Available The genus Leptothrix, a type of Fe/Mn-oxidizing bacteria, is characterized by its formation of an extracellular and microtubular sheath. Although almost all sheaths harvested from natural aquatic environments are hollow, a few chained bacterial cells are occasionally seen within some sheaths of young stage. We previously reported that sheaths of Leptothrix sp. strain OUMS1 cultured in artificial media became hollow with aging due to spontaneous autolysis within the sheaths. In this study, we investigated environmental conditions that lead the OUMS1 cells to die. Treatment of the cells with ultrapure water or acidic buffers (pH 6.0 caused autolysis of the cells. Under these conditions, the plasma membrane and cytoplasm of cells were drastically damaged, resulting in leakage of intracellular electrolytes and relaxation of genomic DNA. The autolysis was suppressed by the presence of Ca2+. The hydrolysis of peptidoglycan by the lysozyme treatment similarly caused autolysis of the cells and was suppressed also by the presence of Ca2+. However, it remains unclear whether the acidic pH-dependent autolysis is attributable to damage of peptidoglycan. It was observed that L. discophora strain SP-6 cells also underwent autolysis when suspended in ultrapure water; it is however, uncertain whether this phenomenon is common among other members of the genus Leptothrix.

  9. Treatment of Leptothrix Cells with Ultrapure Water Poses a Threat to Their Viability

    Science.gov (United States)

    Kunoh, Tatsuki; Suzuki, Tomoko; Shiraishi, Tomonori; Kunoh, Hitoshi; Takada, Jun

    2015-01-01

    The genus Leptothrix, a type of Fe/Mn-oxidizing bacteria, is characterized by its formation of an extracellular and microtubular sheath. Although almost all sheaths harvested from natural aquatic environments are hollow, a few chained bacterial cells are occasionally seen within some sheaths of young stage. We previously reported that sheaths of Leptothrix sp. strain OUMS1 cultured in artificial media became hollow with aging due to spontaneous autolysis within the sheaths. In this study, we investigated environmental conditions that lead the OUMS1 cells to die. Treatment of the cells with ultrapure water or acidic buffers (pH 6.0) caused autolysis of the cells. Under these conditions, the plasma membrane and cytoplasm of cells were drastically damaged, resulting in leakage of intracellular electrolytes and relaxation of genomic DNA. The autolysis was suppressed by the presence of Ca2+. The hydrolysis of peptidoglycan by the lysozyme treatment similarly caused autolysis of the cells and was suppressed also by the presence of Ca2+. However, it remains unclear whether the acidic pH-dependent autolysis is attributable to damage of peptidoglycan. It was observed that L. discophora strain SP-6 cells also underwent autolysis when suspended in ultrapure water; it is however, uncertain whether this phenomenon is common among other members of the genus Leptothrix. PMID:25634812

  10. Brookhaven National Laboratory site environmental report for calendar year 1993

    International Nuclear Information System (INIS)

    Naidu, J.R.; Royce, B.A.

    1994-05-01

    This report documents the results of the Environmental Monitoring Program at BNL and presents summary information about environmental compliance for 1993. To evaluate the effect of BNL operations on the local environment, measurements of direct radiation, and a variety of radionuclides and chemical compounds in ambient air, soil, sewage effluent, surface water, ground water and vegetation were made at the BNL site and at sites adjacent to the Laboratory. Brookhaven National Laboratory's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment were evaluated. Among the permitted facilities, two instances, of pH exceedances were observed at recharge basins, possible related to rain-water run-off to these recharge basins. Also, the discharge from the Sewage Treatment Plant (STP) to the Peconic River exceeded on five occasions, three for residual chlorine and one each for iron and ammonia nitrogen. The chlorine exceedances were related to a malfunctioning hypochlorite dosing pump and ceased when the pump was repaired. While the iron and ammonia-nitrogen could be the result of disturbances to the sand filter beds during maintenance. The environmental monitoring data has identified site-specific contamination of ground water and soil. These areas are subject to Remedial Investigation/Feasibility Studies (RI/FS) under the Inter Agency Agreement (IAG). Except for the above, the environmental monitoring data has continued to demonstrate that compliance was achieved with applicable environmental laws and regulations governing emission and discharge of materials to the environment, and that the environmental impacts at BNL are minimal and pose no threat to the public or to the environment. This report meets the requirements of DOE Orders 5484. 1, Environmental Protection, Safety, and Health Protection Information reporting requirements and 5400.1, General Environmental Protection Programs

  11. Non-standard and improperly posed problems

    CERN Document Server

    Straughan, Brian; Ames, William F

    1997-01-01

    Written by two international experts in the field, this book is the first unified survey of the advances made in the last 15 years on key non-standard and improperly posed problems for partial differential equations.This reference for mathematicians, scientists, and engineers provides an overview of the methodology typically used to study improperly posed problems. It focuses on structural stability--the continuous dependence of solutions on the initial conditions and the modeling equations--and on problems for which data are only prescribed on part of the boundary.The book addresses continuou

  12. Scorched earth: will environmental risks in China overwhelm its opportunities?

    Science.gov (United States)

    Economy, Elizabeth; Lieberthal, Kenneth

    2007-06-01

    Of all the risks of doing business in China, the greatest is the threat posed by environmental degradation. And yet it's barely discussed in corporate boardrooms. This is a serious mistake. Multinationals may be more concerned with intellectual property rights violations, corruption, and potential political instability, but the Chinese government, NGOs, and the Chinese press have been focused squarely on the country's energy shortages, soil erosion, lack of water, and pollution problems, which are so severe they might constrain GDP growth. What's more, the Chinese expect the international community to take the lead in environmental protection. If that doesn't happen, multinationals face clear risks to their operations, their workers' health, and their reputations. In factoring environmental issues into their China strategies, foreign firms need to be both defensive, taking steps to reduce harm, and proactive, investing in environmental protection efforts. Coca-Cola, for example, installed state-of-the-art bottling plants in China that operate with no net loss of water resources. Mattel increased the safety of its Barbie-manufacturing process to protect workers' health. With its efforts to reduce greenhouse gas emissions, GE is shrinking its environmental footprint in China; more proactively, GE is working closely with the Chinese government and scientists to develop clean coal, water purification, and water reuse technologies. In considering the value of such efforts, companies can not only factor in reduced risk but also increased opportunity, as they use innovations designed for the Chinese market in the rest of the world. The bottom line: How well multinationals address environmental issues in China will affect their fortunes in one of the most important economies in the world.

  13. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  14. Adapting to the Changing Climate: An Assessment of Local Health Department Preparations for Climate Change-Related Health Threats, 2008-2012.

    Science.gov (United States)

    Roser-Renouf, Connie; Maibach, Edward W; Li, Jennifer

    2016-01-01

    Climate change poses a major public health threat. A survey of U.S. local health department directors in 2008 found widespread recognition of the threat, but limited adaptive capacity, due to perceived lack of expertise and other resources. We assessed changes between 2008 and 2012 in local public health departments' preparedness for the public health threats of climate change, in light of increasing national polarization on the issue, and widespread funding cutbacks for public health. A geographically representative online survey of directors of local public health departments was conducted in 2011-2012 (N = 174; response rate = 50%), and compared to the 2008 telephone survey results (N = 133; response rate = 61%). Significant polarization had occurred: more respondents in 2012 were certain that the threat of local climate change impacts does/does not exist, and fewer were unsure. Roughly 10% said it is not a threat, compared to 1% in 2008. Adaptation capacity decreased in several areas: perceived departmental expertise in climate change risk assessment; departmental prioritization of adaptation; and the number of adaptation-related programs and services departments provided. In 2008, directors' perceptions of local impacts predicted the number of adaptation-related programs and services their departments offered, but in 2012, funding predicted programming and directors' impact perceptions did not. This suggests that budgets were constraining directors' ability to respond to local climate change-related health threats. Results also suggest that departmental expertise may mitigate funding constraints. Strategies for overcoming these obstacles to local public health departments' preparations for climate change are discussed.

  15. Method of orthogonally splitting imaging pose measurement

    Science.gov (United States)

    Zhao, Na; Sun, Changku; Wang, Peng; Yang, Qian; Liu, Xintong

    2018-01-01

    In order to meet the aviation's and machinery manufacturing's pose measurement need of high precision, fast speed and wide measurement range, and to resolve the contradiction between measurement range and resolution of vision sensor, this paper proposes an orthogonally splitting imaging pose measurement method. This paper designs and realizes an orthogonally splitting imaging vision sensor and establishes a pose measurement system. The vision sensor consists of one imaging lens, a beam splitter prism, cylindrical lenses and dual linear CCD. Dual linear CCD respectively acquire one dimensional image coordinate data of the target point, and two data can restore the two dimensional image coordinates of the target point. According to the characteristics of imaging system, this paper establishes the nonlinear distortion model to correct distortion. Based on cross ratio invariability, polynomial equation is established and solved by the least square fitting method. After completing distortion correction, this paper establishes the measurement mathematical model of vision sensor, and determines intrinsic parameters to calibrate. An array of feature points for calibration is built by placing a planar target in any different positions for a few times. An terative optimization method is presented to solve the parameters of model. The experimental results show that the field angle is 52 °, the focus distance is 27.40 mm, image resolution is 5185×5117 pixels, displacement measurement error is less than 0.1mm, and rotation angle measurement error is less than 0.15°. The method of orthogonally splitting imaging pose measurement can satisfy the pose measurement requirement of high precision, fast speed and wide measurement range.

  16. Environmental radioactivity in the Netherlands : results in 2010

    OpenAIRE

    Knetsch, G.J.; Krijger, G.C.; Weseman, J.M.; Vos van Avezathe, A.; Verbunt, J.T.

    2010-01-01

    The measurements in the air and environment showed normal levels, which are within the range of previous years. The deposition of polonium-210 showed the highest level since 1993 but approximately the same level as in 2009. These levels do not pose a threat to public health. As in previous years radioactivity levels in food and milk were well below the export and consumption limits set by the European Union.

  17. suitability of polyvinyl waste powder as partial replacement

    African Journals Online (AJOL)

    eobe

    as partial replacement of cement in the production o. PWP at interval ... conducted to assess the suitability of polyvinyl waste p polyvinyl waste p .... pose a serious environmental threat because of the fact that they ... served as the control. 2.2.3.

  18. Characterization of Emissions from Open Burning of Meals Ready-to-Eat and their Paperboard Packaging

    Science.gov (United States)

    Emissions from burning current and candidate Meals Ready-to-Eat (MRE) packaging and shipping containers were characterized in an effort to assuage concerns that combustive disposal of waste at forward operating bases could pose an environmental or inhalation threat. Four types of...

  19. A Pyoverdin Siderophore Produced By Pseudomonas aeruginosa CHL-004 Binds Lead And Other Heavy Metals

    Science.gov (United States)

    Heavy metal pollution in soils, sediments and wastewater poses a significant environmental and public health threat due to toxicity and the potential for bioaccumulation in both plant and animal tissues. Remediation of heavy metals in soils and sediments using solely physical or...

  20. A Pyoverdin Siderophore Produced By Pseudomonas aeruginosa CHL-004 Binds Lead And Other Heavy Metals - (Poster)

    Science.gov (United States)

    Heavy metal pollution in soils, sediments and wastewater poses a significant environmental and public health threat due to toxicity and the potential for bioaccumulation in both plant and animal tissues. Remediation of heavy metals in soils and sediments using solely physical or...

  1. Seasonal Climate Extremes : Mechanism, Predictability and Responses to Global Warming

    NARCIS (Netherlands)

    Shongwe, M.E.

    2010-01-01

    Climate extremes are rarely occurring natural phenomena in the climate system. They often pose one of the greatest environmental threats to human and natural systems. Statistical methods are commonly used to investigate characteristics of climate extremes. The fitted statistical properties are often

  2. Assessing sanitary mixtures in East African cities

    NARCIS (Netherlands)

    Letema, S.C.

    2012-01-01

    The urbanisation of poverty and informality in East African cities poses a threat to environmental
    health, perpetuates social exclusion and inequalities, and creates service gaps (UN-Habitat, 2008).
    This makes conventional sanitation provision untenable citywide, giving rise to the

  3. Perceived Vulnerability to Disease Predicts Environmental Attitudes

    Science.gov (United States)

    Prokop, Pavol; Kubiatko, Milan

    2014-01-01

    Investigating predictors of environmental attitudes may bring valuable benefits in terms of improving public awareness about biodiversity degradation and increased pro-environmental behaviour. Here we used an evolutionary approach to study environmental attitudes based on disease-threat model. We hypothesized that people vulnerable to diseases may…

  4. Analysis of inland crude oil spill threats, vulnerabilities, and emergency response in the midwest United States.

    Science.gov (United States)

    Brody, Thomas M; Di Bianca, Paisly; Krysa, Jan

    2012-10-01

    Although coastal oil spills tend to be highly publicized, crude oil spills in the United States affect inland areas relatively often. Spills to inland areas often affect sensitive environments and can have greater impacts to health and welfare than spills to coastal areas. For these reasons, the authors investigated inland crude oil spill threats, vulnerabilities, and emergency response in the midwestern U.S. states of Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin. These states work with the Region 5 Offices of the U.S. Environmental Protection Agency. Region 5's geospatial data in the Inland Sensitivity Atlas were turned into metrics indicating inland crude oil spill threats and vulnerabilities among the Region's sub-watersheds. These threats and vulnerabilities were weighted using data from the National Response Center and the Department of Energy's Environmental Restoration Priority System. The locations of the Region's emergency responders were geocoded in GIS. The GIS calculated the emergency response times to the Region's sub-watersheds. The resulting scatter plots are connected to the sub-watersheds in the map so stakeholders can (1) see the outlying sub-watersheds of concern and (2) better understand how reducing threats and better response time can reduce the risk of inland crude oil spills. Published 2012. This article is a U.S. Government work and is in the public domain in the U.S.A.

  5. Health and environmental effects of oil and gas technologies: Research needs. A report to the Federal Interagency Committee on the health and environmental effects of energy technologies. Draft

    International Nuclear Information System (INIS)

    2006-01-01

    This report discusses health and environmental issues associated with oil and gas technologies as they are currently perceived - both those that exist and those that are expected to emerge over the next two decades. The various sections of this report contain discussions of specific problem areas and relevant new research activities which should be pursued. This is not an exhaustive investigation of all problem areas, but the report explores a wide range of issues to provide a comprehensive picture of existing uncertainties, trends, and other factors that should serve as the focus of future research. The problem areas of major concern include: effects of drilling fluids, offshore accidents, refineries and worker health, soil biota and petroleum spills, indoor air pollution, information transfer, and unconventional resources. These are highlighted in the Executive Summary because they pose serious threats to human health and the environment, and because of the sparsity of accumulated knowledge related to their definition

  6. Health and environmental effects of oil and gas technologies: Research needs. A report to the Federal Interagency Committee on the health and environmental effects of energy technologies. Draft

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    This report discusses health and environmental issues associated with oil and gas technologies as they are currently perceived - both those that exist and those that are expected to emerge over the next two decades. The various sections of this report contain discussions of specific problem areas and relevant new research activities which should be pursued. This is not an exhaustive investigation of all problem areas, but the report explores a wide range of issues to provide a comprehensive picture of existing uncertainties, trends, and other factors that should serve as the focus of future research. The problem areas of major concern include: effects of drilling fluids, offshore accidents, refineries and worker health, soil biota and petroleum spills, indoor air pollution, information transfer, and unconventional resources. These are highlighted in the Executive Summary because they pose serious threats to human health and the environment, and because of the sparsity of accumulated knowledge related to their definition.

  7. Building relationships with foreign governments in support of threat reduction

    International Nuclear Information System (INIS)

    Cajigal, George L.

    2007-01-01

    The effectiveness of any multinational effort in support of threat reduction depends on the relationship developed between the nation receiving the assistance and the donor nations. The effectiveness of this relationship must be based on a solid legal and cooperative framework that establishes the ground rules for the interaction between all parties involved. The author proposes in this paper to outline major considerations by the donor nation and the nation receiving the assistance as they establish an effective approach to threat-reduction efforts. The legal framework needs to be founded on a well-developed, country-to-country agreement that establishes general ground rules and officially recognizes the collaborative effort in an internationally binding document between signatories. This document normally addresses such issues as liability, tax exemptions, import duties, contracts, applicable environmental regulations, etc. Also, of utmost importance is the establishment of a collaborative framework. The basis for such a collaborative framework must be the buy-in into a common objective, the willingness to share concerns and work toward resolutions, and continuous communications. Only when a proper legal framework and a collaborative approach are established can effective relationships be built to enhance threat-reduction efforts. (author)

  8. Public Talks and Science Listens: A Community-Based Participatory Approach to Characterizing Environmental Health Risk Perceptions and Assessing Recovery Needs in the Wake of Hurricanes Katrina and Rita

    Science.gov (United States)

    Sullivan, J.; Parras, B.; St. Marie, R.; Subra, W.; Petronella, S.; Gorenstein, J.; Fuchs-Young, R.; Santa, R.K.; Chavarria, A.; Ward, J.; Diamond, P.

    2009-01-01

    In response to the human health threats stemming from Hurricanes Katrina and Rita, inter-disciplinary working groups representing P30-funded Centers of the National Institute Environmental Health Sciences were created to assess threats posed by mold, harmful alga blooms, chemical toxicants, and various infectious agents at selected sites throughout the hurricane impact zone. Because of proximity to impacted areas, UTMB NIEHS Center in Environmental Toxicology was charged with coordinating direct community outreach efforts, primarily in south Louisiana. In early October 2005, UTMB/NIEHS Center Community Outreach and Education Core, in collaboration with outreach counterparts at The University of Texas MD Anderson Cancer Center @ Smithville TX/Center for Research in Environmental Disease sent two groups into southern Louisiana. One group used Lafourche Parish as a base to deliver humanitarian aid and assess local needs for additional supplies during local recovery/reclamation. A second group, ranging through New Iberia, New Orleans, Chalmette, rural Terrebonne, Lafourche and Jefferson Parishes and Baton Rouge met with community environmental leaders, emergency personnel and local citizens to 1) sample public risk perceptions, 2) evaluate the scope and reach of ongoing risk communication efforts, and 3) determine how the NIEHS could best collaborate with local groups in environmental health research and local capacity building efforts. This scoping survey identified specific information gaps limiting efficacy of risk communication, produced a community “wish list” of potential collaborative research projects. The project provided useful heuristics for disaster response and management planning and a platform for future collaborative efforts in environmental health assessment and risk communication with local advocacy groups in south Terrebonne-Lafourche parishes. PMID:20508756

  9. Public Talks and Science Listens: A Community-Based Participatory Approach to Characterizing Environmental Health Risk Perceptions and Assessing Recovery needs in the Wake of Hurricanes Katrina and Rita

    Directory of Open Access Journals (Sweden)

    J. Sullivan

    2009-01-01

    Full Text Available In response to the human health threats stemming from Hurricanes Katrina and Rita, inter-disciplinary working groups representing P30-funded Centers of the National Institute Environmental Health Sciences were created to assess threats posed by mold, harmful alga blooms, chemical toxicants, and various infectious agents at selected sites throughout the hurricane impact zone. Because of proximity to impacted areas, UTMB NIEHS Center in Environmental Toxicology was charged with coordinating direct community outreach efforts, primarily in south Louisiana. In early October 2005, UTMB/NIEHS Center Community Outreach and Education Core, in collaboration with outreach counterparts at The University of Texas MD Anderson Cancer Center @ Smithville TX/Center for Research in Environmental Disease sent two groups into southern Louisiana. One group used Lafourche Parish as a base to deliver humanitarian aid and assess local needs for additional supplies during local recovery/reclamation. A second group, ranging through New Iberia, New Orleans, Chalmette, rural Terrebonne, Lafourche and Jefferson Parishes and Baton Rouge met with community environmental leaders, emergency personnel and local citizens to 1 sample public risk perceptions, 2 evaluate the scope and reach of ongoing risk communication efforts, and 3 determine how the NIEHS could best collaborate with local groups in environmental health research and local capacity building efforts. This scoping survey identified specific information gaps limiting efficacy of risk communication, produced a community “wish list” of potential collaborative research projects. The project provided useful heuristics for disaster response and management planning and a platform for future collaborative efforts in environmental health assessment and risk communication with local advocacy groups in south Terrebonne-Lafourche parishes.

  10. Pose estimation of industrial objects towards robot operation

    Science.gov (United States)

    Niu, Jie; Zhou, Fuqiang; Tan, Haishu; Cao, Yu

    2017-10-01

    With the advantages of wide range, non-contact and high flexibility, the visual estimation technology of target pose has been widely applied in modern industry, robot guidance and other engineering practices. However, due to the influence of complicated industrial environment, outside interference factors, lack of object characteristics, restrictions of camera and other limitations, the visual estimation technology of target pose is still faced with many challenges. Focusing on the above problems, a pose estimation method of the industrial objects is developed based on 3D models of targets. By matching the extracted shape characteristics of objects with the priori 3D model database of targets, the method realizes the recognition of target. Thus a pose estimation of objects can be determined based on the monocular vision measuring model. The experimental results show that this method can be implemented to estimate the position of rigid objects based on poor images information, and provides guiding basis for the operation of the industrial robot.

  11. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    International Nuclear Information System (INIS)

    1993-01-01

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they're designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn't necessarily the high priority. And that could be very troubling news for the Arctic in the future

  12. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they`re designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn`t necessarily the high priority. And that could be very troubling news for the Arctic in the future.

  13. Multi-view 3D Human Pose Estimation in Complex Environment

    NARCIS (Netherlands)

    Hofmann, K.M.; Gavrila, D.M.

    2012-01-01

    We introduce a framework for unconstrained 3D human upper body pose estimation from multiple camera views in complex environment. Its main novelty lies in the integration of three components: single-frame pose recovery, temporal integration and model texture adaptation. Single-frame pose recovery

  14. Contactless and pose invariant biometric identification using hand surface.

    Science.gov (United States)

    Kanhangad, Vivek; Kumar, Ajay; Zhang, David

    2011-05-01

    This paper presents a novel approach for hand matching that achieves significantly improved performance even in the presence of large hand pose variations. The proposed method utilizes a 3-D digitizer to simultaneously acquire intensity and range images of the user's hand presented to the system in an arbitrary pose. The approach involves determination of the orientation of the hand in 3-D space followed by pose normalization of the acquired 3-D and 2-D hand images. Multimodal (2-D as well as 3-D) palmprint and hand geometry features, which are simultaneously extracted from the user's pose normalized textured 3-D hand, are used for matching. Individual matching scores are then combined using a new dynamic fusion strategy. Our experimental results on the database of 114 subjects with significant pose variations yielded encouraging results. Consistent (across various hand features considered) performance improvement achieved with the pose correction demonstrates the usefulness of the proposed approach for hand based biometric systems with unconstrained and contact-free imaging. The experimental results also suggest that the dynamic fusion approach employed in this work helps to achieve performance improvement of 60% (in terms of EER) over the case when matching scores are combined using the weighted sum rule.

  15. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  16. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  17. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  18. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  19. How threats influence the evolutionary resolution of within-group conflict.

    Science.gov (United States)

    Cant, Michael A; Johnstone, Rufus A

    2009-06-01

    Most examples of cooperation in nature share a common feature: individuals can interact to produce a productivity benefit or fitness surplus, but there is conflict over how these gains are shared. A central question is how threats to exercise outside options influence the resolution of conflict within such cooperative associations. Here we show how a simple principle from economic bargaining theory, the outside option principle, can help to solve this problem in biological systems. According to this principle, outside options will affect the resolution of conflict only when the payoff of taking up these options exceeds the payoffs individuals can obtain from bargaining or negotiating within the group; otherwise, threats to exercise outside options are not credible and are therefore irrelevant. We show that previous attempts to incorporate outside options in synthetic models of reproductive conflict fail to distinguish between credible and incredible threats, and then we use the outside option principle to develop credible synthetic models in two contexts: reproductive skew and biparental care. A striking prediction of our analysis is that outside options are least relevant to the resolution of conflict in cooperative groups of kin and are most relevant in transient associations or interactions among nonrelatives. Our analysis shows a way to link the resolution of within-group conflict to the environmental setting in which it occurs, and it illuminates the role of threats in the evolution of social behavior.

  20. Methods of RVD object pose estimation and experiments

    Science.gov (United States)

    Shang, Yang; He, Yan; Wang, Weihua; Yu, Qifeng

    2007-11-01

    Methods of measuring a RVD (rendezvous and docking) cooperative object's pose from monocular and binocular images respectively are presented. The methods solve the initial values first and optimize the object pose parameters by bundle adjustment. In the disturbance-rejecting binocular method, chosen measurement system parameters of one camera's exterior parameters are modified simultaneously. The methods need three or more cooperative target points to measure the object's pose accurately. Experimental data show that the methods converge quickly and stably, provide accurate results and do not need accurate initial values. Even when the chosen measurement system parameters are subjected to some amount of disturbance, the binocular method manages to provide fairly accurate results.

  1. Single-frame 3D human pose recovery from multiple views

    NARCIS (Netherlands)

    Hofmann, M.; Gavrila, D.M.

    2009-01-01

    We present a system for the estimation of unconstrained 3D human upper body pose from multi-camera single-frame views. Pose recovery starts with a shape detection stage where candidate poses are generated based on hierarchical exemplar matching in the individual camera views. The hierarchy used in

  2. Asian river fishes in the Anthropocene: threats and conservation challenges in an era of rapid environmental change.

    Science.gov (United States)

    Dudgeon, D

    2011-12-01

    This review compares and contrasts the environmental changes that have influenced, or will influence, fishes and fisheries in the Yangtze and Mekong Rivers. These two rivers have been chosen because they differ markedly in the type and intensity of prevailing threats. The Mekong is relatively pristine, whereas the Three Gorges Dam on the Yangtze is the world's largest dam representing the apotheosis of environmental alteration of Asian rivers thus far. Moreover, it is situated at the foot of a planned cascade of at least 12 new dams on the upper Yangtze. Anthropogenic effects of dams and pollution of Yangtze fishes will be exacerbated by plans to divert water northwards along three transfer routes, in part to supplement the flow of the Yellow River. Adaptation to climate change will undoubtedly stimulate more dam construction and flow regulation, potentially causing perfect storm conditions for fishes in the Yangtze. China has already built dams along the upper course of the Mekong, and there are plans for as many as 11 mainstream dams in People's Democratic Republic (Laos) and Cambodia in the lower Mekong Basin. If built, they could have profound consequences for biodiversity, fisheries and human livelihoods, and such concerns have stalled dam construction. Potential effects of dams proposed for other rivers (such as Nujiang-Salween) are also cause for concern. Conservation or restoration measures to sustain some semblance of the rich fish biodiversity of Asian rivers can be identified, but their implementation may prove problematic in a context of increasing Anthropocene alteration of these ecosystems. © 2011 The Author. Journal of Fish Biology © 2011 The Fisheries Society of the British Isles.

  3. Turkish Primary School Teachers' Opinions about Problem Posing

    Science.gov (United States)

    Kilic, Cigdem

    2013-01-01

    Problem posing is one of the most important topics in a mathematics education. Through problem posing, students gain mathematical abilities and concepts and teachers can evaluate their students and arrange adequate learning environments. The aim of the present study is to investigate Turkish primary school teachers' opinions about problem posing…

  4. Standard diffusive systems are well-posed linear systems

    NARCIS (Netherlands)

    Matignon, Denis; Zwart, Heiko J.

    2004-01-01

    The class of well-posed linear systems as introduced by Salamon has become a well-understood class of systems, see e.g. the work of Weiss and the book of Staffans. Many partial partial differential equations with boundary control and point observation can be formulated as a well-posed linear system.

  5. Identifying and assessing environmental awareness of hotel and restaurant employees' attitudes in the Amasra District of Bartin.

    Science.gov (United States)

    Yucedag, Cengiz; Kaya, Latif Gurkan; Cetin, Mehmet

    2018-01-05

    Environmental damage occurring on individual, institutional, and societal levels is one of the major problems in the world and results from mostly unconscious human behavior. This damage poses serious threats to human health and other habitats. The aim of this study is to determine the level of environmental awareness of hotel and restaurant employees in the Amasra District of Bartin, Turkey. For this purpose, a descriptive survey method is used to measure 16 items with a 5-point Likert scale. Data are obtained from 200 employees in the hotels and restaurants as of 2015. The reliability coefficient is found to be 0.74. This data reveals that only 43% of hotels and 72% of restaurants in Amasra have recycling bins. Males and Bachelor's degree holders have more environmental awareness. Enterprises established after 2011 follow popular journals related to environment more than those before 2011. As a result, it is essential to organize educational meetings and seminars related to environmental awareness for hotel and restaurant employees in order to improve the tourism industry's environmental impact. The results show that the legislation has resulted in general environmental awareness and that the organizations are willing to change their business processes and environmental strategies. Nevertheless, despite their actions, there is little awareness of the benefits that can result from cost reductions resulting from environmentally friendly practices. Those affected by their suppliers act to reduce waste but do not deploy formal environmental management systems or use environmental messages to market their goods or services.

  6. Education in Grenada--Marxism or Pan-Africanism? [and] Churches in Grenada: Doing Theology in the Struggles of the People. [and] Grenada's New Airport: A Treat or a Threat?

    Science.gov (United States)

    Alexander, E. Curtis

    Reported are the author's personal accounts of a tour of Grenada to determine the extent to which Marxist-Leninist thought was being taught in schools, the relationship between the clergy and the government of Grenada, and whether the new international airport posed a threat to U.S. national security. In the new educational system, a Centre for…

  7. Pose estimation for augmented reality applications using genetic algorithm.

    Science.gov (United States)

    Yu, Ying Kin; Wong, Kin Hong; Chang, Michael Ming Yuen

    2005-12-01

    This paper describes a genetic algorithm that tackles the pose-estimation problem in computer vision. Our genetic algorithm can find the rotation and translation of an object accurately when the three-dimensional structure of the object is given. In our implementation, each chromosome encodes both the pose and the indexes to the selected point features of the object. Instead of only searching for the pose as in the existing work, our algorithm, at the same time, searches for a set containing the most reliable feature points in the process. This mismatch filtering strategy successfully makes the algorithm more robust under the presence of point mismatches and outliers in the images. Our algorithm has been tested with both synthetic and real data with good results. The accuracy of the recovered pose is compared to the existing algorithms. Our approach outperformed the Lowe's method and the other two genetic algorithms under the presence of point mismatches and outliers. In addition, it has been used to estimate the pose of a real object. It is shown that the proposed method is applicable to augmented reality applications.

  8. Posing Problems to Understand Children's Learning of Fractions

    Science.gov (United States)

    Cheng, Lu Pien

    2013-01-01

    In this study, ways in which problem posing activities aid our understanding of children's learning of addition of unlike fractions and product of proper fractions was examined. In particular, how a simple problem posing activity helps teachers take a second, deeper look at children's understanding of fraction concepts will be discussed. The…

  9. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  10. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  11. INTERNATIONAL LEGAL ASPECTS OF DEALING WITH THE CONTEMPORARY TERRORISM THREATS

    Directory of Open Access Journals (Sweden)

    Vesna Poposka

    2017-05-01

    Full Text Available Recent challenges in international security posed by two terrorist organizations, Al Qaeda and ISIS, have highlighted an urgent domestic and foreign policy challenge. Terrorism has been, for more than a decade, top headline in the world media, and the cost of terrorist activities is expressed in numerous human lives and enormous material damage. Yet to date, international organizations and governments have not been successful in the attempt to find a common definition or uniform approach. Up to now, the approaches towards terrorist activities differ from case to case. There is no single legal regime to deal with terrorist activities, and the legal regime is what gives the answer and the framework for the counter-terrorist activities of the security forces, in order to be able to deal with the threat. This paper will attempt to answer at least some of the dilemmas.

  12. Identifying Environmental and Human Factors Associated With Tick Bites using Volunteered Reports and Frequent Pattern Mining

    NARCIS (Netherlands)

    Garcia-Martí, Irene; Zurita-Milla, Raul; Swart, Arno; Wijngaard, van den Kees C.; Vliet, van Arnold J.H.; Bennema, Sita; Harms, Margriet

    2017-01-01

    Tick populations and tick-borne diseases like Lyme borreliosis have been steadily increasing since the mid-1990s. Realizing the threat that ticks pose to public health, two Dutch citizen science projects have collected tick bite reports since 2006. This unique volunteered geographical dataset,

  13. The emerging response of the insurance industry to the threat of climate change

    International Nuclear Information System (INIS)

    Leggett, J.

    1994-01-01

    The insurance industry is waking up fast to the threat anthropogenic enhancement of the greenhouse effect poses to its future market security. This has been in large measure because of a suspicious escalation in losses from windstorms and drought-related wildfire in recent years. Articulating worst-case analysis fears of a global-warming future, senior industry figures in London, Zurich, Munich, Tokyo and New York have spoken of the potential for a global collapse of the insurance industry. Such an eventuality would have negative consequences in many areas of economic activity. These consequences have been little explored or appreciated in the climate-change debate to date. In some developing countries, meanwhile, withdrawal of catastrophe insurance cover is already threatening development. (author). 16 refs

  14. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  15. Killing fields; The epidemiological evidence

    Energy Technology Data Exchange (ETDEWEB)

    Best, Simon

    1990-02-01

    The threat posed by low frequency fields emerged initially because a researcher, looking for environmental factors in childhood leukaemia, observed a link between low voltage, high current power lines and disease occurrence. Cellular evidence now supports the findings but epidemiology still leads the argument. (43 references). (author).

  16. Life cycle assessment of waste management and recycled paper systems

    NARCIS (Netherlands)

    Ghinea, Cristina; Petraru, Madalina; Simion, Isabela Maria; Sobariu, Dana; Bressers, Johannes Th.A.; Gavrilescu, Maria

    Municipal solid waste management is a matter experienced by the entire world, mostly encountered in urban areas as a result of population growth and increased income per capita. This issue always posed threats to environmental quality and human health, and continues to be one of the major

  17. Major issues in threat analysis and resolving such problems: an addendum to the GAP analysis

    Directory of Open Access Journals (Sweden)

    T.D. Surasinghe

    2012-04-01

    Full Text Available Identification of regions that warrant conservation attention is a top priority among global environmental concerns. Conventionally, this objective was achieved via recognizing natural landscapes based on the number of IUCN Red Listed species, percentage of endemism and species diversity. A recent innovation in conservation biology is the use of GIS-based threat analysis models to identify key areas of conservation importance. Compared with GAP Analysis, which only identifies biodiversity-rich unprotected lands, threat analysis serves as a rigorous tool in conservation planning which specifically recognizes threats and habitat suitability to different taxa based on a spatially-explicit analysis. Threat analysis is a highly flexible process which involves building up a model with multiple independent (without autocorrelations variables that both positively and negatively affect distribution and population persistence of a concerned species. Parameters include rate of land-use change, population density, population growth rate, land management regimes, protection status, habitat suitability and land stewardship. Threat analysis models can be used to understand the current status of a particular species (or a community and can be used to project future trends about the species under consideration. This publication provides an overview of uses of GIS-based threat analyses in conservation biology and provides insights on the limitations of these models and the directions that should be taken in future.

  18. Reducing Uncertainty and Confronting Ignorance about the Possible Impacts of Weathering Plastic in the Marine Environment

    OpenAIRE

    Jahnke, Annika; Arp, Hans Petter Heinrich; Escher, Beate I.; Gewert, Berit; Gorokhova, Elena; Kühnel, Dana; Ogonowski, Martin; Potthof, Annegret; Rummel, Christophe Daniel; Schmitt-Jansen, Mechtild; Toorman, Erik; MacLeod, Matthew

    2017-01-01

    Plastic in the global oceans fulfills two of the three conditions for pollution to pose a planetary boundary threat because it is causing planetary-scale exposure that is not readily reversible. Plastic is a planetary boundary threat if it is having a currently unrecognized disruptive effect on a vital Earth system process. Discovering possible unknown effects is likely to be aided by achieving a fuller understanding of the environmental fate of plastic. Weathering of plastic generates microp...

  19. Guidelines for the disposal of dangerous and toxic wastes so as to minimize or prevent environmental and water pollution

    CSIR Research Space (South Africa)

    Rudd, RT

    1978-01-01

    Full Text Available Modern society is producing ever increasing quantities of dangerous and/or toxic wastes, which require safe and effective disposal if they are not to pose a threat to our water supplies or the environment in general....

  20. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  1. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  2. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  3. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. Zika Virus: An Emerging Worldwide Threat

    Directory of Open Access Journals (Sweden)

    Irfan A. Rather

    2017-07-01

    Full Text Available ZIKA virus (ZIKV poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is being performed by RT-PCR and IgM-captured enzyme-linked immunosorbent assay (MAC-ELISA. The real brunt of the virus is, however, borne by children and adults alike. Case studies of the ZIKV outbreaks in the French Polynesia and other places have suggested that there is a close link between the ZIKV and Gullian-Barre syndrome (GBS. The GBS has closely followed in areas facing ZIKV outbreaks. Although solid evidence is yet to emerge, clinical data integration has revealed a large number of ZIKV patients having GBS. Moreover, the amniotic fluids, blood cord, and miscarriage tissues of mothers have been detected with ZIKV, which indicates that the virus either gets transferred from mother to fetus or seeks direct entry in the fetus, causing microcephaly and other brain anomalies in the newborn babies. Studies on mice have confirmed the link between the ZIKV infection during pregnancy and microcephaly in babies. Reports have highlighted the sexual transmission of the ZIKV, as it has been detected in the semen and saliva of affected persons. The intensity with which the ZIKA is spreading can collapse the health sector of several countries, which are poor. A comprehensive strategy is a need of an hour to combat this virus so as to prevent its transmission and avert the looming threat. At the same time, more research on the cure of the ZIKV is imperative.

  5. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  6. Point Cloud Based Relative Pose Estimation of a Satellite in Close Range

    Directory of Open Access Journals (Sweden)

    Lujiang Liu

    2016-06-01

    Full Text Available Determination of the relative pose of satellites is essential in space rendezvous operations and on-orbit servicing missions. The key problems are the adoption of suitable sensor on board of a chaser and efficient techniques for pose estimation. This paper aims to estimate the pose of a target satellite in close range on the basis of its known model by using point cloud data generated by a flash LIDAR sensor. A novel model based pose estimation method is proposed; it includes a fast and reliable pose initial acquisition method based on global optimal searching by processing the dense point cloud data directly, and a pose tracking method based on Iterative Closest Point algorithm. Also, a simulation system is presented in this paper in order to evaluate the performance of the sensor and generate simulated sensor point cloud data. It also provides truth pose of the test target so that the pose estimation error can be quantified. To investigate the effectiveness of the proposed approach and achievable pose accuracy, numerical simulation experiments are performed; results demonstrate algorithm capability of operating with point cloud directly and large pose variations. Also, a field testing experiment is conducted and results show that the proposed method is effective.

  7. Creativity of Field-dependent and Field-independent Students in Posing Mathematical Problems

    Science.gov (United States)

    Azlina, N.; Amin, S. M.; Lukito, A.

    2018-01-01

    This study aims at describing the creativity of elementary school students with different cognitive styles in mathematical problem-posing. The posed problems were assessed based on three components of creativity, namely fluency, flexibility, and novelty. The free-type problem posing was used in this study. This study is a descriptive research with qualitative approach. Data collections were conducted through written task and task-based interviews. The subjects were two elementary students. One of them is Field Dependent (FD) and the other is Field Independent (FI) which were measured by GEFT (Group Embedded Figures Test). Further, the data were analyzed based on creativity components. The results show thatFD student’s posed problems have fulfilled the two components of creativity namely fluency, in which the subject posed at least 3 mathematical problems, and flexibility, in whichthe subject posed problems with at least 3 different categories/ideas. Meanwhile,FI student’s posed problems have fulfilled all three components of creativity, namely fluency, in which thesubject posed at least 3 mathematical problems, flexibility, in which thesubject posed problems with at least 3 different categories/ideas, and novelty, in which the subject posed problems that are purely the result of her own ideas and different from problems they have known.

  8. Is supergravity well-posed?

    International Nuclear Information System (INIS)

    Isenberg, J.; Bao, D.; Yasskin, P.B.

    1983-01-01

    One rather fundamental question concerning supergravity remains unresolved: Is supergravity a well-posed field theory? That is, does a set of certain (Cauchy) data specified on some initial spacelike surface determine a unique, causally propagating spacetime solution of the supergravity field equations (at least in some finite neighborhood of the initial surface)? In this paper, the authors give a very brief report on work directed towards answering this question. (Auth.)

  9. Spontaneous and posed facial expression in Parkinson's disease.

    Science.gov (United States)

    Smith, M C; Smith, M K; Ellgring, H

    1996-09-01

    Spontaneous and posed emotional facial expressions in individuals with Parkinson's disease (PD, n = 12) were compared with those of healthy age-matched controls (n = 12). The intensity and amount of facial expression in PD patients were expected to be reduced for spontaneous but not posed expressions. Emotional stimuli were video clips selected from films, 2-5 min in duration, designed to elicit feelings of happiness, sadness, fear, disgust, or anger. Facial movements were coded using Ekman and Friesen's (1978) Facial Action Coding System (FACS). In addition, participants rated their emotional experience on 9-point Likert scales. The PD group showed significantly less overall facial reactivity than did controls when viewing the films. The predicted Group X Condition (spontaneous vs. posed) interaction effect on smile intensity was found when PD participants with more severe disease were compared with those with milder disease and with controls. In contrast, ratings of emotional experience were similar for both groups. Depression was positively associated with emotion rating but not with measures of facial activity. Spontaneous facial expression appears to be selectively affected in PD, whereas posed expression and emotional experience remain relatively intact.

  10. Pollution, habitat loss, fishing, and climate change as critical threats to penguins.

    Science.gov (United States)

    Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara

    2015-02-01

    Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales. © 2014 The Authors. Conservation Biology

  11. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Three-Week Bright-Light Intervention Has Dose-Related Effects on Threat-Related Corticolimbic Reactivity and Functional Coupling

    DEFF Research Database (Denmark)

    Fisher, Patrick M; Madsen, Martin K; Mc Mahon, Brenda

    2014-01-01

    environmental stimuli (e.g., threat) and may underlie these effects. Serotonin signaling modulates this circuit and is implicated in the pathophysiology of seasonal and other affective disorders. METHODS: We evaluated the effects of a bright-light intervention protocol on threat-related corticolimbic reactivity......-related amygdala and prefrontal reactivity in a dose-dependent manner. Conversely, amygdala-prefrontal and intraprefrontal functional coupling increased significantly in a dose-dependent manner. Genotype status significantly moderated bright-light intervention effects on intraprefrontal functional coupling....... CONCLUSIONS: This is the first study to evaluate the effects of clinically relevant bright-light intervention on threat-related brain function. We show that amygdala-prefrontal reactivity and communication are significantly affected by bright-light intervention, an effect partly moderated by genotype...

  13. Pose-Invariant Face Recognition via RGB-D Images.

    Science.gov (United States)

    Sang, Gaoli; Li, Jing; Zhao, Qijun

    2016-01-01

    Three-dimensional (3D) face models can intrinsically handle large pose face recognition problem. In this paper, we propose a novel pose-invariant face recognition method via RGB-D images. By employing depth, our method is able to handle self-occlusion and deformation, both of which are challenging problems in two-dimensional (2D) face recognition. Texture images in the gallery can be rendered to the same view as the probe via depth. Meanwhile, depth is also used for similarity measure via frontalization and symmetric filling. Finally, both texture and depth contribute to the final identity estimation. Experiments on Bosphorus, CurtinFaces, Eurecom, and Kiwi databases demonstrate that the additional depth information has improved the performance of face recognition with large pose variations and under even more challenging conditions.

  14. Great Big Hairy Bees! Regulating the European Bumblebee, Bombus Terrestris L. What does it say about the Precautionary Principle?

    Directory of Open Access Journals (Sweden)

    Cameron Alastair Moore

    2012-06-01

    Full Text Available The previous Commonwealth Minister for the Environment, Mr Garrett, recently rejected a request to allow the importation of live bumblebees (Bombus terrestris L. to mainland Australia. New South Wales and Victoria had already listed the introduction of bumblebees as, respectively, a key threatening process and a potentially threatening process. The Commonwealth, however, had previously declined an application to list the introduction of bumblebees as a key threatening process, although its Threatened Species Scientific Committee urged ‘that extreme caution be shown in considering any proposal to introduce this species to the mainland.’ The potential threat from bumblebees would appear to beg the questions posed by the precautionary principle. Would the presence of bumblebees to mainland Australia pose a threat of serious or irreversible environmental damage? Should a lack of full scientific certainty be used as a reason for postponing measures to prevent environmental degradation? This paper considers the role of the precautionary principle in regulatory approaches to the bumblebee. It seeks to establish the application of the precautionary principle to this particular potential environmental threat, including its relationship to the principle of conservation of biological diversity. It concludes that, despite widespread adoption of the precautionary principle in policy, legislation and case law in Australia, its impact on regulating bumblebees has not been consistent.

  15. 2014 Oak Ridge Reservation Annual Site Environmental Report

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Joan F. [Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    The US Department of Energy’s (DOE’s) Oak Ridge Reservation (ORR) is located in Roane and Anderson counties in East Tennessee, about 40 km (25 miles) from Knoxville. ORR is one of DOE’s most unique and complex sites. It encompasses three major facilities and thousands of employees that perform every mission in the DOE portfolio—energy research, environmental restoration, national security, nuclear fuel supply, reindustrialization, science education, basic and applied research in areas important to US security, and technology transfer. ORR was established in the early 1940s as part of the Manhattan Project for the purposes of enriching uranium and pioneering methods for producing and separating plutonium. Today, scientists at the Oak Ridge National Laboratory (ORNL), DOE’s largest multipurpose national laboratory, conduct world-leading research in advanced materials, alternative fuels, climate change, and supercomputing. The Y-12 National Security Complex (Y-12 or Y-12 Complex) is vital to maintaining the safety, security, and effectiveness of the US nuclear weapons stockpile and reducing the global threat posed by nuclear proliferation and terrorism. The East Tennessee Technology Park (ETTP), a former uranium enrichment complex, is being transitioned to a clean, revitalized industrial park.

  16. Perspective projection for variance pose face recognition from camera calibration

    Science.gov (United States)

    Fakhir, M. M.; Woo, W. L.; Chambers, J. A.; Dlay, S. S.

    2016-04-01

    Variance pose is an important research topic in face recognition. The alteration of distance parameters across variance pose face features is a challenging. We provide a solution for this problem using perspective projection for variance pose face recognition. Our method infers intrinsic camera parameters of the image which enable the projection of the image plane into 3D. After this, face box tracking and centre of eyes detection can be identified using our novel technique to verify the virtual face feature measurements. The coordinate system of the perspective projection for face tracking allows the holistic dimensions for the face to be fixed in different orientations. The training of frontal images and the rest of the poses on FERET database determine the distance from the centre of eyes to the corner of box face. The recognition system compares the gallery of images against different poses. The system initially utilises information on position of both eyes then focuses principally on closest eye in order to gather data with greater reliability. Differentiation between the distances and position of the right and left eyes is a unique feature of our work with our algorithm outperforming other state of the art algorithms thus enabling stable measurement in variance pose for each individual.

  17. Multi-Task Convolutional Neural Network for Pose-Invariant Face Recognition

    Science.gov (United States)

    Yin, Xi; Liu, Xiaoming

    2018-02-01

    This paper explores multi-task learning (MTL) for face recognition. We answer the questions of how and why MTL can improve the face recognition performance. First, we propose a multi-task Convolutional Neural Network (CNN) for face recognition where identity classification is the main task and pose, illumination, and expression estimations are the side tasks. Second, we develop a dynamic-weighting scheme to automatically assign the loss weight to each side task, which is a crucial problem in MTL. Third, we propose a pose-directed multi-task CNN by grouping different poses to learn pose-specific identity features, simultaneously across all poses. Last but not least, we propose an energy-based weight analysis method to explore how CNN-based MTL works. We observe that the side tasks serve as regularizations to disentangle the variations from the learnt identity features. Extensive experiments on the entire Multi-PIE dataset demonstrate the effectiveness of the proposed approach. To the best of our knowledge, this is the first work using all data in Multi-PIE for face recognition. Our approach is also applicable to in-the-wild datasets for pose-invariant face recognition and achieves comparable or better performance than state of the art on LFW, CFP, and IJB-A datasets.

  18. Effect of environmental change on yield and quality of fruits and vegetables: two systematic reviews and projections of possible health effects

    Science.gov (United States)

    Smith, P.; Scheelbeek, P.; Bird, F.; Green, R.; Dangour, A.

    2017-12-01

    Background - Environmental changes—including climatic change, water scarcity, and biodiversity loss—threaten agricultural production and pose challenges to global food security. In this study, we review the evidence of the effects of environmental change on the yield and quality of fruits and vegetables - a food group that plays a highly important role in our diets - and assess possible implications for nutrition and health outcomes. Methods - We undertook two systematic reviews of the published literature on the effect of 8 different environmental stressors on yields and nutritional quality of (1) fruits and (2) vegetables, measured in greenhouse and field studies. We combined the review outcomes with Food Balance Sheet data to assess the potential consequences of changed availability and quality of fruits and vegetables for global nutrient deficiencies and related chronic diseases. Findings - Overall, fruits were affected more prominently by changing environmental patterns than vegetables. In tropical countries, there were largely adverse effects on yield of increased temperature and changing precipitation patterns, although in more temperate zones some beneficial effects were reported. In contrast, the effects on nutritional quality were mostly positive, especially in fruit crops, with higher vitamin and mineral content measured in most crops. Increased atmospheric CO2 concentrations had a predominantly positive effect on yield, especially in legumes, but a negative effect on nutritional quality of both fruits and vegetables. Adverse nutritional implications were estimated to be largest in areas characterised by high vulnerability to environmental change, high dependency on local markets, and high rates of food insecurity. Interpretation - Our study identified effects of environmental change on yields and quality of fruits and vegetables that might pose threats to population health, especially in areas vulnerable to climate-change and food insecurity. To

  19. Use of modified threat reduction assessments to estimate success of conservation measures within and adjacent to Kruger National Park, South Africa.

    Science.gov (United States)

    Anthony, Brandon P

    2008-12-01

    The importance of biodiversity as natural capital for economic development and sustaining human welfare is well documented. Nevertheless, resource degradation rates and persistent deterioration of human welfare in developing countries is increasingly worrisome. Developing effective monitoring and evaluation schemes and measuring biodiversity loss continue to pose unique challenges, particularly when there is a paucity of historical data. Threat reduction assessment (TRA) has been proposed as a method to measure conservation success and as a proxy measurement of conservation impact, monitoring threats to resources rather than changes to biological parameters themselves. This tool is considered a quick, practical alternative to more cost- and time-intensive approaches, but has inherent weaknesses. I conducted TRAs to evaluate the effectiveness of Kruger National Park (KNP) and Limpopo Province, South Africa, in mitigating threats to biodiversity from 1994 to 2004 in 4 geographical areas. I calculated TRA index values in these TRAs by using the original scoring developed by Margoluis and Salafsky (2001)and a modified scoring system that assigned negative mitigation values to incorporate new or worsening threats. Threats were standardized to allow comparisons across the sites. Modified TRA index values were significantly lower than values derived from the original scoring exercise. Five of the 11 standardized threats were present in all 4 assessment areas, 2 were restricted to KNP, 2 to Limpopo Province, and 2 only to Malamulele municipality. These results indicate, first, the need to integrate negative mitigation values into TRA scoring. By including negative values, investigators will be afforded a more accurate picture of biodiversity threats and of temporal and spatial trends across sites. Where the original TRA scoring was used to measure conservation success, reevaluation of these cases with the modified scoring is recommended. Second, practitioners must

  20. Nuclear threats in the vicinity of the Nordic countries

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.; Moeller, B.

    1999-01-01

    This project is one of the new cross-disciplinary studies in the NKS (Nordic Nuclear Safety) research program 1998-2001. The main task for the project is to aggregate knowledge of nuclear threats in the vicinity of the Nordic countries, a 'base of knowledge', and make this available for the Nordic authorities as a supplement for the national emergency preparedness work. The project will focus on potential events in nuclear installations and the consequences for the Nordic countries especially on: vulnerable food chains; doses to man; environmental contamination; the emergency preparedness system. (au)

  1. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  2. Concurrent Fetal Exposure to Multiple Environmental Chemicals along the U.S.—Mexico Border: An Exploratory Study in Brownsville, Texas

    Directory of Open Access Journals (Sweden)

    Ken Sexton

    2014-09-01

    Full Text Available There is mounting concern that cumulative exposure to diverse chemicals in the environment may contribute to observed adverse health outcomes in the Lower Rio Grande Valley of Texas. To investigate this situation, biomarker concentrations of organochlorine (OC pesticides/metabolites, polychlorinated biphenyls (PCBs, and polycyclic aromatic hydrocarbons (PAHs were measured in maternal and umbilical cord blood from pregnant Hispanic women in Brownsville, TX. Results show that both mothers and fetuses were exposed concurrently to a variety of relatively low-level, hazardous environmental chemicals. Approximately 10% of the blood specimens had comparatively high concentrations of specific OC pesticides, PCBs and PAHs. Because many pregnant women in Brownsville live in socioeconomically-disadvantaged and environmentally-challenging circumstances, there is appropriate concern that exposure to these exogenous substances, either individually or in combination, may contribute to endemic health problems in this population, including cardiovascular disease, obesity, and diabetes.  The challenge is to identify individuals at highest comparative risk and then implement effective programs to either prevent or reduce cumulative exposures that pose significant health-related threats.

  3. Problems posed by non-targeted radiation effects for development of environmental regulatory policies

    International Nuclear Information System (INIS)

    Mothersill, C.; Seymour, C.

    2004-01-01

    In order to regulate exposure to any toxic substance it is necessary to decide on a safe or acceptable dose and it is necessary to be able to determine harm. Radiation protection has defined harm for practical purposes as excess cancers in humans. The dose is set at a level well below where such excess cancers can be detected above the background. Chemical (environmental) protection uses a different approach and defines a NOEL (No Observable Effect Level) and a LOEL (Lowest Observable Effect Level) for toxic or suspect chemicals. Since 'harm' may be to an ecosystem or population or individual, it is a loose term usually equating with mutation, breeding problems, numerical decline or sex ratio shift. Recently, ICRP has shifted position from one which assumed that protection of Man protected all biota, to a position which recognizes that in certain circumstances, different parameters may be important for protection of biota. In parallel with this shift, has been a paradigm shift in the science of radiation biology and a recognition that a simple dose response relationship for radiation induced DNA damage (mutation or carcinogenesis) may not in fact exist or may not be the dominant effect at low environmentally relevant doses. Thus both pillars of radiation protection have changed position. Harm cannot be defined solely on the basis of human epidemiological data because the endpoint of cancer in humans does not address the type of harm of concern in the environment because of the different mechanisms operating at low chronic doses (see associated abstract). Further, the human data may not be relevant at the doses of concern This paper considers the implications of moving to a radiation protection system based more on the environmental protection model and applies experimental radiobiological data obtained in the laboratory in an environmental risk assessment framework. (author)

  4. Health and environmental effects of oil and gas technologies: research needs

    Energy Technology Data Exchange (ETDEWEB)

    Brown, R. D.

    1981-07-01

    This report discusses health and environmental issues associated with oil and gas technologies as they are currently perceived - both those that exist and those that are expected to emerge over the next two decades. The various sections of this report contain discussions of specific problem areas and relevant new research activities which should be pursued. This is not an exhaustive investigation of all problem areas, but the report explores a wide range of issues to provide a comprehensive picture of existing uncertainties, trends, and other factors that should serve as the focus of future research. The problem areas of major concern include: effects of drilling fluids, offshore accidents, refineries and worker health, and biota and petroleum spills, indoor air pollution, information transfer, and unconventional resources. These are highlighted in the Executive Summary because they pose serious threats to human health and the environment, and because of the sparcity of accumulated knowledge related to their definition. Separate abstracts have been prepared for selected sections of this report for inclusion in the Energy Data Base. (DMC)

  5. GREEN ROOFS AND GREEN WALLS AS INNOVATIVE SOLUTIONS TO IMPROVE THE ENVIRONMENTAL HEALTH OF URBAN AREAS

    Directory of Open Access Journals (Sweden)

    Ilona Małuszyńska

    2014-10-01

    Full Text Available Urban areas are exposed on those originating in various sources, emissions of pollutants that pose a threat to the health of living organisms. The type of pollutant and its toxicity to organisms and mold exposure as well as the frequency of their occurrence in the environment can have a negative impact on living organisms occurring in the area. Another element negatively affecting the environmental health is a rush of individuals and communities to prosperity, which, combined with a weak nervous resistance to stressful situations contributes to the reduction of resistance to disease becoming the scourge of society as bulimia, diabetes and cancer. The tendency to increase building occurring in urban areas and the increasing number of urban dwellers in Europe as well as increasing awareness of the population about the need to protect environmental health, points to the need to seek alternative and innovative solutions for urban greenery. Investments included in that group, the green roofs and green walls, the implementation of which will increase the biologically active surface in the cities, may be an essential element of urban infrastructure that contributes to improving the quality of life of communities living in the city.

  6. The past, present and future supernova threat to Earth's biosphere

    Science.gov (United States)

    Beech, Martin

    2011-12-01

    A brief review of the threat posed to Earth's biosphere via near-by supernova detonations is presented. The expected radiation dosage, cosmic ray flux and expanding blast wave collision effects are considered, and it is argued that a typical supernova must be closer than ˜10-pc before any appreciable and potentially harmful atmosphere/biosphere effects are likely to occur. In contrast, the critical distance for Gamma-ray bursts is of order 1-kpc. In spite of the high energy effects potentially involved, the geological record provides no clear-cut evidence for any historic supernova induced mass extinctions and/or strong climate change episodes. This, however, is mostly a reflection of their being numerous possible (terrestrial and astronomical) forcing mechanisms acting upon the biosphere and the difficulty of distinguishing between competing scenarios. Key to resolving this situation, it is suggested, is the development of supernova specific extinction and climate change linked ecological models. Moving to the future, we estimate that over the remaining lifetime of the biosphere (˜2 Gyr) the Earth might experience 1 GRB and 20 supernova detonations within their respective harmful threat ranges. There are currently at least 12 potential pre-supernova systems within 1-kpc of the Sun. Of these systems IK Pegasi is the closest Type Ia pre-supernova candidate and Betelgeuse is the closest potential Type II supernova candidate. We review in some detail the past, present and future behavior of these two systems. Developing a detailed evolutionary model we find that IK Pegasi will likely not detonate until some 1.9 billion years hence, and that it affords absolutely no threat to Earth's biosphere. Betelgeuse is the closest, reasonably well understood, pre-supernova candidate to the Sun at the present epoch, and may undergo detonation any time within the next several million years. The stand-off distance of Betelgeuse at the time of its detonation is estimated to fall

  7. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  8. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  9. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  10. Toxicity evaluation of ballast water discharged at The Onne Port ...

    African Journals Online (AJOL)

    The discharge of these ballast water poses a major environmental threat to the water quality and Port infrastructures at the Onne Port complex as contaminants may find their way into the food chain/food web and bioaccumulate in the tissues of indigenous biota (microorganisms, crabs, mangrove oysters and fin-fishes).

  11. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability

    NARCIS (Netherlands)

    Lu, Y.; Yuan, J.; Lu, X.; Su, Chao; Zhang, Y.; Wang, C.; Cao, X.; Li, Q.; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, S.R.; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-01-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients,

  12. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  13. Weapons of mass destruction - current security threat

    International Nuclear Information System (INIS)

    Durdiak, J.; Gafrik, A.; Pulis, P.; Susko, M.

    2005-01-01

    This publication brings a complex and comprehensive view of the weapons of mass destruction phenomenon in the context of present military and political situation. It emphasizes the threat posed by proliferation of these destructive devices and their carriers as well as the threat present in their possession by unpredictable totalitarian regimes or terrorist groups. The publication is structured into four basic parts: Introduction Into The Topic, Nuclear Weapons, Chemical Weapons and Biological Weapons. The Introduction reflects the latest developments on the field of military technologies, which lead to the development of new destructive devices with characteristics comparable to basic types of WMDs - nuclear, chemical and biological. Based on the definition of WMD as 'weapon systems with enormous impact causing mass destruction, population, equipment and material losses', the modern mass destruction devices are assorted here, such as ecological, radiological and beam weapons, aerosol and container intelligent ammunition, the outburst of dangerous chemical substances from infrastructure, non-conventional weapons and military devices. The Nuclear Weapons part depicts the most destructive device of mass destruction mankind ever invented in close detail. It maps the history of most significant discoveries in nuclear physics, development and construction of the first nuclear weapons, accumulation of nuclear warheads and their carriers in the Cold war era, attempts of nuclear disarmament and reducing the number of nuclear weapons in possession of superpowers and their proliferation in the world's crisis regions including North Korea and Iran. The chapters devoted to theoretical grounds and physical principles of nuclear and thermonuclear weapons' functioning, the main categories and types, as well as destructive effects and consequences of use contain an adequate mathematical apparatus. This chapter's conclusion brings the overview of nuclear armament of states that

  14. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  15. Environmentalism and typological characteristics of globalistion consciousness

    Directory of Open Access Journals (Sweden)

    Roman M. Kolisnichenko

    2016-01-01

    Full Text Available Analyzed anthropo-saving and environmental-depth approaches to understanding the essence environmentalism. The definition of environmentalism as global environmental trends that recognizes the intrinsic value of the natural world, all its elements and aims to rescue mankind from global environmental threats by achieving a sustainable balance of planetary ecosystems, the proper state of the environment and harmonious development of man and nature. Developed the typology of globalization consciousness attitude to solving global problems in the relationship between man and nature. The main types globalistion consciousness, as the growth of thrift in relation to nature, located in the following sequence: ecodestructive, anthropocentric, ecoconsumerist, ecotraditional, environmental, sacred-ethical, naturecentric and antropofobiastic. Developing a typology of globalistion consciousness above criteria also highlighted its neutral type. Proved that environmental globalistion consciousness is environmentally oriented system of ideas that reflect solutions to global environmental problems in accordance with the principles environmentalism. This type of consciousness globalistion a high degree of awareness of global environmental problems, persistent desire to implement effective methods of humane solution, the optimal it is due, the need to maximize the spread of population. It is concluded that the formation environmental globalistion consciousness as a prerequisite for saving humanity from self created global environmental threats can be greatly accelerated by the terms of the assistance of governments, the media, educational institutions, political parties, public organizations and other institutions of political socialization.

  16. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    Science.gov (United States)

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  17. Driver head pose tracking with thermal camera

    Science.gov (United States)

    Bole, S.; Fournier, C.; Lavergne, C.; Druart, G.; Lépine, T.

    2016-09-01

    Head pose can be seen as a coarse estimation of gaze direction. In automotive industry, knowledge about gaze direction could optimize Human-Machine Interface (HMI) and Advanced Driver Assistance Systems (ADAS). Pose estimation systems are often based on camera when applications have to be contactless. In this paper, we explore uncooled thermal imagery (8-14μm) for its intrinsic night vision capabilities and for its invariance versus lighting variations. Two methods are implemented and compared, both are aided by a 3D model of the head. The 3D model, mapped with thermal texture, allows to synthesize a base of 2D projected models, differently oriented and labeled in yaw and pitch. The first method is based on keypoints. Keypoints of models are matched with those of the query image. These sets of matchings, aided with the 3D shape of the model, allow to estimate 3D pose. The second method is a global appearance approach. Among all 2D models of the base, algorithm searches the one which is the closest to the query image thanks to a weighted least squares difference.

  18. A Support System for the Electric Appliance Control Using Pose Recognition

    Science.gov (United States)

    Kawano, Takuya; Yamamoto, Kazuhiko; Kato, Kunihito; Hongo, Hitoshi

    In this paper, we propose an electric appliance control support system for aged and bedridden people using pose recognition. We proposed a pose recognition system that distinguishes between seven poses of the user on the bed. First, the face and arm regions of the user are detected by using the skin color. Our system focuses a recognition region surrounding the face region. Next, the higher order local autocorrelation features within the region are extracted. The linear discriminant analysis creates the coefficient matrix that can optimally distinguish among training data from the seven poses. Our algorithm can recognize the seven poses even if the subject wears different clothes and slightly shifts or slants on the bed. From the experimental results, our system achieved an accuracy rate of over 99 %. Then, we show that it possibles to construct one of a user-friendly system.

  19. Flexible Polyhedral Surfaces with Two Flat Poses

    Directory of Open Access Journals (Sweden)

    Hellmuth Stachel

    2015-05-01

    Full Text Available We present three types of polyhedral surfaces, which are continuously flexible and have not only an initial pose, where all faces are coplanar, but pass during their self-motion through another pose with coplanar faces (“flat pose”. These surfaces are examples of so-called rigid origami, since we only admit exact flexions, i.e., each face remains rigid during the motion; only the dihedral angles vary. We analyze the geometry behind Miura-ori and address Kokotsakis’ example of a flexible tessellation with the particular case of a cyclic quadrangle. Finally, we recall Bricard’s octahedra of Type 3 and their relation to strophoids.

  20. Environmental and ground-water surveillance at Hanford

    Energy Technology Data Exchange (ETDEWEB)

    Dirkes, R.L.; Luttrell, S.P.

    1995-06-01

    Environmental and ground-water surveillance of the Hanford Site and surrounding region is conducted to demonstrate compliance with environmental regulations, confirm adherence to DOE environmental protection policies, support DOE environmental management decisions, and provide information to the public. Environmental surveillance encompasses sampling and analyzing for potential radiological and nonradiological chemical contaminants on and off the Hanford Site. Emphasis is placed on surveillance of exposure pathways and chemical constituents that pose the greatest risk to human health and the environment.

  1. Environmental and ground-water surveillance at Hanford

    International Nuclear Information System (INIS)

    Dirkes, R.L.; Luttrell, S.P.

    1995-01-01

    Environmental and ground-water surveillance of the Hanford Site and surrounding region is conducted to demonstrate compliance with environmental regulations, confirm adherence to DOE environmental protection policies, support DOE environmental management decisions, and provide information to the public. Environmental surveillance encompasses sampling and analyzing for potential radiological and nonradiological chemical contaminants on and off the Hanford Site. Emphasis is placed on surveillance of exposure pathways and chemical constituents that pose the greatest risk to human health and the environment

  2. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  3. Coupled multiview autoencoders with locality sensitivity for three-dimensional human pose estimation

    Science.gov (United States)

    Yu, Jialin; Sun, Jifeng; Luo, Shasha; Duan, Bichao

    2017-09-01

    Estimating three-dimensional (3D) human poses from a single camera is usually implemented by searching pose candidates with image descriptors. Existing methods usually suppose that the mapping from feature space to pose space is linear, but in fact, their mapping relationship is highly nonlinear, which heavily degrades the performance of 3D pose estimation. We propose a method to recover 3D pose from a silhouette image. It is based on the multiview feature embedding (MFE) and the locality-sensitive autoencoders (LSAEs). On the one hand, we first depict the manifold regularized sparse low-rank approximation for MFE and then the input image is characterized by a fused feature descriptor. On the other hand, both the fused feature and its corresponding 3D pose are separately encoded by LSAEs. A two-layer back-propagation neural network is trained by parameter fine-tuning and then used to map the encoded 2D features to encoded 3D poses. Our LSAE ensures a good preservation of the local topology of data points. Experimental results demonstrate the effectiveness of our proposed method.

  4. Why small and medium chemical companies continue to pose severe environmental risks in rural China.

    Science.gov (United States)

    He, Guizhen; Zhang, Lei; Mol, Arthur P J; Wang, Tieyu; Lu, Yonglong

    2014-02-01

    In China, rural chemical SMEs are often believed to still largely operate below the sustainability radar. This paper investigates to what extent and how chemical SMEs are already experiencing pressure to improve their environmental performance, using an in-depth case study in Jasmine County, Hebei province. The results show that local residents had rather low trust in the environmental improvement promises made by the enterprises and the local government, and disagreed with the proposed improvement plans. Although the power of local residents to influence decision making remained limited, the chemical SMEs started to feel increasing pressures to clean up their business, from governments, local communities and civil society, and international value chain stakeholders. Notwithstanding these mounting pressures chemical SME's environmental behavior and performance has not changed radically for the better. The strong economic ties between local county governments and chemical SMEs continue to be a major barrier for stringent environmental regulation. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  6. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  7. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  8. Inverse and Ill-posed Problems Theory and Applications

    CERN Document Server

    Kabanikhin, S I

    2011-01-01

    The text demonstrates the methods for proving the existence (if et all) and finding of inverse and ill-posed problems solutions in linear algebra, integral and operator equations, integral geometry, spectral inverse problems, and inverse scattering problems. It is given comprehensive background material for linear ill-posed problems and for coefficient inverse problems for hyperbolic, parabolic, and elliptic equations. A lot of examples for inverse problems from physics, geophysics, biology, medicine, and other areas of application of mathematics are included.

  9. Survival and sustainability. Environmental concerns in the 21st century

    Energy Technology Data Exchange (ETDEWEB)

    Goekcekus, Hueseyin; Tuerker, Umut [Near East Univ., Nicosia, North Cyprus (Turkey). Dept. of Civil Engineering; LaMoreaux, James W. (eds.) [P.E. LaMoreaux and Associates, Tuscaloosa, AL (United States)

    2011-07-01

    The International Conference on Environment: Survival and Sustainability, held at the Near East University, Nicosia, Northern Cyprus 19-24 February 2007, dealt with environmental threats and proposed solutions at all scales. The 21 themes addressed by the conference fell into four broad categories; Threats to Survival and Sustainability; Technological Advances towards Survival and Sustainability; Activities and Tools for Social Change; Defining Goals for Sustainable Societies. Activities and tools that move the society towards greater sustainability were emphasized at the conference. These included environmental law and ethics, environmental knowledge, technology and information systems, media, environmental awareness, education and lifelong learning, the use of literature for environmental awareness, the green factor in politics, international relations and environmental organizations. The breadth of the issues addressed at the conference made clear the need for greatly increased interdisciplinary and international collaboration the survival and sustainability concept. The exchanges at the conference represent a step in this direction. (orig.)

  10. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  11. Trajectory Planning with Pose Feedback for a Dual-Arm Space Robot

    Directory of Open Access Journals (Sweden)

    Yicheng Liu

    2016-01-01

    Full Text Available In order to obtain high precision path tracking for a dual-arm space robot, a trajectory planning method with pose feedback is proposed to be introduced into the design process in this paper. Firstly, pose error kinematic models are derived from the related kinematics and desired pose command for the end-effector and the base, respectively. On this basis, trajectory planning with pose feedback is proposed from a control perspective. Theoretical analyses show that the proposed trajectory planning algorithm can guarantee that pose error converges to zero exponentially for both the end-effector and the base when the robot is out of singular configuration. Compared with the existing algorithms, the proposed algorithm can lead to higher precision path tracking for the end-effector. Furthermore, the algorithm renders the system good anti-interference property for the base. Simulation results demonstrate the effectiveness of the proposed trajectory planning algorithm.

  12. An investigation of the bioaccumulation of chromium and uranium ...

    African Journals Online (AJOL)

    Mine waste, including tailings is generally outlined as one of the largest environmental concern which faces defunct mines in South Africa and New Union Gold Mine is no exception. These tailing contain heavy metal such as chromium (Cr) and uranium (U) which poses enormous threat to the environment even at small ...

  13. America’s Food: Does Anthrax Pose A Threat?

    Science.gov (United States)

    2002-04-01

    a 1996 JAMA article, “Unexplained Severe Illness Possibly Associated with Consumption of Kombucha Tea - Iowa 1995.”13 For clarification, the... Kombucha “mush- room” is a “ symbiotic colony of several species of yeast and bacteria that are bound to- gether by a surrounding membrane.”14 Dr. Sadjadi...described an outbreak in Iran of cuta- 9 neous anthrax related to the Kombucha mushroom. In 1996 in a village on the outskirts of Tehran, 20 people

  14. Does modern piracy pose a threat to maritime transport?

    Directory of Open Access Journals (Sweden)

    Andrzej Makowski

    2011-12-01

    Full Text Available The article is an attempt to answer the question whether the observed since 2005 “renaissance” of piracy in the Somali region and the Gulf of Aden (in general, we can speak of the eastern part of the Indian Ocean, is in a position to threaten the international chains of supplies in their global dimension. The conducted analysis of lines of maritime transport compared with the number of pirate attacks and their consequences on the individual sea areas helped to establish that, answering the main question raised in the title of the article, we can certainly say that it does not.

  15. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  16. Why small and medium chemical companies continue to pose severe environmental risks in rural China

    International Nuclear Information System (INIS)

    He, Guizhen; Zhang, Lei; Mol, Arthur P.J.; Wang, Tieyu; Lu, Yonglong

    2014-01-01

    In China, rural chemical SMEs are often believed to still largely operate below the sustainability radar. This paper investigates to what extent and how chemical SMEs are already experiencing pressure to improve their environmental performance, using an in-depth case study in Jasmine County, Hebei province. The results show that local residents had rather low trust in the environmental improvement promises made by the enterprises and the local government, and disagreed with the proposed improvement plans. Although the power of local residents to influence decision making remained limited, the chemical SMEs started to feel increasing pressures to clean up their business, from governments, local communities and civil society, and international value chain stakeholders. Notwithstanding these mounting pressures chemical SME's environmental behavior and performance has not changed radically for the better. The strong economic ties between local county governments and chemical SMEs continue to be a major barrier for stringent environmental regulation. -- Highlights: • Rural chemical SMEs are often below the sustainability radar in China. • Close local government-SMEs tie remained as a barrier for effective environmental enforcement. • Rural communities proved unable to collectively raise their voice. • National government must adopt environment-oriented political incentives. -- The paper provides a major understanding of how and why the large number of existing chemical SMEs in rural China still form major chemical risks

  17. Determining the Performances of Pre-Service Primary School Teachers in Problem Posing Situations

    Science.gov (United States)

    Kilic, Cigdem

    2013-01-01

    This study examined the problem posing strategies of pre-service primary school teachers in different problem posing situations (PPSs) and analysed the issues they encounter while posing problems. A problem posing task consisting of six PPSs (two free, two structured, and two semi-structured situations) was delivered to 40 participants.…

  18. Alert but less alarmed: a pooled analysis of terrorism threat perception in Australia

    Directory of Open Access Journals (Sweden)

    Barr Margo

    2011-10-01

    Full Text Available Abstract Background Previous Australian research has highlighted disparities in community perceptions of the threat posed by terrorism. A study with a large sample size is needed to examine reported concerns and anticipated responses of community sub-groups and to determine their consistency with existing Australian and international findings. Methods Representative samples of New South Wales (NSW adults completed terrorism perception questions as part of computer assisted telephone interviews (CATI in 2007 (N = 2081 and 2010 (N = 2038. Responses were weighted against the NSW population. Data sets from the two surveys were pooled and multivariate multilevel analyses conducted to identify health and socio-demographic factors associated with higher perceived risk of terrorism and evacuation response intentions, and to examine changes over time. Results In comparison with 2007, Australians in 2010 were significantly more likely to believe that a terrorist attack would occur in Australia (Adjusted Odd Ratios (AOR = 1.24, 95%CI:1.06-1.45 but felt less concerned that they would be directly affected by such an incident (AOR = 0.65, 95%CI:0.55-0.75. Higher perceived risk of terrorism and related changes in living were associated with middle age, female gender, lower education and higher reported psychological distress. Australians of migrant background reported significantly lower likelihood of terrorism (AOR = 0.52, 95%CI:0.39-0.70 but significantly higher concern that they would be personally affected by such an incident (AOR = 1.57, 95%CI:1.21-2.04 and having made changes in the way they live due to this threat (AOR = 2.47, 95%CI:1.88-3.25. Willingness to evacuate homes and public places in response to potential incidents increased significantly between 2007 and 2010 (AOR = 1.53, 95%CI:1.33-1.76. Conclusion While an increased proportion of Australians believe that the national threat of terrorism remains high, concern about being personally affected

  19. Excitatory amino acid b-N-methylamino-L-alanine is a putative environmental neurotoxin

    Directory of Open Access Journals (Sweden)

    VLADIMIR NEDELJKOV

    2011-04-01

    Full Text Available The amino acid b-N-methylamino-L-alanine (L-BMAA has been associated with the amyotrophic lateral sclerosis/parkinsonism-dementia complex in three distinct western Pacific populations. The putative neurotoxin is produced by cyanobacteria, which live symbiotically in the roots of cycad trees. L-BMAA was thought to be a threat only to those few populations whose diet and medicines rely heavily on cycad seeds. However, the recent discovery that cyanobacteria from diverse terrestrial, freshwater, and saltwater ecosystems around the world produce the toxin requires a reassessment of whether it poses a larger health threat. Therefore, it is proposed that monitoring L-BMAA levels in cyanobacteria-contaminated water supplies might be prudent.

  20. Global issues in environmental medicine.

    Science.gov (United States)

    Goldstein, B D

    1993-03-01

    This overview will discuss a number of the issues posed by the challenge of international environmental health. The reasons that environmental problems occurring elsewhere in the world are of importance to occupational and environmental physicians in North America include the interconnectedness of the biosphere of our planet so that environmental alterations in one part of the globe can have an adverse outcome on our health and well-being; the often high levels of pollution and environmental degradation elsewhere provide an opportunity to determine and predict adverse consequences of environmental agents pertinent to protecting our own health; and, most importantly, our own ability to provide assistance in helping economic development occur in a setting of low risk of environmental pollution.

  1. Tooth display and lip position during spontaneous and posed smiling in adults.

    Science.gov (United States)

    Van Der Geld, Pieter; Oosterveld, Paul; Berge, Stefaan J; Kuijpers-Jagtman, Anne M

    2008-08-01

    To analyze differences in tooth display, lip-line height, and smile width between the posed smiling record, traditionally produced for orthodontic diagnosis, and the spontaneous (Duchenne) smile of joy. The faces of 122 male participants were each filmed during spontaneous and posed smiling. Spontaneous smiles were elicited through the participants watching a comical movie. Maxillary and mandibular lip-line heights, tooth display, and smile width were measured using a digital videographic method for smile analysis. Paired sample t-tests were used to compare measurements of posed and spontaneous smiling. Maxillary lip-line heights during spontaneous smiling were significantly higher than during posed smiling. Compared to spontaneous smiling, tooth display in the (pre)molar area during posed smiling decreased by up to 30%, along with a significant reduction of smile width. During posed smiling, also mandibular lip-line heights changed and the teeth were more covered by the lower lip than during spontaneous smiling. Reduced lip-line heights, tooth display, and smile width on a posed smiling record can have implications for the diagnostics of lip-line height, smile arc, buccal corridors, and plane of occlusion. Spontaneous smiling records next to posed smiling records are therefore recommended for diagnostic purposes. Because of the dynamic nature of spontaneous smiling, it is proposed to switch to dynamic video recording of the smile.

  2. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  3. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  4. Head Pose Estimation Using Multilinear Subspace Analysis for Robot Human Awareness

    Science.gov (United States)

    Ivanov, Tonislav; Matthies, Larry; Vasilescu, M. Alex O.

    2009-01-01

    Mobile robots, operating in unconstrained indoor and outdoor environments, would benefit in many ways from perception of the human awareness around them. Knowledge of people's head pose and gaze directions would enable the robot to deduce which people are aware of the its presence, and to predict future motions of the people for better path planning. To make such inferences, requires estimating head pose on facial images that are combination of multiple varying factors, such as identity, appearance, head pose, and illumination. By applying multilinear algebra, the algebra of higher-order tensors, we can separate these factors and estimate head pose regardless of subject's identity or image conditions. Furthermore, we can automatically handle uncertainty in the size of the face and its location. We demonstrate a pipeline of on-the-move detection of pedestrians with a robot stereo vision system, segmentation of the head, and head pose estimation in cluttered urban street scenes.

  5. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Science.gov (United States)

    Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-01-01

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants. PMID:29584679

  6. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries.

    Science.gov (United States)

    Zhu, Zhengqiu; Chen, Bin; Qiu, Sihang; Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-03-27

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  7. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Directory of Open Access Journals (Sweden)

    Zhengqiu Zhu

    2018-03-01

    Full Text Available Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters are integrated into the extended CPEP model; (iii Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  8. Environmental policy and public health: air pollution, global climate change, and wilderness

    National Research Council Canada - National Science Library

    Rom, William N

    2012-01-01

    .... It scrutinizes the sources of pollution and threats to environmental integrity, the consequences of pollution on the environment and health and explains the legal basis for environmental action...

  9. Recording environmental assets in the national accounts

    OpenAIRE

    Carl Obst; Michael Vardon

    2014-01-01

    Accounting information is a core element of economic decision-making at both national and corporate levels. It is widely accepted that much economic activity is dependent upon natural capital and natural resources—generically termed environmental assets in an accounting context. Environmental assets are under threat of depletion and degradation from economic activity. Consequently, the incorporation of information on environmental assets into standard accounting frameworks is an essential ele...

  10. Environmental settings for selected US Department of Energy installations - support information for the programmatic environmental impact statement and the baseline environmental management report

    Energy Technology Data Exchange (ETDEWEB)

    Holdren, G.R.; Glantz, C.S.; Berg, L.K.; Delinger, K.; Fosmire, C.J.; Goodwin, S.M.; Rustad, J.R.; Schalla, R.; Schramke, J.A.

    1995-05-01

    This report contains the environmental setting information developed for 25 U.S. Department of Energy (DOE) installations in support of the DOE`s Programmatic Environmental Impact Study (PEIS) and the Baseline Environmental Management Report (BEMR). The common objective of the PEIS and the BEMR is to provide the public with information about the environmental contamination problems associated with major DOE facilities across the country, and to assess the relative risks that radiological and hazardous contaminants pose to the public, onsite workers, and the environment. Environmental setting information consists of the site-specific data required to model (using the Multimedia Environmental Pollutant Assessment System) the atmospheric, groundwater, and surface water transport of contaminants within and near the boundaries of the installations. The environmental settings data describes the climate, atmospheric dispersion, hydrogeology, and surface water characteristics of the installations. The number of discrete environmental settings established for each installation was governed by two competing requirements: (1) the risks posed by contaminants released from numerous waste sites were to be modeled as accurately as possible, and (2) the modeling required for numerous release sites and a large number of contaminants had to be completed within the limits imposed by the PEIS and BEMR schedule. The final product is the result of attempts to balance these competing concerns in a way that minimizes the number of settings per installation in order to meet the project schedule while at the same, time providing adequate, if sometimes highly simplified, representations of the different areas within an installation. Environmental settings were developed in conjunction with installation experts in the fields of meteorology, geology, hydrology, and geochemistry.

  11. Environmental settings for selected US Department of Energy installations - support information for the programmatic environmental impact statement and the baseline environmental management report

    International Nuclear Information System (INIS)

    Holdren, G.R.; Glantz, C.S.; Berg, L.K.; Delinger, K.; Fosmire, C.J.; Goodwin, S.M.; Rustad, J.R.; Schalla, R.; Schramke, J.A.

    1995-05-01

    This report contains the environmental setting information developed for 25 U.S. Department of Energy (DOE) installations in support of the DOE's Programmatic Environmental Impact Study (PEIS) and the Baseline Environmental Management Report (BEMR). The common objective of the PEIS and the BEMR is to provide the public with information about the environmental contamination problems associated with major DOE facilities across the country, and to assess the relative risks that radiological and hazardous contaminants pose to the public, onsite workers, and the environment. Environmental setting information consists of the site-specific data required to model (using the Multimedia Environmental Pollutant Assessment System) the atmospheric, groundwater, and surface water transport of contaminants within and near the boundaries of the installations. The environmental settings data describes the climate, atmospheric dispersion, hydrogeology, and surface water characteristics of the installations. The number of discrete environmental settings established for each installation was governed by two competing requirements: (1) the risks posed by contaminants released from numerous waste sites were to be modeled as accurately as possible, and (2) the modeling required for numerous release sites and a large number of contaminants had to be completed within the limits imposed by the PEIS and BEMR schedule. The final product is the result of attempts to balance these competing concerns in a way that minimizes the number of settings per installation in order to meet the project schedule while at the same, time providing adequate, if sometimes highly simplified, representations of the different areas within an installation. Environmental settings were developed in conjunction with installation experts in the fields of meteorology, geology, hydrology, and geochemistry

  12. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  13. Pose-invariant face recognition using Markov random fields.

    Science.gov (United States)

    Ho, Huy Tho; Chellappa, Rama

    2013-04-01

    One of the key challenges for current face recognition techniques is how to handle pose variations between the probe and gallery face images. In this paper, we present a method for reconstructing the virtual frontal view from a given nonfrontal face image using Markov random fields (MRFs) and an efficient variant of the belief propagation algorithm. In the proposed approach, the input face image is divided into a grid of overlapping patches, and a globally optimal set of local warps is estimated to synthesize the patches at the frontal view. A set of possible warps for each patch is obtained by aligning it with images from a training database of frontal faces. The alignments are performed efficiently in the Fourier domain using an extension of the Lucas-Kanade algorithm that can handle illumination variations. The problem of finding the optimal warps is then formulated as a discrete labeling problem using an MRF. The reconstructed frontal face image can then be used with any face recognition technique. The two main advantages of our method are that it does not require manually selected facial landmarks or head pose estimation. In order to improve the performance of our pose normalization method in face recognition, we also present an algorithm for classifying whether a given face image is at a frontal or nonfrontal pose. Experimental results on different datasets are presented to demonstrate the effectiveness of the proposed approach.

  14. Indigenising environmentalism - a task for the next millennium ...

    African Journals Online (AJOL)

    The issue of environmentalism global arising from perceived threat to the environment on all front and thus requiring attention of everyone. In as much as productive activities have contributed to environmental degradation, then it is necessary to address the processes. The environment as a concept however holds different ...

  15. Green public procurement

    OpenAIRE

    Dorożyński, Tomasz

    2016-01-01

    Considering environmental protection requirements in business operations may, in the long run, determine if a lasting comparative advantage can be achieved. That is why our textbook, rich in case studies, identifies not only the threats a business may pose to the environment but stresses the ways of reducing its negative impact. It discusses, among other things, the concept of corporate social responsibility, environmental management systems, methods and the importance of eco-labelling goods ...

  16. Preface

    OpenAIRE

    Dorożyński, Tomasz; Kuna-Marszałek, Anetta

    2016-01-01

    Considering environmental protection requirements in business operations may, in the long run, determine if a lasting comparative advantage can be achieved. That is why our textbook, rich in case studies, identifies not only the threats a business may pose to the environment but stresses the ways of reducing its negative impact. It discusses, among other things, the concept of corporate social responsibility, environmental management systems, methods and the importance of eco-labelling goods ...

  17. Integrating local pastoral knowledge, participatory mapping, and species distribution modeling for risk assessment of invasive rubber vine (Cryptostegia grandiflora in Ethiopia's Afar region

    Directory of Open Access Journals (Sweden)

    Matthew W. Luizza

    2016-03-01

    Full Text Available The threats posed by invasive plants span ecosystems and economies worldwide. Local knowledge of biological invasions has proven beneficial for invasive species research, but to date no work has integrated this knowledge with species distribution modeling for invasion risk assessments. In this study, we integrated pastoral knowledge with Maxent modeling to assess the suitable habitat and potential impacts of invasive Cryptostegia grandiflora Robx. Ex R.Br. (rubber vine in Ethiopia's Afar region. We conducted focus groups with seven villages across the Amibara and Awash-Fentale districts. Pastoral knowledge revealed the growing threat of rubber vine, which to date has received limited attention in Ethiopia, and whose presence in Afar was previously unknown to our team. Rubber vine occurrence points were collected in the field with pastoralists and processed in Maxent with MODIS-derived vegetation indices, topographic data, and anthropogenic variables. We tested model fit using a jackknife procedure and validated the final model with an independent occurrence data set collected through participatory mapping activities with pastoralists. A Multivariate Environmental Similarity Surface analysis revealed areas with novel environmental conditions for future targeted surveys. Model performance was evaluated using area under the receiver-operating characteristic curve (AUC and showed good fit across the jackknife models (average AUC = 0.80 and the final model (test AUC = 0.96. Our results reveal the growing threat rubber vine poses to Afar, with suitable habitat extending downstream of its current known location in the middle Awash River basin. Local pastoral knowledge provided important context for its rapid expansion due to acute changes in seasonality and habitat alteration, in addition to threats posed to numerous endemic tree species that provide critical provisioning ecosystem services. This work demonstrates the utility of integrating local

  18. A brief multi-disciplinary review on antimicrobial resistance in medicine and its linkage to the global environmental microbiota

    Directory of Open Access Journals (Sweden)

    Leon eCantas

    2013-05-01

    Full Text Available The discovery and introduction of antimicrobial agents to clinical medicine was one of the greatest medical triumphs of the 20th century that revolutionized the treatment of bacterial infections. However, the gradual emergence of populations of antimicrobial-resistant pathogenic bacteria resulting from use, misuse and abuse of antimicrobials has today become a major global health concern. Antimicrobial resistance genes have been suggested to originate from environmental bacteria, as clinically relevant resistance genes have been detected on the chromosome of environmental bacteria. As only a few new antimicrobials have been developed in the last decade, the further evolution of resistance poses a serious threat to public health. Urgent measures are required not only to minimize the use of antimicrobials for prophylactic and therapeutic purposes but also to look for alternative strategies for the control of bacterial infections. This review examines the global picture of antibacterial resistance, factors that favor its spread, strategies and limitations for its control and the need for continuous training of all stake-holders i.e. medical, veterinary, public health and other relevant professionals as well as human consumers of antibiotic drugs, in the appropriate use of antimicrobials.

  19. A brief multi-disciplinary review on antimicrobial resistance in medicine and its linkage to the global environmental microbiota

    Science.gov (United States)

    Cantas, L.; Shah, Syed Q. A.; Cavaco, L. M.; Manaia, C. M.; Walsh, F.; Popowska, M.; Garelick, H.; Bürgmann, H.; Sørum, H.

    2013-01-01

    The discovery and introduction of antimicrobial agents to clinical medicine was one of the greatest medical triumphs of the 20th century that revolutionized the treatment of bacterial infections. However, the gradual emergence of populations of antimicrobial-resistant pathogenic bacteria resulting from use, misuse, and abuse of antimicrobials has today become a major global health concern. Antimicrobial resistance (AMR) genes have been suggested to originate from environmental bacteria, as clinically relevant resistance genes have been detected on the chromosome of environmental bacteria. As only a few new antimicrobials have been developed in the last decade, the further evolution of resistance poses a serious threat to public health. Urgent measures are required not only to minimize the use of antimicrobials for prophylactic and therapeutic purposes but also to look for alternative strategies for the control of bacterial infections. This review examines the global picture of antimicrobial resistance, factors that favor its spread, strategies, and limitations for its control and the need for continuous training of all stake-holders i.e., medical, veterinary, public health, and other relevant professionals as well as human consumers, in the appropriate use of antimicrobial drugs. PMID:23675371

  20. Pose Estimation and Adaptive Robot Behaviour for Human-Robot Interaction

    DEFF Research Database (Denmark)

    Svenstrup, Mikael; Hansen, Søren Tranberg; Andersen, Hans Jørgen

    2009-01-01

    Abstract—This paper introduces a new method to determine a person’s pose based on laser range measurements. Such estimates are typically a prerequisite for any human-aware robot navigation, which is the basis for effective and timeextended interaction between a mobile robot and a human. The robot......’s pose. The resulting pose estimates are used to identify humans who wish to be approached and interacted with. The interaction motion of the robot is based on adaptive potential functions centered around the person that respect the persons social spaces. The method is tested in experiments...

  1. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  2. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  3. On the rumors about the silent spring: review of the scientific evidence linking occupational and environmental pesticide exposure to endocrine disruption health effects

    Directory of Open Access Journals (Sweden)

    Cocco Pierluigi

    2002-01-01

    Full Text Available Occupational exposure to some pesticides, and particularly DBCP and chlordecone, may adversely affect male fertility. However, apart from the therapeutic use of diethylstilbestrol, the threat to human reproduction posed by "endocrine disrupting" environmental contaminants has not been supported by epidemiological evidence thus far. As it concerns other endocrine effects described in experimental animals, only thyroid inhibition following occupational exposure to amitrole and mancozeb has been confirmed in humans. Cancer of the breast, endometrium, ovary, prostate, testis, and thyroid are hormone-dependent, which fostered research on the potential risk associated with occupational and environmental exposure to the so-called endocrine-disrupting pesticides. The most recent studies have ruled out the hypothesis of DDT derivatives as responsible for excess risks of cancer of the reproductive organs. Still, we cannot exclude a role for high level exposure to o,p'-DDE, particularly in post-menopausal ER+ breast cancer. On the other hand, other organochlorine pesticides and triazine herbicides require further investigation for a possible etiologic role in some hormone-dependent cancers.

  4. An anti-disturbing real time pose estimation method and system

    Science.gov (United States)

    Zhou, Jian; Zhang, Xiao-hu

    2011-08-01

    Pose estimation relating two-dimensional (2D) images to three-dimensional (3D) rigid object need some known features to track. In practice, there are many algorithms which perform this task in high accuracy, but all of these algorithms suffer from features lost. This paper investigated the pose estimation when numbers of known features or even all of them were invisible. Firstly, known features were tracked to calculate pose in the current and the next image. Secondly, some unknown but good features to track were automatically detected in the current and the next image. Thirdly, those unknown features which were on the rigid and could match each other in the two images were retained. Because of the motion characteristic of the rigid object, the 3D information of those unknown features on the rigid could be solved by the rigid object's pose at the two moment and their 2D information in the two images except only two case: the first one was that both camera and object have no relative motion and camera parameter such as focus length, principle point, and etc. have no change at the two moment; the second one was that there was no shared scene or no matched feature in the two image. Finally, because those unknown features at the first time were known now, pose estimation could go on in the followed images in spite of the missing of known features in the beginning by repeating the process mentioned above. The robustness of pose estimation by different features detection algorithms such as Kanade-Lucas-Tomasi (KLT) feature, Scale Invariant Feature Transform (SIFT) and Speed Up Robust Feature (SURF) were compared and the compact of the different relative motion between camera and the rigid object were discussed in this paper. Graphic Processing Unit (GPU) parallel computing was also used to extract and to match hundreds of features for real time pose estimation which was hard to work on Central Processing Unit (CPU). Compared with other pose estimation methods, this new

  5. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  6. Arsenic and dichlorvos: Possible interaction between two environmental contaminants.

    Science.gov (United States)

    Flora, Swaran J S

    2016-05-01

    Metals are ubiquitously present in the environment and pesticides are widely used throughout the world. Environmental and occupational exposure to metal along with pesticide is an area of great concern to both the public and regulatory authorities. Our major concern is that combination of these toxicant present in environment may elicit toxicity either due to additive or synergistic interactions or 'joint toxic actions' among these toxicants. It poses a rising threat to human health. Water contamination particularly ground water contamination with arsenic is a serious problem in today's scenario since arsenic is associated with several kinds of health problems, such arsenic associated health anomalies are commonly called as 'Arsenism'. Uncontrolled use and spillage of pesticides into the environment has resulted in alarming situation. Moreover serious concerns are being addressed due to their persistence in the environmental matrices such as air, soil and surface water runoff resulting in continuous exposure of these harmful chemicals to human beings and animals. Bio-availability of these environmental toxicants has been enhanced much due to anthropological activities. Dreadfully very few studies are available on combined exposures to these toxicants on the animal or human system. Studies on the acute and chronic exposure to arsenic and DDVP are well reported and well defined. Arsenic is a common global ground water contaminant while dichlorvos is one of the most commonly and widely employed organophosphate based insecticide used in agriculture, horticulture etc. There is thus a real situation where a human may get exposed to these toxicants while working in a field. This review highlights the individual and combined exposure to arsenic and dichlorvos on health. Copyright © 2016 Elsevier GmbH. All rights reserved.

  7. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  8. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  9. The new social marketing challenge to promote radon testing.

    Science.gov (United States)

    DiPofi, J A; LaTour, M S; Henthorne, T L

    2001-01-01

    As part of a project funded by the Environmental Protection Agency, exploratory qualitative analysis was conducted to gain insight into perceptions of the threat of radon in the Karst geological region (i.e., Northern Alabama, Central Tennessee, Central Kentucky). Based on health practitioner input, it was clear that the tenets of Protection Motivation Theory (PMT) and the probing afforded by focus group research would provide greatly needed theory-based insight into the public reactions (or lack thereof) to the threat posed by radon. Qualitative research findings of this project are discussed as well as preliminary recommendations are provided to advance the protection motivation theory research agenda for promoting awareness of the threat of radon and to influence appropriate response to that threat.

  10. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    International Nuclear Information System (INIS)

    Zakaria, M.; Mandere, N.; Olsson, L.

    2006-01-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  11. Nuclear installations in the baltic sea region and the stake holders cooperation: a crucial step towards energy security, environmental sustainability and political stability in the region

    Energy Technology Data Exchange (ETDEWEB)

    Zakaria, M.; Mandere, N.; Olsson, L. [Lund Univ., Centre for Sustainability Studies (LUCSUS) (Sweden)

    2006-07-01

    Radiation hazards are trans-boundary. The prevention of accidents must be managed locally. But the awareness, preparedness, and the responsibilities in the case of emergencies must be managed at the local and regional level, and must rely on close interaction between the local and regional levels. The Baltic Sea Region contains over 40 nuclear reactors contributing to energy security, but also posing a potential threat to human, environmental, and political security. The aim of this paper is to integrate the four fields of security: health, environment, energy, and political by analysing awareness, preparedness responsibility and decision making related to nuclear installations. With increasing political, economical, cultural and physical (in term of energy infrastructure) integration, the region needs to take a comprehensive approach to create adequate structure for managing risks and thereby promote security. (authors)

  12. Locating binding poses in protein-ligand systems using reconnaissance metadynamics

    Science.gov (United States)

    Söderhjelm, Pär; Tribello, Gareth A.; Parrinello, Michele

    2012-01-01

    A molecular dynamics-based protocol is proposed for finding and scoring protein-ligand binding poses. This protocol uses the recently developed reconnaissance metadynamics method, which employs a self-learning algorithm to construct a bias that pushes the system away from the kinetic traps where it would otherwise remain. The exploration of phase space with this algorithm is shown to be roughly six to eight times faster than unbiased molecular dynamics and is only limited by the time taken to diffuse about the surface of the protein. We apply this method to the well-studied trypsin–benzamidine system and show that we are able to refind all the poses obtained from a reference EADock blind docking calculation. These poses can be scored based on the length of time the system remains trapped in the pose. Alternatively, one can perform dimensionality reduction on the output trajectory and obtain a map of phase space that can be used in more expensive free-energy calculations. PMID:22440749

  13. Mathematical Thinking and Creativity through Mathematical Problem Posing and Solving

    Directory of Open Access Journals (Sweden)

    María F. Ayllón

    2016-04-01

    Full Text Available This work shows the relationship between the development of mathematical thinking and creativity with mathematical problem posing and solving. Creativity and mathematics are disciplines that do not usually appear together. Both concepts constitute complex processes sharing elements, such as fluency (number of ideas, flexibility (range of ideas, novelty (unique idea and elaboration (idea development. These factors contribute, among others, to the fact that schoolchildren are competent in mathematics. The problem solving and posing are a very powerful evaluation tool that shows the mathematical reasoning and creative level of a person. Creativity is part of the mathematics education and is a necessary ingredient to perform mathematical assignments. This contribution presents some important research works about problem posing and solving related to the development of mathematical knowledge and creativity. To that end, it is based on various beliefs reflected in the literature with respect to notions of creativity, problem solving and posing.

  14. A Grasp-Pose Generation Method Based on Gaussian Mixture Models

    Directory of Open Access Journals (Sweden)

    Wenjia Wu

    2015-11-01

    Full Text Available A Gaussian Mixture Model (GMM-based grasp-pose generation method is proposed in this paper. Through offline training, the GMM is set up and used to depict the distribution of the robot's reachable orientations. By dividing the robot's workspace into small 3D voxels and training the GMM for each voxel, a look-up table covering all the workspace is built with the x, y and z positions as the index and the GMM as the entry. Through the definition of Task Space Regions (TSR, an object's feasible grasp poses are expressed as a continuous region. With the GMM, grasp poses can be preferentially sampled from regions with high reachability probabilities in the online grasp-planning stage. The GMM can also be used as a preliminary judgement of a grasp pose's reachability. Experiments on both a simulated and a real robot show the superiority of our method over the existing method.

  15. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  16. Status, progress and plans for the U.S. Department of Energy, National Nuclear Security Administration, Global Threat Reduction Initiative

    International Nuclear Information System (INIS)

    Bieniawski, Andrew

    2005-01-01

    This presentation discusses the efforts under the US Department of Energy/National Nuclear Security Administration's Global Threat Reduction Initiative, also known as GTRI. On May 26, 2004, then Secretary of Energy Abraham established GTRI. GTRI is a cooperative program to provide international support for countries' national programs to identify, secure, recover or facilitate the disposition of vulnerable nuclear and radiological materials around the world that pose a potential threat to the international community. The formation of GTRI consolidated a number of nonproliferation programs you may be familiar with that work together to minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide. In particular, the Office of Global Threat Reduction, which was set up to implement GTRI, has oversight of the Reduced Enrichment for Research and Test Reactors program, the Foreign Research Reactor Spent Nuclear Fuel Acceptance program, and the Russian Research Reactor Fuel Return program. This consolidation allows these three programs to work in concert to bring about the elimination of research reactor materials as a source of proliferation concern. This speech is highlighting the work that these programs have undertaken in cooperation with the global research reactor community and the importance placed on fuel development under the RERTR program It contains an update on the work done to support the US - Russian Presidential Bratislava Summit Statement

  17. Threats to safety during sedation outside of the operating room and the death of Michael Jackson.

    Science.gov (United States)

    Webster, Craig S; Mason, Keira P; Shafer, Steven L

    2016-03-01

    From an understanding of human psychology and the reliability of high-technology systems, this review considers critical threats to the safety of patients undergoing sedation outside of the operating room, and will stratify these threats along what we define as the 'Patient Risk Continuum'. We then consider interventions suitable for addressing identified risks. The technology, organization and delivery of healthcare continue to become more complex, highlighting the importance of maintaining the safety of patients. Sedation outside of the operating room is known to be associated with higher rates of adverse events. However, a number of recent safety initiatives have shown benefit in improving patient safety. The following threats to patients undergoing sedation, in increasing order of risk, are discussed: equipment and environmental factors, known patient risks, poor team performance, combinatorial problems and egregious violations. To address these threats, we discuss a number of approaches consistent with the systems approach to safety, namely: encouraging functions, forcing functions, cognitive safety nets, information sharing, recovery strategies and regulatory change. Demonstrating improvement with any safety initiative relies critically on quality data collected on the problem area in question.

  18. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  19. Religion and Environmental Education: Building on Common Ground

    Science.gov (United States)

    Hitzhusen, Gregory E.

    2006-01-01

    Environmental educators are beginning to consider how to incorporate religious resources into their curricula. Common concerns about religion pose a challenge for integration, but these concerns are manageable. Reflection on the precursors of environmental citizenship behaviour provides a framework for considering some of the ways that religious…

  20. Cattle and the oil and gas industry in Alberta: a literature review with recommendations for environmental management

    International Nuclear Information System (INIS)

    Bertram, H.L.; Ceroici, W.J.; Coleman, R.N.; Coppock, R.W.; Florence, L.Z.; Johnson, R.L.; Khan, A.A.; Liem, A.J.; Schuler, M.M.; Smillie, R.D.; Wilson, M.A.; Yeung, P.P.Y.; Dabrowski, T.L.; Lyness, L.S.; Sevigny, J.H.

    1996-07-01

    Issues relating to the effect of the oil and gas industry on cattle production in Alberta, were discussed. A review of scientific literature, industry codes of practices and government regulations pertaining to the subject was compiled and the potential effects of substances on cattle production were examined. The substances used by Alberta's oil and gas industry in field activities such as exploration, drilling, property development, collection, transportation, refining and processing were described. The chemicals and their toxicological effects were identified. The atmospheric, groundwater and surface water pathways by which those substances are transported was studied. It was concluded that hydrogen sulfide, crude oil and salt water pose the greatest threat to cattle. The exact effects of aromatic hydrocarbons, liquid condensates, methane, carbon dioxide, heavy metals, glycols, methanol, and volatile organic compounds on cattle production, were not fully determined. Recommendations about environmental management, including the need for monitoring programs and research priorities, were presented. 166 refs., 49 tabs., 36 figs

  1. Investigation of Problem-Solving and Problem-Posing Abilities of Seventh-Grade Students

    Science.gov (United States)

    Arikan, Elif Esra; Ünal, Hasan

    2015-01-01

    This study aims to examine the effect of multiple problem-solving skills on the problem-posing abilities of gifted and non-gifted students and to assess whether the possession of such skills can predict giftedness or affect problem-posing abilities. Participants' metaphorical images of problem posing were also explored. Participants were 20 gifted…

  2. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  3. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  4. Dual-Use Threat Assessment Framework - An Attempt to Quantify the Risk

    International Nuclear Information System (INIS)

    Stephen, E. R.; Lavigne, J. J.; Colton, B.

    2007-01-01

    Advances in the biosciences over the past decade have been rapid and transformative. While these advances offer significant benefit to society, they also provide very significant challenges in terms of security. Concerns over misuse and/or accidental use/release (dual use) although not new, are now being viewed through the security lens. There is a wide-spread view that public or private sector scientists, supported through investments by pharmaceutical, environmental and agricultural interests working in the fields that comprise biotechnology, posses the ability to assess the implications of their own work and work within a regime of self-control that is for the most part self-governing (codes of practice). On the other end of the spectrum are those that would codify or legislative control. All this is being done in the absence of a mechanism for quantifying the threat. This presentation will discuss the development of an assessment framework that addresses both actual and potential threats. The framework was developed based on available intelligence and other open source information along with interviews with those persons familiar with the concept of dual use and the multiple, sometimes competing agendas of a variety of interest groups. The framework will help to bring some clarity to the discussion and at the same time, help to inform those that are positioned to respond to the threat. (author)

  5. USGS Environmental health science strategy: providing environmental health science for a changing world: public review release

    Science.gov (United States)

    Bright, Patricia R.; Buxton, Herbert T.; Balistrieri, Laurie S.; Barber, Larry B.; Chapelle, Francis H.; Cross, Paul C.; Krabbenhoft, David P.; Plumlee, Geoffrey S.; Sleeman, Jonathan M.; Tillitt, Donald E.; Toccalino, Patricia L.; Winton, James R.

    2012-01-01

    America has an abundance of natural resources. We have bountiful clean water, fertile soil, and unrivaled national parks, wildlife refuges, and public lands. These resources enrich our lives and preserve our health and wellbeing. These resources have been maintained because of our history of respect for their value and an enduring commitment to their vigilant protection. Awareness of the social, economic, and personal value of the health of our environment is increasing. The emergence of environmentally driven diseases caused by environmental exposure to contaminants and pathogens is a growing concern worldwide. New health threats and patterns of established threats are affected by both natural and anthropogenic changes to the environment. Human activities are key drivers of emerging (new and re-emerging) health threats. Societal demands for land and natural resources, a better quality of life, improved economic prosperity, and the environmental impacts associated with these demands will continue to increase. Natural earth processes, climate trends, and related climatic events will add to the environmental impact of human activities. These environmental drivers will influence exposure to disease agents, including viral, bacterial, prion, and fungal pathogens, parasites, natural earth materials, toxins and other biogenic compounds, and synthetic chemicals and substances. The U.S. Geological Survey (USGS) defines environmental health science broadly as the interdisciplinary study of relations among the quality of the physical environment, the health of the living environment, and human health. The interactions among these three spheres are driven by human activities, ecological processes, and natural earth processes; the interactions affect exposure to contaminants and pathogens and the severity of environmentally driven diseases in animals and people. This definition provides USGS with a framework for synthesizing natural science information from across the Bureau

  6. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    Science.gov (United States)

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic

  7. Environmental assessment of lightweight electric vehicles

    CERN Document Server

    Egede, Patricia

    2017-01-01

    This monograph adresses the challenge of the environmental assessment of leightweight electric vehicles. It poses the question whether the use of lightweight materials in electric vehicles can reduce the vehicles’ environmental impact and compares the environmental performance of a lightweight electric vehicle (LEV) to other types of vehicles. The topical approach focuses on methods from life cycle assessment (LCA), and the book concludes with a comprehensive concept on the environmental assessment of LEVs. The target audience primarily comprises LCA practitioners from research institutes and industry, but it may also be beneficial for graduate students specializing in the field of environmental assessment.

  8. The 'threat' of radioactivity: how environmental education can help overcome it

    International Nuclear Information System (INIS)

    Villar, Heldio P.

    2009-01-01

    One of the most paradoxical tenets of environmentalists is that nuclear power and environmental preservation are as antagonistic as yin and yang. It is virtually impossible to reconcile them with the idea that, since the second law of thermodynamics decrees that you cannot produce energy without creating environmental change of some kind, the nuclear option is, of all available, the one that is capable of supplying huge amounts of energy with the least impact on the planet. Nevertheless, the public is always misled by the environmental cassandras that prognosticate doom for a world where nuclear reactors still operate. lnevitably, nuclear projects other than power stations, like research reactors and particle accelerators, are also met with public distrust. It is proposed herein that the introduction of the theoretical bases of radioactivity, radiation physics and nuclear power plants in the environmental education curricula will slowly but surely result in a greater awareness of the public towards the reality surrounding radiation and radioactivity. This initiative, coupled with a more realistic approach towards nuclear risks on the part of nuclear regulators and licensers, has the potential to make nuclear applications - not only in electric energy production - more palatable to the public, rendering it more prepared to reap the benefits thereof. (author)

  9. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  11. Preparatory power posing affects nonverbal presence and job interview performance.

    Science.gov (United States)

    Cuddy, Amy J C; Wilmuth, Caroline A; Yap, Andy J; Carney, Dana R

    2015-07-01

    The authors tested whether engaging in expansive (vs. contractive) "power poses" before a stressful job interview--preparatory power posing--would enhance performance during the interview. Participants adopted high-power (i.e., expansive, open) poses or low-power (i.e., contractive, closed) poses, and then prepared and delivered a speech to 2 evaluators as part of a mock job interview. All interview speeches were videotaped and coded for overall performance and hireability and for 2 potential mediators: verbal content (e.g., structure, content) and nonverbal presence (e.g., captivating, enthusiastic). As predicted, those who prepared for the job interview with high- (vs. low-) power poses performed better and were more likely to be chosen for hire; this relation was mediated by nonverbal presence, but not by verbal content. Although previous research has focused on how a nonverbal behavior that is enacted during interactions and observed by perceivers affects how those perceivers evaluate and respond to the actor, this experiment focused on how a nonverbal behavior that is enacted before the interaction and unobserved by perceivers affects the actor's performance, which, in turn, affects how perceivers evaluate and respond to the actor. This experiment reveals a theoretically novel and practically informative result that demonstrates the causal relation between preparatory nonverbal behavior and subsequent performance and outcomes. (c) 2015 APA, all rights reserved).

  12. Consistently Showing Your Best Side? Intra-individual Consistency in #Selfie Pose Orientation

    Science.gov (United States)

    Lindell, Annukka K.

    2017-01-01

    Painted and photographic portraits of others show an asymmetric bias: people favor their left cheek. Both experimental and database studies confirm that the left cheek bias extends to selfies. To date all such selfie studies have been cross-sectional; whether individual selfie-takers tend to consistently favor the same pose orientation, or switch between multiple poses, remains to be determined. The present study thus examined intra-individual consistency in selfie pose orientations. Two hundred selfie-taking participants (100 male and 100 female) were identified by searching #selfie on Instagram. The most recent 10 single-subject selfies for the each of the participants were selected and coded for type of selfie (normal; mirror) and pose orientation (left, midline, right), resulting in a sample of 2000 selfies. Results indicated that selfie-takers do tend to consistently adopt a preferred pose orientation (α = 0.72), with more participants showing an overall left cheek bias (41%) than would be expected by chance (overall right cheek bias = 31.5%; overall midline bias = 19.5%; no overall bias = 8%). Logistic regression modellng, controlling for the repeated measure of participant identity, indicated that sex did not affect pose orientation. However, selfie type proved a significant predictor when comparing left and right cheek poses, with a stronger left cheek bias for mirror than normal selfies. Overall, these novel findings indicate that selfie-takers show intra-individual consistency in pose orientation, and in addition, replicate the previously reported left cheek bias for selfies and other types of portrait, confirming that the left cheek bias also presents within individuals’ selfie corpora. PMID:28270790

  13. An outbreak of Leishmania major from an endemic to a non-endemic region posed a public health threat in Iraq from 2014-2017: Epidemiological, molecular and phylogenetic studies.

    Directory of Open Access Journals (Sweden)

    Mariwan M M Al-Bajalan

    2018-03-01

    Full Text Available Cutaneous leishmaniasis (CL is a neglected worldwide, zoonotic, vector-borne, tropical disease that is a threat to public health. This threat may spread from endemic to non-endemic areas. Current research has exploited epidemiological, molecular and phylogenetical studies to determine the danger of an outbreak of CL in the borderline area between northern and central Iraq from 2014-2017.For the first time, using sequence analysis of the cytochrome b gene, the occurrence of CL in the borderline area between northern and central Iraq was confirmed to be due to Leishmania major. The phylogenetic analysis indicated that it was closely related to the L. major MRHO/IR/75/ER strain in Iran.In conclusion, the genotype confirmation of the L. major strain will improve our understanding of the epidemiology of the disease. This is important for facilitating control programs to prevent the further spread of CL. Furthermore, this area could be considered as a model for further research on the risk of global CL epidemics in other non-endemic countries where both reservoir hosts and sandfly vectors are present.

  14. An outbreak of Leishmania major from an endemic to a non-endemic region posed a public health threat in Iraq from 2014-2017: Epidemiological, molecular and phylogenetic studies.

    Science.gov (United States)

    Al-Bajalan, Mariwan M M; Al-Jaf, Sirwan M A; Niranji, Sherko S; Abdulkareem, Dler R; Al-Kayali, Khudhair K; Kato, Hirotomo

    2018-03-01

    Cutaneous leishmaniasis (CL) is a neglected worldwide, zoonotic, vector-borne, tropical disease that is a threat to public health. This threat may spread from endemic to non-endemic areas. Current research has exploited epidemiological, molecular and phylogenetical studies to determine the danger of an outbreak of CL in the borderline area between northern and central Iraq from 2014-2017. For the first time, using sequence analysis of the cytochrome b gene, the occurrence of CL in the borderline area between northern and central Iraq was confirmed to be due to Leishmania major. The phylogenetic analysis indicated that it was closely related to the L. major MRHO/IR/75/ER strain in Iran. In conclusion, the genotype confirmation of the L. major strain will improve our understanding of the epidemiology of the disease. This is important for facilitating control programs to prevent the further spread of CL. Furthermore, this area could be considered as a model for further research on the risk of global CL epidemics in other non-endemic countries where both reservoir hosts and sandfly vectors are present.

  15. The place of environmental education and awareness in biodiversity ...

    African Journals Online (AJOL)

    This paper examines the place of environmental education and awareness in biodiversity conservation in Nigeria. Depletion of biodiversity in Nigeria is a major environmental problem and a serious threat to livelihood and the quality of life. It is very important that future development programmes aggressively develop ...

  16. Preventing radiological threat in the Republic of Azerbaijan

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2005-01-01

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  17. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  18. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  19. Effects of night work, sleep loss and time on task on simulated threat detection performance.

    Science.gov (United States)

    Basner, Mathias; Rubinstein, Joshua; Fomberstein, Kenneth M; Coble, Matthew C; Ecker, Adrian; Avinash, Deepa; Dinges, David F

    2008-09-01

    To investigate the effects of night work and sleep loss on a simulated luggage screening task (SLST) that mimicked the x-ray system used by airport luggage screeners. We developed more than 5,800 unique simulated x-ray images of luggage organized into 31 stimulus sets of 200 bags each. 25% of each set contained either a gun or a knife with low or high target difficulty. The 200-bag stimuli sets were then run on software that simulates an x-ray screening system (SLST). Signal detection analysis was used to obtain measures of hit rate (HR), false alarm rate (FAR), threat detection accuracy (A'), and response bias (B"(D)). Experimental laboratory study 24 healthy nonprofessional volunteers (13 women, mean age +/- SD = 29.9 +/- 6.5 years). Subjects performed the SLST every 2 h during a 5-day period that included a 35 h period of wakefulness that extended to night work and then another day work period after the night without sleep. Threat detection accuracy A' decreased significantly (P work, while both A' (P = 0.001) and HR decreased (P = 0.008) during day work following sleep loss. There were prominent time-on-task effects on response bias B"(D) (P= 0.002) and response latency (P = 0.004), but accuracy A' was unaffected. Both HR and FAR increased significantly with increasing study duration (both P work and sleep loss adversely affect the accuracy of detecting complex real world objects among high levels of background clutter. If the results can be replicated in professional screeners and real work environments, fatigue in luggage screening personnel may pose a threat for air traffic safety unless countermeasures for fatigue are deployed.

  20. Cannabinoid CB1 receptors in distinct circuits of the extended amygdala determine fear responsiveness to unpredictable threat.

    Science.gov (United States)

    Lange, M D; Daldrup, T; Remmers, F; Szkudlarek, H J; Lesting, J; Guggenhuber, S; Ruehle, S; Jüngling, K; Seidenbecher, T; Lutz, B; Pape, H C

    2017-10-01

    The brain circuits underlying behavioral fear have been extensively studied over the last decades. Although the vast majority of experimental studies assess fear as a transient state of apprehension in response to a discrete threat, such phasic states of fear can shift to a sustained anxious apprehension, particularly in face of diffuse cues with unpredictable environmental contingencies. Unpredictability, in turn, is considered an important variable contributing to anxiety disorders. The networks of the extended amygdala have been suggested keys to the control of phasic and sustained states of fear, although the underlying synaptic pathways and mechanisms remain poorly understood. Here, we show that the endocannabinoid system acting in synaptic circuits of the extended amygdala can explain the fear response profile during exposure to unpredictable threat. Using fear training with predictable or unpredictable cues in mice, combined with local and cell-type-specific deficiency and rescue of cannabinoid type 1 (CB1) receptors, we found that presynaptic CB1 receptors on distinct amygdala projections to bed nucleus of the stria terminalis (BNST) are both necessary and sufficient for the shift from phasic to sustained fear in response to an unpredictable threat. These results thereby identify the causal role of a defined protein in a distinct brain pathway for the temporal development of a sustained state of anxious apprehension during unpredictability of environmental influences, reminiscent of anxiety symptoms in humans.

  1. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  2. Simulated ICJ Judgment : Revisiting the Lawfulness of the Threat or Use of Nuclear Weapons

    Directory of Open Access Journals (Sweden)

    Winston P. Nagan

    2012-04-01

    Full Text Available The author prepared this simulated judgment at the request of Cadmus editors to demonstrate that there is ample ground for revisiting and revising the landmark 1996 advisory opinion of the ICJ on the legality of nuclear weapons. The ICJ failed to anticipate the proliferation of nuclear weapons, which expands the evolution of the concept of sovereignty, the potential cataclysmic impact of nuclear war on climate change, the multiplication of nuclear-weapon-free zones as evidence of a widespread rejection, mounting evidence regarding the physical and psychological harm, and unwillingness of the nuclear weapons states to fulfill their obligations under the NPT. This article challenges the notion that a few sovereign states should be the sole arbiters of international law and affirms the legitimate claim of the global community of protection from the existential threat posed by nuclear weapons. The use or threat of use undermines foundational values of the international legal system and the specific rules of self-defense and humanitarian law. The contribution seeks to give an accentuated role for the explicit use of the fundamental values of international legal order, in crafting an innovative methodology for the formulation of the judgment. The very existence of these weapons undermines the rights of all of humanity. The ICJ should be moved to categorically declare the use and possession of nuclear weapons a crime against humanity.

  3. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  4. The relative pose estimation of aircraft based on contour model

    Science.gov (United States)

    Fu, Tai; Sun, Xiangyi

    2017-02-01

    This paper proposes a relative pose estimation approach based on object contour model. The first step is to obtain a two-dimensional (2D) projection of three-dimensional (3D)-model-based target, which will be divided into 40 forms by clustering and LDA analysis. Then we proceed by extracting the target contour in each image and computing their Pseudo-Zernike Moments (PZM), thus a model library is constructed in an offline mode. Next, we spot a projection contour that resembles the target silhouette most in the present image from the model library with reference of PZM; then similarity transformation parameters are generated as the shape context is applied to match the silhouette sampling location, from which the identification parameters of target can be further derived. Identification parameters are converted to relative pose parameters, in the premise that these values are the initial result calculated via iterative refinement algorithm, as the relative pose parameter is in the neighborhood of actual ones. At last, Distance Image Iterative Least Squares (DI-ILS) is employed to acquire the ultimate relative pose parameters.

  5. Problem Posing with Realistic Mathematics Education Approach in Geometry Learning

    Science.gov (United States)

    Mahendra, R.; Slamet, I.; Budiyono

    2017-09-01

    One of the difficulties of students in the learning of geometry is on the subject of plane that requires students to understand the abstract matter. The aim of this research is to determine the effect of Problem Posing learning model with Realistic Mathematics Education Approach in geometry learning. This quasi experimental research was conducted in one of the junior high schools in Karanganyar, Indonesia. The sample was taken using stratified cluster random sampling technique. The results of this research indicate that the model of Problem Posing learning with Realistic Mathematics Education Approach can improve students’ conceptual understanding significantly in geometry learning especially on plane topics. It is because students on the application of Problem Posing with Realistic Mathematics Education Approach are become to be active in constructing their knowledge, proposing, and problem solving in realistic, so it easier for students to understand concepts and solve the problems. Therefore, the model of Problem Posing learning with Realistic Mathematics Education Approach is appropriately applied in mathematics learning especially on geometry material. Furthermore, the impact can improve student achievement.

  6. Environmental impacts of wastewater from urban slums: case study - Old Fadama, Accra

    Directory of Open Access Journals (Sweden)

    Monney, I.

    2013-06-01

    Full Text Available The burgeoning of slums in the developing world poses an urgent environmental threat due to insanitary conditions and rampant disposal of wastewater. To assess the potential environmental impacts, domestic wastewater from Ghana's biggest urban slum - Old Fadama was characterised throughout the dry and wet seasons. The study drew on a comprehensive assessment of the general sanitary conditions in the community to determine the sources of pollution and water quality monitoring. BOD5 levels of wastewater from the study area were 545.63±99.88mg/L and 645.94±331.43mg/L in the dry and wet seasons respectively whereas COD levels were 1100.45±167.16mg/L and 1415.12±722.83mg/L in the dry and wet seasons respectively. E-coli levels were 4±1x106CFU/100mL and 4200±2400 x106CFU/100mL in the dry and wet seasons respectively whereas total coliform levels also showed the same trend with 9±2106CFU/100mL and 16800±5100106CFU/100mL in the dry and wet seasons respectively. The study identifies that wastewater from this community has potential deleterious environmental implications due to high levels of nutrients, oxygen-demanding substances and faecal coliforms. Pollutants were identified to be emanating predominantly from open defecation and indiscriminate waste disposal. Efforts should thus be directed towards improving sanitary conditions viz. access to toilet facilities, waste disposal mechanisms and best management practices for wastewater.

  7. Pose and Solve Varignon Converse Problems

    Science.gov (United States)

    Contreras, José N.

    2014-01-01

    The activity of posing and solving problems can enrich learners' mathematical experiences because it fosters a spirit of inquisitiveness, cultivates their mathematical curiosity, and deepens their views of what it means to do mathematics. To achieve these goals, a mathematical problem needs to be at the appropriate level of difficulty,…

  8. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  9. アメリカ先住民と環境問題 : 1970・80年代のサウスダコタ州を中心に

    OpenAIRE

    内田, 綾子; UCHIDA, Ayako

    2012-01-01

    The Oglala Lakota Sioux have historically experienced numerous case of environmental damage to their homeland, the Black Hills and their Pine Ridge Reservation in South Dakota. Especially after World War II, uranium mining, nuclear waste and weapons testing in this area posed a serious threat to the water and the health of the Lakota people as well as local residents. This paper discusses how the environmental coalition between Native Americans and non-Indian ranchers/farmers tried to defend ...

  10. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  11. Head Pose Estimation on Eyeglasses Using Line Detection and Classification Approach

    Science.gov (United States)

    Setthawong, Pisal; Vannija, Vajirasak

    This paper proposes a unique approach for head pose estimation of subjects with eyeglasses by using a combination of line detection and classification approaches. Head pose estimation is considered as an important non-verbal form of communication and could also be used in the area of Human-Computer Interface. A major improvement of the proposed approach is that it allows estimation of head poses at a high yaw/pitch angle when compared with existing geometric approaches, does not require expensive data preparation and training, and is generally fast when compared with other approaches.

  12. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  13. Attribute And-Or Grammar for Joint Parsing of Human Pose, Parts and Attributes.

    Science.gov (United States)

    Park, Seyoung; Nie, Xiaohan; Zhu, Song-Chun

    2017-07-25

    This paper presents an attribute and-or grammar (A-AOG) model for jointly inferring human body pose and human attributes in a parse graph with attributes augmented to nodes in the hierarchical representation. In contrast to other popular methods in the current literature that train separate classifiers for poses and individual attributes, our method explicitly represents the decomposition and articulation of body parts, and account for the correlations between poses and attributes. The A-AOG model is an amalgamation of three traditional grammar formulations: (i)Phrase structure grammar representing the hierarchical decomposition of the human body from whole to parts; (ii)Dependency grammar modeling the geometric articulation by a kinematic graph of the body pose; and (iii)Attribute grammar accounting for the compatibility relations between different parts in the hierarchy so that their appearances follow a consistent style. The parse graph outputs human detection, pose estimation, and attribute prediction simultaneously, which are intuitive and interpretable. We conduct experiments on two tasks on two datasets, and experimental results demonstrate the advantage of joint modeling in comparison with computing poses and attributes independently. Furthermore, our model obtains better performance over existing methods for both pose estimation and attribute prediction tasks.

  14. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  15. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  16. BROOKHAVEN NATIONAL LABORATORY SITE ENVIRONMENTAL REPORT FOR CALENDAR YEAR 1994.

    Energy Technology Data Exchange (ETDEWEB)

    NAIDU,J.R.; ROYCE,B.A.

    1995-05-01

    applicable environmental laws and regulations governing emission and discharge of materials to the environment, and that the environmental impacts at Brookhaven National Laboratory are minimal and pose no threat to the public or to the environment. This report meets the requirements of Department of Energy Orders 5484.1, Environmental Protection, Safety, and Health Protection Information reporting requirements and 5400.1, General Environmental Protection Programs.

  17. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  18. Categorization of questions posed before and after inquiry-based learning

    Directory of Open Access Journals (Sweden)

    Sandra Milena García González

    2014-07-01

    Full Text Available Posing research questions is the central ability of the scientific thought. This article examines the ability of sixth grade children to pose researchable questions before and after a three months’ work on a didactic sequence based on the inquiry school model. According to their purpose, the questions asked by children, after reading a text, were classified into researchable questions -susceptible to be empirically explored-, questions about a cause, and questions on a piece of data. The results show that the amount and the type of questions the students were able to pose during the intervention changed, from most of questions on data or information, to most of researchable questions, subsequently, the importance of designing teaching approaches to foster this ability was proved.

  19. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  20. Invasive lionfish (Pterois volitans): a potential human health threat for ciguatera fish poisoning in tropical waters.

    Science.gov (United States)

    Robertson, Alison; Garcia, Ana C; Quintana, Harold A Flores; Smith, Tyler B; Castillo, Bernard F; Reale-Munroe, Kynoch; Gulli, Joseph A; Olsen, David A; Hooe-Rollman, Jennifer I; Jester, Edward L E; Klimek, Brian J; Plakas, Steven M

    2013-12-27

    Invasive Indo-Pacific lionfish (Pterois volitans) have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP). More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas.