WorldWideScience

Sample records for handling environmental threats

  1. Health and environmental threats associated with the destruction of chemical weapons.

    Science.gov (United States)

    Matousek, Jirí

    2006-09-01

    Still existing arsenals of chemical weapons (CW) pose not only security threats for possible use in hostilities by state actors or misuse by terrorists but also safety threats to humans and biota due to leakages and possible accidents. The Chemical Weapons Convention (CWC) commits the States Parties (SPs) to destroy CW using technologies taking into consideration human health and environmental protection. It does not allow methods, routinely used up to the 1970s, such as earth burial, open-pit burning, and sea dumping. Long-term health and environmental threats and some accidents that have already occurred in the known localities of the sea-dumped and earth-buried arsenals of Nazi-German armed forces in the Baltic Region and of Imperial Japanese forces in the Far East Region are analyzed according to the impact of major CW and ammunition types (i.e., sulfur mustard--HD, tabun--GA, arsenicals--DA, DC, DM, arsine oil, and chloroacetophenone--CN). Any possible operations and handling with CW envisaged by the CWC as well as their verification are summarized taking into account the health threat they pose. CW and toxic armament waste to be destroyed and applied technologies (both developed and under current use in operational CW destruction facilities [CWDF]) are reviewed as are systems of health safety and environmental protection of the destruction/demilitarization stems from the extraordinary high toxicity of supertoxic lethal agents in man and biota. Problems of currently used Russian and U.S. standards for maximum allowable workplace concentrations and general population limits and possibilities of their determination by available analytical instrumentation are discussed.

  2. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  3. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  4. Consumer Perception of Environmental Harm and Willingness to Pay Environmental Handling Fees

    Directory of Open Access Journals (Sweden)

    Calvin Lakhan

    2016-03-01

    Full Text Available This study undertook a critical examination of the relationship between perception of environmental harm and consumer willingness to pay for environmental handling fees (EHF. This analysis was supplemented by asking study participants to indicate under what circumstances (and for what materials they believe a visible fee is appropriate. This study found that there is a statistically significant correlation between willingness to pay environmental handling fees and the perceived environmental harm of the product on which the fee is applied. For items that respondents viewed as “innocuous to the environment” (i.e., “keyboards and mice”, they were relatively unwilling to pay an environmental handling fee. Conversely, for the full range of hazardous waste materials, consumers expressed a willingness to pay EHFs. With respect to fee visibility, respondents indicated that they preferred visible fees (at the sticker for products that they perceived to be dangerous. There is a strong correlation between perceived environmental harm and whether fees should be visible. Consumers are not necessarily averse to paying an eco fee on products (be they hazardous waste, electronic waste, etc., but their willingness to do so is almost entirely a function of whether they believe the product is environmentally burdensome. It is the recommendation of this study that promotion and education campaigns for environmental handling fees, particularly those surrounding waste electronics, place greater emphasis on environmental consequences of improper disposal.

  5. Illegal handling of radioactive and nuclear materials. Threats and suggestions for measures

    International Nuclear Information System (INIS)

    Oliver, Lena; Melin, Lena; Prawitz, Jan; Ringbom, Anders; Sandstroem, Bjoern; Wigg, Lars; Wirstam, Jens

    2004-01-01

    This project deals with threats from smuggling or other illegal transportation of radioactive or nuclear materials across the borders to Sweden, and with the security of handling such materials in Sweden. The project has included studies of relevant documentation; visits and interviews at industries, hospitals, research institutes and military institutions in Sweden that handle radioactive materials; a pilot study at the Stockholm freeport, where equipment for detection of radioactive materials has been tested for six months; an analysis of incidents reported to the IAEA database; and an analysis of Swedish incidents. The following conclusions are drawn: Stricter rules regarding the physical protection of radiation sources and radioactive materials should be implemented in Sweden. The recommendations recently issued by IAEA should serve as a point of departure for working out such rules

  6. TECHNIQUES WITH POTENTIAL FOR HANDLING ENVIRONMENTAL SAMPLES IN CAPILLARY ELECTROPHORESIS

    Science.gov (United States)

    An assessment of the methods for handling environmental samples prior to capillary electrophoresis (CE) is presented for both aqueous and solid matrices. Sample handling in environmental analyses is the subject of ongoing research at the Environmental Protection Agency's National...

  7. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    Directory of Open Access Journals (Sweden)

    Florian Erik Klonek

    2015-07-01

    Full Text Available Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT, threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT, threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI—an intervention aimed at increasing intrinsic motivation—can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group. We coded agents verbal threats and recipients’ verbal expressions of motivation. Recipients also rated agents’ level of confrontation and empathy (i.e., cognitive reactions. As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients’ expressed motivation (i.e., reasons to change. Contrary to our expectations, we found no relation between change agents’ verbal threats and change recipients’ verbally expressed self-defenses (i.e., sustain talk. Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  8. Using Motivational Interviewing to reduce threats in conversations about environmental behavior.

    Science.gov (United States)

    Klonek, Florian E; Güntner, Amelie V; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals' self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting counter-arguments when presented with environmental behavior change. The current study examines how change recipients respond to threats from change agents in interactions about environmental behavior change. Moreover, we investigate how Motivational Interviewing (MI) - an intervention aimed at increasing intrinsic motivation - can reduce threats at both the social and cognitive level. We videotaped 68 dyadic interactions with change agents who either did or did not use MI (control group). We coded agents verbal threats and recipients' verbal expressions of motivation. Recipients also rated agents' level of confrontation and empathy (i.e., cognitive reactions). As hypothesized, threats were significantly lower when change agents used MI. Perceived confrontations converged with observable social behavior of change agents in both groups. Moreover, behavioral threats showed a negative association with change recipients' expressed motivation (i.e., reasons to change). Contrary to our expectations, we found no relation between change agents' verbal threats and change recipients' verbally expressed self-defenses (i.e., sustain talk). Our results imply that MI reduces the adverse impact of threats in conversations about environmental behavior change on both the social and cognitive level. We discuss theoretical implications of our study in the context of SAT and SDT and suggest practical implications for environmental change agents in organizations.

  9. Intertextuality for Handling Complex Environmental Issues

    Science.gov (United States)

    Byhring, Anne Kristine; Knain, Erik

    2016-01-01

    Nowhere is the need for handling complexity more pertinent than in addressing environmental issues. Our study explores students' situated constructs of complexity in unfolding discourses on socio-scientific issues. Students' dialogues in two group-work episodes are analysed in detail, with tools from Systemic Functional Linguistics. We identify…

  10. Using Motivational Interviewing to reduce threats in conversations about environmental behavior

    OpenAIRE

    Klonek, Florian E.; G?ntner, Amelie V.; Lehmann-Willenbrock, Nale; Kauffeld, Simone

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  11. Handling of Solid Residues

    International Nuclear Information System (INIS)

    Medina Bermudez, Clara Ines

    1999-01-01

    The topic of solid residues is specifically of great interest and concern for the authorities, institutions and community that identify in them a true threat against the human health and the atmosphere in the related with the aesthetic deterioration of the urban centers and of the natural landscape; in the proliferation of vectorial transmitters of illnesses and the effect on the biodiversity. Inside the wide spectrum of topics that they keep relationship with the environmental protection, the inadequate handling of solid residues and residues dangerous squatter an important line in the definition of political and practical environmentally sustainable. The industrial development and the population's growth have originated a continuous increase in the production of solid residues; of equal it forms, their composition day after day is more heterogeneous. The base for the good handling includes the appropriate intervention of the different stages of an integral administration of residues, which include the separation in the source, the gathering, the handling, the use, treatment, final disposition and the institutional organization of the administration. The topic of the dangerous residues generates more expectation. These residues understand from those of pathogen type that are generated in the establishments of health that of hospital attention, until those of combustible, inflammable type, explosive, radio-active, volatile, corrosive, reagent or toxic, associated to numerous industrial processes, common in our countries in development

  12. The environmental handling in the Oil Wells

    International Nuclear Information System (INIS)

    Carta Petrolera

    1998-01-01

    The oil industry bears environmental impacts related to the resources, soil, air, water, fauna and the socioeconomic aspects of the environment; for this reason the search of the petroleum goes beyond what is believed, it embraces other spheres because, after discovery, it is necessary to extract it, to transport it and to treat it to put it to the service of the humanity's development and in all this long and complex process, is the environmental responsibility, a serious concern as the same discovery of the hydrocarbons. In the beginnings of the oil industry in Colombia this activity was approached without the biggest forecasts as for contamination it refers; however, the environmental laws of the world and the constant concern to preserve the environment, it took to our country to the creation of severe legislations in the matter. In Colombia today in day an environmental legislation exists in all the related with the handling of waters, air and soils inside the oil activity

  13. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    OpenAIRE

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation for behavior change. According to self-affirmation theory (SAT), threats can harm individuals’ self-integrity. Therefore, individuals should show self-defensive biases, e.g., in terms of presenting c...

  14. Environmental and safety aspects. The best of 'powder handling and processing' 1989 - 1997. 'Bulk solids handling' 1992 - 1997 (H/2000)

    Energy Technology Data Exchange (ETDEWEB)

    Woehlbier, R.H. (ed.)

    2000-07-01

    The book contains articles published either during 1992-1997 in ''bulk solids handling'' or during 1989-1997 in ''powder handling and processing''. Main topics are aspects of safety and environmental protection in bulk solids handling: dusts, hazardous powders, prevention and mitigation of dust explosions, powdered coal handling, dedusting, filters, electrostatic precipitation, materials recovery, occupational safety.(uke)

  15. Construction and operation of replacement hazardous waste handling facility at Lawrence Berkeley Laboratory. Environmental Assessment

    Energy Technology Data Exchange (ETDEWEB)

    1992-09-01

    The US Department of Energy (DOE) has prepared an environmental assessment (EA), DOE/EA-0423, for the construction and operation of a replacement hazardous waste handling facility (HWHF) and decontamination of the existing HWHF at Lawrence Berkeley Laboratory (LBL), Berkeley, California. The proposed facility would replace several older buildings and cargo containers currently being used for waste handling activities and consolidate the LBL`s existing waste handling activities in one location. The nature of the waste handling activities and the waste volume and characteristics would not change as a result of construction of the new facility. Based on the analysis in the EA, DOE has determined that the proposed action would not constitute a major Federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act (NEPA) of 1969, 42 USC. 4321 et seq. Therefore, an environmental impact statement is not required.

  16. Coping with global environmental change, disasters and security: threats, challenges, vulnerabilities and risks

    NARCIS (Netherlands)

    Brauch, H.G.; Oswald Spring, Ú.; Mesjasz, C.; Grin, J.; Kameri-Mbote, P.; Chourou, B.; Dunay, P.; Birkmann, J.

    2011-01-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10

  17. Reducing threats in conversations about environmental behavior change: The positive impact of Motivational Interviewing

    NARCIS (Netherlands)

    Klonek, F.E.; Güntner, A.V.; Lehmann-Willenbrock, N.K.; Kauffeld, S.

    2015-01-01

    Human behavior contributes to a waste of environmental resources and our society is looking for ways to reduce this problem. However, humans may perceive feedback about their environmental behavior as threatening. According to self-determination theory (SDT), threats decrease intrinsic motivation

  18. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  19. 2007 accomplishment report for the Eastern and Western forest environmental threat assessment centers

    Science.gov (United States)

    Danny C. Lee; Jerome S. Beatty

    2008-01-01

    As chance would have it, the Eastern Forest and Western Wildland Environmental Threat Assessment Centers were created the same year (2005) that the Forest Service celebrated its centennial anniversary as an agency of the U.S. Department of Agriculture. The historic birth of the Forest Service provides a nice backdrop to view our own more modest beginnings. Both events...

  20. ENVIRONMENTAL SAMPLING USING LOCATION SPECIFIC AIR MONITORING IN BULK HANDLING FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Sexton, L.; Hanks, D.; Degange, J.; Brant, H.; Hall, G.; Cable-Dunlap, P.; Anderson, B.

    2011-06-07

    Since the introduction of safeguards strengthening measures approved by the International Atomic Energy Agency (IAEA) Board of Governors (1992-1997), international nuclear safeguards inspectors have been able to utilize environmental sampling (ES) (e.g. deposited particulates, air, water, vegetation, sediments, soil and biota) in their safeguarding approaches at bulk uranium/plutonium handling facilities. Enhancements of environmental sampling techniques used by the IAEA in drawing conclusions concerning the absence of undeclared nuclear materials or activities will soon be able to take advantage of a recent step change improvement in the gathering and analysis of air samples at these facilities. Location specific air monitoring feasibility tests have been performed with excellent results in determining attribute and isotopic composition of chemical elements present in an actual test-bed sample. Isotopic analysis of collected particles from an Aerosol Contaminant Extractor (ACE) collection, was performed with the standard bulk sampling protocol used throughout the IAEA network of analytical laboratories (NWAL). The results yielded bulk isotopic values expected for the operations. Advanced designs of air monitoring instruments such as the ACE may be used in gas centrifuge enrichment plants (GCEP) to detect the production of highly enriched uranium (HEU) or enrichments not declared by a State. Researchers at Savannah River National Laboratory in collaboration with Oak Ridge National Laboratory are developing the next generation of ES equipment for air grab and constant samples that could become an important addition to the international nuclear safeguards inspector's toolkit. Location specific air monitoring to be used to establish a baseline environmental signature of a particular facility employed for comparison of consistencies in declared operations will be described in this paper. Implementation of air monitoring will be contrasted against the use of smear

  1. The seperate and interactive effects of handling and environmental enrichment on the behaviour and welfare of growing pigs

    NARCIS (Netherlands)

    Day, J.E.L.; Spoolder, H.A.M.; Burfoot, A.; Chamberlain, H.L.; Edwards, S.A.

    2002-01-01

    The aim of this experiment was to determine the interactive effects of handling and environmental enrichment on the behaviour, performance and welfare of the growing/finishing pig. Groups of pigs were exposed to one of eight treatments arranged in a 2 x 4 factorial design with two levels of handling

  2. Coping with global environmental change, disasters and security. Threats, challenges, vulnerabilities and risks

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; UNU-EHS, Bonn (DE). College of Associated Scientists and Advisors (CASA); Oswald Spring, Ursula [National Univ. of Mexico, Cuernavaca (MX). Regional Multidisciplinary Research Centre (CRIM); Mesjasz, Czeslaw [Cracow Univ. of Exonomics (Poland). Faculty of Management; Grin, John [Amsterdam Univ. (Netherlands). Dept. of Political Science; Dutch Knowledge network for Systems Innovations and Transitions (KSI), Amsterdam (Netherlands); Kameri-Mbote, Patricia [Strathmore Univ., Nairobi (Kenya). Dept. of Law; International Environmental Law Research Centre, Nairobi (Kenya); Chourou, Bechir [Univ. of Tunis-Carthage, Hammam-Chatt (Tunisia); Dunay, Pal [Geneva Centre for Security Policy (Switzerland). International Training Course in Security Policy; Birkmann, Joern (eds.) [United Nations Univ. (UNU), Bonn (DE). Inst. for Environment and Human Security (EHS)

    2011-07-01

    This policy-focused Global Environmental and Human Security Handbook for the Anthropo-cene (GEHSHA) addresses new security threats, challenges, vulnerabilities and risks posed by global environmental change and disasters. In 6 forewords, 5 preface essays 95 peer reviewed chapcountries analyse in 10 parts concepts of military and political hard security and economic, social, environmental soft security with a regional focus on the Near East, North and Sub-Sahara Africa and Asia and on hazards in urban centres. The major focus is on coping with global environmental change: climate change, desertification, water, food and health and with hazards and strategies on social vulnerability and resilience building and scientific, international, regional and national political strategies, policies and measures including early warning of conflicts and hazards. The book proposes a political geo-ecology and discusses a 'Fourth Green Revolution' for the Anthropocene era of earth history. (orig.)

  3. COST action TD1407: network on technology-critical elements (NOTICE)--from environmental processes to human health threats.

    Science.gov (United States)

    Cobelo-García, A; Filella, M; Croot, P; Frazzoli, C; Du Laing, G; Ospina-Alvarez, N; Rauch, S; Salaun, P; Schäfer, J; Zimmermann, S

    2015-10-01

    The current socio-economic, environmental and public health challenges that countries are facing clearly need common-defined strategies to inform and support our transition to a sustainable economy. Here, the technology-critical elements (which includes Ga, Ge, In, Te, Nb, Ta, Tl, the Platinum Group Elements and most of the rare-earth elements) are of great relevance in the development of emerging key technologies-including renewable energy, energy efficiency, electronics or the aerospace industry. In this context, the increasing use of technology-critical elements (TCEs) and associated environmental impacts (from mining to end-of-life waste products) is not restricted to a national level but covers most likely a global scale. Accordingly, the European COST Action TD1407: Network on Technology-Critical Elements (NOTICE)-from environmental processes to human health threats, has an overall objective for creating a network of scientists and practitioners interested in TCEs, from the evaluation of their environmental processes to understanding potential human health threats, with the aim of defining the current state of knowledge and gaps, proposing priority research lines/activities and acting as a platform for new collaborations and joint research projects. The Action is focused on three major scientific areas: (i) analytical chemistry, (ii) environmental biogeochemistry and (iii) human exposure and (eco)-toxicology.

  4. Construction of a Learning Agent Handling Its Rewards According to Environmental Situations

    Science.gov (United States)

    Moriyama, Koichi; Numao, Masayuki

    The authors aim at constructing an agent which learns appropriate actions in a Multi-Agent environment with and without social dilemmas. For this aim, the agent must have nonrationality that makes it give up its own profit when it should do that. Since there are many studies on rational learning that brings more and more profit, it is desirable to utilize them for constructing the agent. Therefore, we use a reward-handling manner that makes internal evaluation from the agent's rewards, and then the agent learns actions by a rational learning method with the internal evaluation. If the agent has only a fixed manner, however, it does not act well in the environment with and without dilemmas. Thus, the authors equip the agent with several reward-handling manners and criteria for selecting an effective one for the environmental situation. In the case of humans, what generates the internal evaluation is usually called emotion. Hence, this study also aims at throwing light on emotional activities of humans from a constructive view. In this paper, we divide a Multi-Agent environment into three situations and construct an agent having the reward-handling manners and the criteria. We observe that the agent acts well in all the three Multi-Agent situations composed of homogeneous agents.

  5. 340 waste handling facility interim safety basis

    Energy Technology Data Exchange (ETDEWEB)

    VAIL, T.S.

    1999-04-01

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people.

  6. 340 waste handling facility interim safety basis

    International Nuclear Information System (INIS)

    VAIL, T.S.

    1999-01-01

    This document presents an interim safety basis for the 340 Waste Handling Facility classifying the 340 Facility as a Hazard Category 3 facility. The hazard analysis quantifies the operating safety envelop for this facility and demonstrates that the facility can be operated without a significant threat to onsite or offsite people

  7. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  8. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  9. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  10. Environmental risk analysis of oil handling facilities in port areas. Application to Tarragona harbor (NE Spain).

    Science.gov (United States)

    Valdor, Paloma F; Gómez, Aina G; Puente, Araceli

    2015-01-15

    Diffuse pollution from oil spills is a widespread problem in port areas (as a result of fuel supply, navigation and loading/unloading activities). This article presents a method to assess the environmental risk of oil handling facilities in port areas. The method is based on (i) identification of environmental hazards, (ii) characterization of meteorological and oceanographic conditions, (iii) characterization of environmental risk scenarios, and (iv) assessment of environmental risk. The procedure has been tested by application to the Tarragona harbor. The results show that the method is capable of representing (i) specific local pollution cases (i.e., discriminating between products and quantities released by a discharge source), (ii) oceanographic and meteorological conditions (selecting a representative subset data), and (iii) potentially affected areas in probabilistic terms. Accordingly, it can inform the design of monitoring plans to study and control the environmental impact of these facilities, as well as the design of contingency plans. Copyright © 2014 Elsevier Ltd. All rights reserved.

  11. The Influence of Combat Experience on Psychologically Healthy Soldiers' Attentiveness to Environmental Threats.

    Science.gov (United States)

    Ranes, Bethany; Long, Chris P; Traynham, Stephanie; Hayes, Amanda

    2017-07-01

    In contrast to previous research that has primarily examined how psychological disorders (e.g., post-traumatic stress disorder [PTSD], anxiety) are affected by and affect individuals' threat perceptions, this study examines the relationship between combat experience and threat-monitoring in psychologically healthy Soldiers. Existing research has established how prolonged or intense experiences with war-related stressors can lead individuals to undergo an unconscious fear-conditioning process that affects the circuitry of the prefrontal cortex, hippocampus, amygdala, and anterior cingulate cortex regions of the brain. We predict that the intensity of one's combat experience positively influences Soldiers' attention to environmental threats. Participants included U. S. Army Soldiers with a score of 50 or below on the PTSD Checklist-Military Version. Participants completed the Combat Exposure Scale and the State-Trait Anxiety Inventory. The experimental prediction task we employed assesses the expectation of an intrusively loud white noise sound that occurred on three variable patterns in a pseudorandomized order. Each tone pattern was used 20 times over a total of 60 trials. The experimental prediction task included two neutral tones (700 and 1,300 Hz) that were presented in a repeated pattern along with a 100-dB burst of white noise (0.5-second duration). In each trial, one of three possible tone combinations was presented. To assess their attentiveness to threats, participants were asked to continuously rate their expectancy of the burst of white noise using a visual analogue scale (VAS) ranging from 0 to 100. VAS ratings were collected at controlled points throughout the task. None of the participants reported scores on any of the diagnostic surveys that met standards for clinical significance. A repeated-measures analysis of variance was conducted to assess the overall effect of the three prediction conditions on participants' VAS ratings. There was a significant

  12. Plan of environmental administration for the handling of ordinary and specific accustomed to waste of Los Chiles Hospital (Alajuela)

    International Nuclear Information System (INIS)

    Parini Corella, P.

    1999-01-01

    The area of study of the present project is the treatment of waste, likewise, the objective of this project was to design a plan of Environmental Administration for the handling of the ordinary and specific accustomed to waste generated in the Los Chiles Hospital. For all this, firstly one carries out an diagnose. In the first stage of diagnose, it was necessary to elaborate an initial tool that allowed to know the position of the Institution in environmental matter. To develop this they take into account different elements of the norm ISO-14000, specifically of the norms ISO-14001 and ISO-14004, the environmental legislation of our country, aspects of the strategic planning, elements of occupational security and some existent politicians at Managerial level of the CCSS related with the administration in the handling of hospital waste. With regard to this finish, one carries out a study on the situation of the Hospital, since this information constitutes the base for the elaboration of the Institutional Program, for the acquisition of inputs, the assignment of resources and for the establishment of the Program of Control of Monitoreo the diagnoses sandal five points: Generation and composition of the waste handling,resources, knowledge and attitudes,mechanism of Control. As for the evaluation of the different stages that you/they constitute the administration of the manipulation of the hospital accustomed to waste, three stages could be identified in the Los Chiles Hospital, that is: generation and deposit, gathering, transporting and final decomposition. The first one is since a complex stage it depends on several such factors as: the activity type that is carried out when the waste, the place is generated where is taken to end happiness activity, the type or nature of the waste and different people that can give origin to these waste. The second stage, the handling of the accustomed to waste, involves exclusively personal of toilet and some infirmary assistants

  13. The effect of education on the knowledge of environmental threats on health in students of elementary schools in Bushehr port

    Directory of Open Access Journals (Sweden)

    Maryam Ravanipour

    2006-02-01

    Full Text Available Background: More than one fourth of diseases around the world are caused by environmental threats. These threats have multifactorial effects on children's health. So, it needs collaboration between teachers, parents, students, and public health authorities to decrease them and improve health. Methods: A total of 18 primary schools were selected using random cluster sampling. After a need assessment analysis about environmental threads, the 3rd and 4th degree students of selected primary schools were invited to draw posters about air pollution, water sanitation, food contamination, natural disaster, solid waste pollution, and sea and beach pollution. Then, a booklet based on the initial need assessment about environmental threads was designed and used for a six weeks educational course. The students drew a second poster after the educational course taught by their teachers. The posters were scored for technical aspects and health concepts by independent examiners. Results: The mean score of students' knowledge about environmental threads increased after intervention (P<0.05. There was no difference between 4th graders and 5th graders, but girls showed a higher score than boys. Conclusion: In primary schools, booklet-based education was effective in promotion of the students' knowledge about environmental threads on health. Therefore, a booklet-based education, designed according to local need assessments, is recommended as a complementary education in primary schools.

  14. Level of environmental threat posed by horticultural trade in Cactaceae.

    Science.gov (United States)

    Novoa, Ana; Le Roux, Johannes J; Richardson, David M; Wilson, John R U

    2017-10-01

    Ornamental horticulture has been identified as an important threat to plant biodiversity and is a major pathway for plant invasions worldwide. In this context, the family Cactaceae is particularly challenging because it is considered the fifth most threatened large taxonomic group in the world; several species are among the most widespread and damaging invasive species; and Cactaceae is one of the most popular horticultural plant groups. Based on the Convention on International Trade in Endangered Species of Wild Flora and Fauna and the 11 largest online auction sites selling cacti, we documented the international cactus trade. To provide an in-depth look at the dynamics of the industry, we surveyed the businesses involved in the cactus trade in South Africa (a hotspot of cactus trade and invasions). We purchased seeds of every available species and used DNA barcoding to identify species to the genus level. Although <20% of this trade involved threatened species and <3% involved known invasive species, many species were identified by a common name. However, only 0.02% of the globally traded cacti were collected from wild populations. Despite a large commercial network, all South African imports (of which 15% and 1.5% were of species listed as threatened and invasive, respectively) came from the same source. With DNA barcoding, we identified 24% of the species to genus level. Based on our results, we believe that if trade restrictions are placed on the small proportion of cacti that are invasive and there is no major increase in harvesting of native populations, then the commercial trade in cactus poses a negligible environmental threat. However, there are currently no effective methods for easily identifying which cacti are traded, and both the illicit harvesting of cacti from the wild and the informal trade in invasive taxa pose on-going conservation challenges. © 2017 Society for Conservation Biology.

  15. The insider threat to cybersecurity: how group process and ignorance affect analyst accuracy and promptitude

    OpenAIRE

    Kelly, Ryan F.

    2017-01-01

    Approved for public release; distribution is unlimited The recent increase in high-profile insider cyber exploits indicates that current insider threat analysis (ITA) is insufficient to handle the growing insider threat problem. Well-established academic literature agrees that information overload is a problem ITA must overcome because ITA remains a human-intensive task. Two conceptual strategies to overcome information overload include reducing information and distributing information amo...

  16. Risk perception and environmental health concerns in conditions of social security threat

    International Nuclear Information System (INIS)

    Kolarova, D.

    1998-01-01

    Full text of publication follows: this study explores the connection between the perception of different societal risk, health concerns and behavioral attitudes of people in condition of social security threat. Two small and two big industrial towns were chosen in order to observe the social and psychological price of the structural changes in the industry such as unemployment and its reflection on the households and the individuals' social attitudes. Key stakeholders were interviewed and questionnaire survey was carried out. The results showed high level of risk sensitivity and health concerns when people felt threatened by lack of social and economic security. The pollution was found to be important problem when it caused direct and obvious risk to human health and the environment. In the same time reverse environmental behavior like insensitiveness and neglectful attitude was observed in cases when the health consequences of the pollution were perceived to be unclear and with delayed effect. In situation of a great socio-economic threat noninvolvement helped the individuals to adapt. The research proved the influence of several risk characteristics on risk perception. It was found a connection between the risk perception and risk controllability, voluntariness of exposure and cost/benefits distribution. In the study areas respondents' judgments on these characteristics reflected directly their social status and material state. The study presented here is in progress - it i's supported by research grant from Open Society Foundation. (author)

  17. 46 CFR 151.25-2 - Cargo handling space.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 5 2010-10-01 2010-10-01 false Cargo handling space. 151.25-2 Section 151.25-2 Shipping... BULK LIQUID HAZARDOUS MATERIAL CARGOES Environmental Control § 151.25-2 Cargo handling space. Pump rooms, compressor rooms, refrigeration rooms, heating rooms, instrument rooms or other closed spaces...

  18. Safe handling of tritium

    International Nuclear Information System (INIS)

    1991-01-01

    The main objective of this publication is to provide practical guidance and recommendations on operational radiation protection aspects related to the safe handling of tritium in laboratories, industrial-scale nuclear facilities such as heavy-water reactors, tritium removal plants and fission fuel reprocessing plants, and facilities for manufacturing commercial tritium-containing devices and radiochemicals. The requirements of nuclear fusion reactors are not addressed specifically, since there is as yet no tritium handling experience with them. However, much of the material covered is expected to be relevant to them as well. Annex III briefly addresses problems in the comparatively small-scale use of tritium at universities, medical research centres and similar establishments. However, the main subject of this publication is the handling of larger quantities of tritium. Operational aspects include designing for tritium safety, safe handling practice, the selection of tritium-compatible materials and equipment, exposure assessment, monitoring, contamination control and the design and use of personal protective equipment. This publication does not address the technologies involved in tritium control and cleanup of effluents, tritium removal, or immobilization and disposal of tritium wastes, nor does it address the environmental behaviour of tritium. Refs, figs and tabs

  19. Extensions to the Joshua GDMS to support environmental science and analysis data handling requirements

    International Nuclear Information System (INIS)

    Suich, J.E.; Honeck, H.C.

    1978-01-01

    For the past ten years, a generalized data management system (GDMS) called JOSHUA has been in use at the Savannah River Laboratory. Originally designed and implemented to support nuclear reactor physics and safety computational applications, the system is now also supporting environmental science modeling and impact assessment. Extensions to the original system are being developed to meet neet new data handling requirements, which include more general owner-member record relationships occurring in geographically encoded data sets, unstructured (relational) inquiry capability, cartographic analysis and display, and offsite data exchange. This paper discusses the need for these capabilities, places them in perspective as generic scientific data management activities, and presents the planned context-free extensions to the basic JOSHUA GDMS

  20. Extensions to the Joshua GDMS to support environmental science and analysis data handling requirements

    International Nuclear Information System (INIS)

    Suich, J.E.; Honeck, H.C.

    1977-01-01

    For the past ten years, a generalized data management system (GDMS) called JOSHUA has been in use at the Savannah River Laboratory. Originally designed and implemented to support nuclear reactor physics and safety computational applications, the system is now also supporting environmental science modeling and impact assessment. Extensions to the original system are being developed to meet new data handling requirements, which include more general owner-member record relationships occurring in geographically encoded data sets, unstructured (relational) inquiry capability, cartographic analysis and display, and offsite data exchange. This paper discusses the need for these capabilities, places them in perspective as generic scientific data management activities, and presents the planned context-free extensions to the basic JOSHUA GDMS

  1. Environmental Pollution: An Under-recognized Threat to Children's Health, Especially in Low- and Middle-Income Countries.

    Science.gov (United States)

    Suk, William A; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R; Sly, Leith; Sly, Peter D; Stein, Renato T; van den Berg, Martin; Zar, Heather; Landrigan, Philip J

    2016-03-01

    Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children's health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease.

  2. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  3. Nuclear threats in the vicinity of the Nordic countries. Supplementary final report of the Nordic Nuclear Safety research

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.

    2006-04-01

    The purpose of this project was to continue the cross-disciplinary study SBA-1 'base of knowledge' in the NKS research program 1998-2001 regarding possible nuclear threats in the vicinity of the Nordic countries. The main task for the project was to expand and envelope this database. Finding information to be placed in the database and identifying and filling gaps in knowledge were prioritised. This is a continuous process which extends beyond the end of this project, in order to have an operating and updated database also in the years to come. In this project work has been done making information systems in Norway that can take care of the database in the future. The scope of the preceding project was to prepare a base of knowledge regarding possible nuclear threats in the vicinity of the Nordic countries. The database, including a literature database, is presented on the website 'Nuclear threats in the vicinity of the Nordic Countries'. The utilisation of modern information technology gives the user of the database easy access to information on different types of nuclear installations and threats. The project focused on potential events at nuclear installations and the consequences for the Nordic countries, especially with regards to vulnerable food chains, doses to man, environmental contamination and emergency preparedness systems. The geographical area dealt with includes North-west Russia and the Baltic states and the nuclear installations investigated are nuclear power plants, ship reactors and storage and handling of used fuel and radioactive waste. (au)

  4. Hot Under the Collar: Lessons from the 2003 Heatwave in France and the Security Implications for Coping with Environmental Threats in the EU

    Directory of Open Access Journals (Sweden)

    Paul J. Stephenson

    2009-08-01

    Full Text Available In the sweltering temperatures of August 2003 there were over 15,000 fatalities in France, the majority among the elderly. The heatwave (canicule was the greatest natural catastrophe in Europe for 50 years. Political mismanagement contributed to the death toll and government initially to blame medical services. However, other politico-cultural, societal and psychological factors may have contributed to the failure to protect the most vulnerable citizens. This article identifies 20 obstacles (“pathogens” to ensuring effective response in the face of environmental or weather-related threats, distinguishing between state-institutional and individual-community barriers, most of which have a cultural dimension. These factors require greater consideration by policy-makers to improve preparedness for environmental threats in the EU. The case raises questions about crisis management and how best to reduce risk for elderly populations, illustrating the limits of the state in offering social protection through institutionalised solidarity mechanisms, and recognises calls to strengthen community-capacity.

  5. R2U2: Monitoring and Diagnosis of Security Threats for Unmanned Aerial Systems

    Science.gov (United States)

    Schumann, Johann; Moosbruger, Patrick; Rozier, Kristin Y.

    2015-01-01

    We present R2U2, a novel framework for runtime monitoring of security properties and diagnosing of security threats on-board Unmanned Aerial Systems (UAS). R2U2, implemented in FPGA hardware, is a real-time, REALIZABLE, RESPONSIVE, UNOBTRUSIVE Unit for security threat detection. R2U2 is designed to continuously monitor inputs from the GPS and the ground control station, sensor readings, actuator outputs, and flight software status. By simultaneously monitoring and performing statistical reasoning, attack patterns and post-attack discrepancies in the UAS behavior can be detected. R2U2 uses runtime observer pairs for linear and metric temporal logics for property monitoring and Bayesian networks for diagnosis of security threats. We discuss the design and implementation that now enables R2U2 to handle security threats and present simulation results of several attack scenarios on the NASA DragonEye UAS.

  6. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  7. Construction and operation of replacement hazardous waste handling facility at Lawrence Berkeley Laboratory

    International Nuclear Information System (INIS)

    1992-09-01

    The US Department of Energy (DOE) has prepared an environmental assessment (EA), DOE/EA-0423, for the construction and operation of a replacement hazardous waste handling facility (HWHF) and decontamination of the existing HWHF at Lawrence Berkeley Laboratory (LBL), Berkeley, California. The proposed facility would replace several older buildings and cargo containers currently being used for waste handling activities and consolidate the LBL's existing waste handling activities in one location. The nature of the waste handling activities and the waste volume and characteristics would not change as a result of construction of the new facility. Based on the analysis in the EA, DOE has determined that the proposed action would not constitute a major Federal action significantly affecting the quality of the human environment within the meaning of the National Environmental Policy Act (NEPA) of 1969, 42 USC. 4321 et seq. Therefore, an environmental impact statement is not required

  8. Environmental Pollution: An Under-recognized Threat to Children’s Health, Especially in Low- and Middle-Income Countries

    Science.gov (United States)

    Suk, William A.; Ahanchian, Hamid; Asante, Kwadwo Ansong; Carpenter, David O.; Diaz-Barriga, Fernando; Ha, Eun-Hee; Huo, Xia; King, Malcolm; Ruchirawat, Mathuros; da Silva, Emerson R.; Sly, Leith; Sly, Peter D.; Stein, Renato T.; van den Berg, Martin; Zar, Heather; Landrigan, Philip J.

    2016-01-01

    Summary Exposures to environmental pollutants during windows of developmental vulnerability in early life can cause disease and death in infancy and childhood as well as chronic, non-communicable diseases that may manifest at any point across the life span. Patterns of pollution and pollution-related disease change as countries move through economic development. Environmental pollution is now recognized as a major cause of morbidity and mortality in low- and middle-income countries (LMICs). According to the World Health Organization, pollution is responsible for 8.9 million deaths around the world each year; of these, 94% (8.4 million) are in LMICs. Toxic chemical pollution is growing into a major threat to children’s health in LMICs. The disease and disability caused by environmental pollution have great economic costs, and these costs can undercut trajectories of national development. To combat pollution, improved programs of public health and environmental protection are needed in countries at every level of development. Pollution control strategies and technologies that have been developed in high-income countries must now be transferred to LMICs to assist these emerging economies to avoid the mistakes of the past. A new international clearinghouse is needed to define and track the health effects of pollution, quantify the economic costs of these effects, and direct much needed attention to environmental pollution as a risk factor for disease. PMID:26930243

  9. Environmental risks and future generations: Criteria for public policy

    Energy Technology Data Exchange (ETDEWEB)

    Howarth, R.B.

    1992-10-01

    This paper examines alternative normative approaches to the policy challenges posed by long-term environmental problems such as toxic and radioactive waste disposal, stratospheric ozone depletion, and climate change. The paper argues that cost-benefit analysis is limited in its ability to handle the issues of intergenerational equity and uncertainty that are intrinsic to such problems. Also considered is the precautionary principle, which holds that policies should seek to reduce threats to the welfare of future generations if the costs of doing so would not significantly reduce the subjective well-being of existing persons. Although the precautionary principle depends on an explicit value judgement, it yields a policy criterion that is operationally decisive under a wide array of circumstances.

  10. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  11. Information security threats in web-portals on the open journal systems platform

    Directory of Open Access Journals (Sweden)

    Anton A. Abramov

    2018-05-01

    Full Text Available This article addresses the problem of security threats while working with web portals built on the Open Journal Systems platform. The Open Journal Systems (OJS platform was originally developed as part of the Public Knowledge Project and it is one of the most popular open-source platforms for web journals today. Based on the data available in the Public Knowledge Project, there were more than 10,000 active journals using the open journal systems platform by the end of 2016. A migration of a journal to such advanced and complex platform helps to handle the entire workflow over a single web portal. Therefore it is an important move and only peer-reviewed journals that are part of Russian and Worldwide citation systems go for it. At the same time the problem of keeping privacy for a manuscript before it is published is very important for these journals and for authors who submit it to the journal. The paper describes the most common threats for the web portals on the OJS platform as well as a particular model of the security threats, and suggests the measures that could help to neutralize these threats.

  12. Harvesting and handling agricultural residues for energy

    Energy Technology Data Exchange (ETDEWEB)

    Jenkins, B.M.; Summer, H.R.

    1986-05-01

    Significant progress in understanding the needs for design of agricultural residue collection and handling systems has been made but additional research is required. Recommendations are made for research to (a) integrate residue collection and handling systems into general agricultural practices through the development of multi-use equipment and total harvest systems; (b) improve methods for routine evaluation of agricultural residue resources, possibly through remote sensing and image processing; (c) analyze biomass properties to obtain detailed data relevant to engineering design and analysis; (d) evaluate long-term environmental, social, and agronomic impacts of residue collection; (e) develop improved equipment with higher capacities to reduce residue collection and handling costs, with emphasis on optimal design of complete systems including collection, transportation, processing, storage, and utilization; and (f) produce standard forms of biomass fuels or products to enhance material handling and expand biomass markets through improved reliability and automatic control of biomass conversion and other utilization systems. 118 references.

  13. An In-Air Passive Acoustic Surveillance System for Urban Threats Detection and Classification

    NARCIS (Netherlands)

    Donisi, D.; Bonamente, M.; Capitanelli, A.; Radziulis, J.; Dąbrowski, R.; Hołubowicz, W.; Simon, G.; Perlepes, L.; Mylonas, G.; Chatzigiannakis, I.; Benders, F.P.A.; Beerens, S.P.

    2013-01-01

    Recent military operations in urban environments are changing the requirements imposed on sensing technologies. The final goal remains threat mapping within the area of operation, but the environmental constraints and the intrinsic nature of urban threats are radically novel. AUDIS (Acoustic Urban

  14. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  15. Environmental Stress Responses and Experimental Handling Artifacts of a Model Organism, the Copepod Acartia tonsa (Dana

    Directory of Open Access Journals (Sweden)

    Birgitte Nilsson

    2018-05-01

    Full Text Available Handling animals during experiments potentially affects the differential expression of genes chosen as biomarkers of sub-lethal stress. RNA sequencing was used to examine whole-transcriptome responses caused by laboratory handling of the calanoid copepod, Acartia tonsa. Salinity shock (S = 35 to S = 5 was used as positive stress control; individuals not exposed to handling or other stressors served as negative stress control. All copepods were grown from eggs to adults without being handled or exposed to any stressors prior the experiment. Survival of nauplii and adults was estimated for up to 10 min of exposure to handling stress and salinity shock. Only adults exhibited decreased survival (44 ± 7% with 10 min of exposure in response to handling stress and were selected for definitive experiments for RNA sequencing. After 10 min of experimental exposures to handling stress or salinity shock, adults were incubated for 15 min or 24 h at normal culture conditions. A small number of significantly differentially expressed genes (DEGs were observed 15 min after exposure to handling stress (2 DEGs or salinity shock (7 DEGs. However, 24 h after exposure, handling stress resulted in 276 DEGs and salinity shock resulted in 573 DEGs, of which 174 DEGs were overlapping between the treatments. Among the DEGs observed 24 h after exposure to handling stress or salinity shock, some commonly-used stress biomarkers appeared at low levels. This suggests that a stress-response was induced at the transcriptional level for these genes between 15 min and 24 h following exposure. Since handling stress clearly affects transcriptional patterns, it is important to consider handling when designing experiments, by either including additional controls or avoiding focus on impacted genes. Not considering handling in gene expression studies can lead to inaccurate conclusions. The present study provides a baseline for studying handling stress in future studies using this

  16. Environmental stress responses and experimental handling artifacts of a model organism, the copepod Acartia tonsa (Dana)

    DEFF Research Database (Denmark)

    Nilsson, Birgitte; Jepsen, Per Meyer; Bucklin, Ann

    2018-01-01

    Handling animals during experiments potentially affects the differential expression of genes chosen as biomarkers of sub-lethal stress. RNA sequencing was used to examine whole-transcriptome responses caused by laboratory handling of the calanoid copepod, Acartia tonsa. Salinity shock (S=35 to S=...... studies can lead to inaccurate conclusions. The present study provides a baseline for studying handling stress in future studies using this model organism and others....... for these genes between 15 min and 24 h following exposure. Since handling stress clearly affects transcriptional patterns, it is important to consider handling when designing experiments, by either including additional controls or avoiding focus on impacted genes. Not considering handling in gene expression...

  17. Toward a psychology of human survival: Psychological approaches to contemporary global threats

    International Nuclear Information System (INIS)

    Walsh, R.

    1989-01-01

    Nuclear weapons, population explosion, resource and food-supply depletion, and environmental deterioration have been posing increasing threats to human survival. Moreover, for the first time in history, all these major global threats are human caused and can, therefore, be traced in large part to psychological origins. After a brief overview of the nature and extent of current threats, this paper suggests criteria for an adequate psychology of human survival. The causes and effects of the threats are examined from various psychological perspectives and the psychological principles underlying effective responses are deduced. The ways in which mental health professionals may contribute to this most crucial task are discussed. 76 references

  18. Handling effluent from nuclear thermal propulsion system ground tests

    International Nuclear Information System (INIS)

    Shipers, L.R.; Allen, G.C.

    1992-01-01

    A variety of approaches for handling effluent from nuclear thermal propulsion system ground tests in an environmentally acceptable manner are discussed. The functional requirements of effluent treatment are defined and concept options are presented within the framework of these requirements. System concepts differ primarily in the choice of fission-product retention and waste handling concepts. The concept options considered range from closed cycle (venting the exhaust to a closed volume or recirculating the hydrogen in a closed loop) to open cycle (real time processing and venting of the effluent). This paper reviews the different methods to handle effluent from nuclear thermal propulsion system ground tests

  19. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  20. Reproductive handle of the herd of cattle of double purpose

    International Nuclear Information System (INIS)

    Castro Hernandez, A.

    1988-01-01

    The influence of the environmental factors is analyzed, in the reproductive efficiency of herd cattle of double purpose. The reproductive behavior begins with the gestation of the heifers. Under the conditions of the Colombian tropic these they reach the weight required for the reproduction to an age but late that in the temperate areas. Once the first childbirth, the cow takes place it enters in exhaustion that makes that this animal is the but difficult to reproduce after the childbirth, that which demands special cares of handling and feeding. The interval among the childbirth to evaluate the reproductive efficiency. Environmental factors that influence significantly. The use of the practice simple of handling, health, selection and feeding produces significant increments in the fertility of the herd of cattle of double purpose. One practices of effective handling in the improvement of the reproductive behavior of the cows of double purpose it is the restricted nursing

  1. Laboratory biosafety for handling emerging viruses

    Directory of Open Access Journals (Sweden)

    I. Made Artika

    2017-05-01

    Full Text Available Emerging viruses are viruses whose occurrence has risen within the past twenty years, or whose presence is likely to increase in the near future. Diseases caused by emerging viruses are a major threat to global public health. In spite of greater awareness of safety and containment procedures, the handling of pathogenic viruses remains a likely source of infection, and mortality, among laboratory workers. There is a steady increase in both the number of laboratories and scientist handling emerging viruses for diagnostics and research. The potential for harm associated to work with these infectious agents can be minimized through the application of sound biosafety concepts and practices. The main factors to the prevention of laboratory-acquired infection are well-trained personnel who are knowledgable and biohazard aware, who are perceptive of the various ways of transmission, and who are professional in safe laboratory practice management. In addition, we should emphasize that appropriate facilities, practices and procedures are to be used by the laboratory workers for the handling of emerging viruses in a safe and secure manner. This review is aimed at providing researchers and laboratory personnel with basic biosafety principles to protect themselves from exposure to emerging viruses while working in the laboratory. This paper focuses on what emerging viruses are, why emerging viruses can cause laboratory-acquired infection, how to assess the risk of working with emerging viruses, and how laboratory-acquired infection can be prevented. Control measures used in the laboratory designed as such that they protect workers from emerging viruses and safeguard the public through the safe disposal of infectious wastes are also addressed.

  2. Environmental stress responses and experimental handling artifacts of a model organism, the copepod Acartia tonsa (Dana)

    DEFF Research Database (Denmark)

    Nilsson, Birgitte; Jepsen, Per Meyer; Bucklin, Ann

    2018-01-01

    for these genes between 15 min and 24 h following exposure. Since handling stress clearly affects transcriptional patterns, it is important to consider handling when designing experiments, by either including additional controls or avoiding focus on impacted genes. Not considering handling in gene expression...... studies can lead to inaccurate conclusions. The present study provides a baseline for studying handling stress in future studies using this model organism and others....

  3. Women of low socioeconomic status living with diabetes: Becoming adept at handling a disease

    Directory of Open Access Journals (Sweden)

    Wimonrut Boonsatean

    2015-12-01

    Full Text Available Objective: The objective of this study was to explore how Thai women of low socioeconomic status handle their type 2 diabetes. Methods: A qualitative interpretative method was used to study 19 women with type 2 diabetes in a suburban community in Thailand. Data were collected via semi-structured interviews and were analysed using inductive and constructive processes. Results: Participants’ lives underwent many changes between their initial diagnoses and later stages when they became adept at handling diabetes. Two themes emerged, which involved (1 the transition to handling diabetes and (2 the influences of the social environment. The first theme encompassed confronting the disease, reaching a turning point in the process of adaptation and developing expertise in handling diabetes. The second theme involved threats of loss of status and empowerment by families. These findings showed that becoming adept at handling diabetes required significant changes in women’s behaviours and required taking advantage of influences from the social environment. Conclusion: The process of developing expertise in handling diabetes was influenced by both inner and outer factors that required adjustment to learn to live with diabetes. Furthermore, the reductions found in women’s social statuses when they become patients in the healthcare system might pose a barrier to women of low socioeconomic status becoming adept at handling diabetes. However, the experiences of empowerment received from the women’s families acted as a powerful strategy to strengthen their handling of the disease. To develop accessible and sensitive health care for this population, it is important to pay attention to these findings.

  4. 77 FR 58416 - Comparative Environmental Evaluation of Alternatives for Handling Low-Level Radioactive Waste...

    Science.gov (United States)

    2012-09-20

    ... for Handling Low-Level Radioactive Waste Spent Ion Exchange Resins From Commercial Nuclear Power... Radioactive Waste Spent Ion Exchange Resins from Commercial Nuclear Power Reactors. DATES: Please submit... Evaluation of Alternatives for Handling Low-Level Radioactive Waste Spent Ion Exchange Resins from Commercial...

  5. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  6. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  7. Strategy of administration of the environmental education to mitigate the inadequate handling of residuals in the community Raúl Maqueira in Consolación del Sur, Pinar del Rio province, Cuba

    Directory of Open Access Journals (Sweden)

    Alba Marina Lezcano Gil

    2015-07-01

    Full Text Available The concern for the environment has been present in the humanity for all the generations and the current environmental problems constitute one of the biggest political, economic and social concerns, depending its solution of the own human existence. It was presented in the community Raúl Maqueira of the municipality Consolación del Sur an unfavorable environmental situation regarding to the handling of residuals, to those which, according to the preliminary diagnosis that was carried out, it was not given the appropriate treatment, for the lack of knowledge, convocation and cohesion among the factors. Under this context a process of administration of the environmental education was promoted in the community that propitiated the cognitive development on the handling of residuals, the integration of the different efforts in the attainment of the strategic objectives and to elevate the protagonism of the social actors by means of the participative practices. In the diagnosis of the current state of the selected community the necessity of elaborating a Strategy of administration of the environmental education was evidenced to mitigate the inadequate handling of residuals in the community and its application, raise levels of communication, commitment, participation and integration of its members as a contribution to local development. This research is validated by the experience in the framework of the community; the process ensured the solution of the problem through transformative results.

  8. Improving Standoff Bombing Capacity in the Face of Anti-Access Area Denial Threats

    Science.gov (United States)

    2015-09-01

    threats, there will be a high premium on destroying certain targets early in the conflict. The ability of bombers to operate in A2/AD is a significant...Maximum gross takeoff weight (1,000s of lbs.) Military cargo derivatives Commercial derivatives Legacy bombers 63 Military Cargo Derivative...and other structural modifications for the launcher. The original Boeing design for a 747 CMCA had 90,000 pounds reserved for handling and launch

  9. Amazonian freshwater habitats experiencing environmental and socioeconomic threats affecting subsistence fisheries.

    Science.gov (United States)

    Alho, Cleber J R; Reis, Roberto E; Aquino, Pedro P U

    2015-09-01

    Matching the trend seen among the major large rivers of the globe, the Amazon River and its tributaries are facing aquatic ecosystem disruption that is affecting freshwater habitats and their associated biodiversity, including trends for decline in fishery resources. The Amazon's aquatic ecosystems, linked natural resources, and human communities that depend on them are increasingly at risk from a number of identified threats, including expansion of agriculture; cattle pastures; infrastructure such as hydroelectric dams, logging, mining; and overfishing. The forest, which regulates the hydrological pulse, guaranteeing the distribution of rainfall and stabilizing seasonal flooding, has been affected by deforestation. Flooding dynamics of the Amazon Rivers are a major factor in regulating the intensity and timing of aquatic organisms. This study's objective was to identify threats to the integrity of freshwater ecosystems, and to seek instruments for conservation and sustainable use, taking principally fish diversity and fisheries as factors for analysis.

  10. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Directory of Open Access Journals (Sweden)

    Bettina J Casad

    2016-01-01

    Full Text Available Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  11. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology

    Science.gov (United States)

    Casad, Bettina J.; Bryant, William J.

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace. PMID:26834681

  12. Addressing Stereotype Threat is Critical to Diversity and Inclusion in Organizational Psychology.

    Science.gov (United States)

    Casad, Bettina J; Bryant, William J

    2016-01-01

    Recently researchers have debated the relevance of stereotype threat to the workplace. Critics have argued that stereotype threat is not relevant in high stakes testing such as in personnel selection. We and others argue that stereotype threat is highly relevant in personnel selection, but our review focused on underexplored areas including effects of stereotype threat beyond test performance and the application of brief, low-cost interventions in the workplace. Relevant to the workplace, stereotype threat can reduce domain identification, job engagement, career aspirations, and receptivity to feedback. Stereotype threat has consequences in other relevant domains including leadership, entrepreneurship, negotiations, and competitiveness. Several institutional and individual level intervention strategies that have been field-tested and are easy to implement show promise for practitioners including: addressing environmental cues, valuing diversity, wise feedback, organizational mindsets, reattribution training, reframing the task, values-affirmation, utility-value, belonging, communal goal affordances, interdependent worldviews, and teaching about stereotype threat. This review integrates criticisms and evidence into one accessible source for practitioners and provides recommendations for implementing effective, low-cost interventions in the workplace.

  13. Plant Material Acquisition, Layout, and Handling for Flood Control Projects

    National Research Council Canada - National Science Library

    Fischenich, J

    2000-01-01

    .... Successful designs are based on consideration of hydraulic impacts and environmental benefits, the anticipated soils and hydrology, and the approach by which the vegetation is obtained, handled, and installed...

  14. One Health Perspectives on Emerging Public Health Threats

    Directory of Open Access Journals (Sweden)

    Sukhyun Ryu

    2017-11-01

    Full Text Available Antimicrobial resistance and emerging infectious diseases, including avian influenza, Ebola virus disease, and Zika virus disease have significantly affected humankind in recent years. In the premodern era, no distinction was made between animal and human medicine. However, as medical science developed, the gap between human and animal science grew deeper. Cooperation among human, animal, and environmental sciences to combat emerging public health threats has become an important issue under the One Health Initiative. Herein, we presented the history of One Health, reviewed current public health threats, and suggested opportunities for the field of public health through better understanding of the One Health paradigm.

  15. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  16. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    with other subsystems like South East Asia may have different approaches to global governance, international constitutional order, or particular cases such as the measure of infringement of human rights when targeting individuals suspected of terrorist links. Yet international law remains the key part of the Asian and global security regime. The hypothesis of this study is that the "void of governance" regime in territorial and international waters provides lucrative environment for developing terrorism, piracy, environmental degradation, and other criminal activities that pose untraditional threats to the regional security. This "void of governance" regime can be caused by either, or both, de jure or de facto insufficient control over particular marine territories.

  17. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  18. Evaluation of Four Bedside Test Systems for Card Performance, Handling and Safety.

    Science.gov (United States)

    Giebel, Felix; Picker, Susanne M; Gathof, Birgit S

    2008-01-01

    SUMMARY: OBJECTIVE: Pretransfusion ABO compatibility testing is a simple and required precaution against ABO-incompatible transfusion, which is one of the greatest threats in transfusion medicine. While distinct agglutination is most important for correct test interpretation, protection against infectious diseases and ease of handling are crucial for accurate test performance. Therefore, the aim of this study was to evaluate differences in test card design, handling, and user safety. DESIGN: Four different bedside test cards with pre-applied antibodies were evaluated by 100 medical students using packed red blood cells of different ABO blood groups. Criteria of evaluation were: agglutination, labelling, handling, and safety regarding possible user injuries. Criteria were rated subjectively according to German school notes ranging from 1 = very good to 6 = very bad/insufficient. RESULTS: Overall, all cards received very good/good marks. The ABO blood group was identified correctly in all cases. Three cards (no. 1, no. 3, no. 4) received statistically significant (p labelling (1.5 vs. 2.2-2.4), handling (1.9-2.0 vs. 2.5), and user safety (2.5 vs. 3.4). Analysis of card self-explanation revealed no remarkable differences. CONCLUSION: Despite good performance of all card systems tested, the best results when including all criteria evaluated were obtained with card no. 4 (particularly concerning clear agglutination), followed by cards no. 2, no. 1, and no. 3.

  19. Modelling dust liberation in bulk material handling systems

    NARCIS (Netherlands)

    Derakhshani, S.M.

    2016-01-01

    Dust has negative effects on the environmental conditions, human health as well as industrial equipment and processes. In this thesis, the transfer point of a belt conveyor as a bulk material handling system with a very high potential place for dust liberation is studied. This study is conducted

  20. An environmental assessment system for environmental technologies

    DEFF Research Database (Denmark)

    Clavreul, Julie; Baumeister, Hubert; Christensen, Thomas Højlund

    2014-01-01

    A new model for the environmental assessment of environmental technologies, EASETECH, has been developed. The primary aim of EASETECH is to perform life-cycle assessment (LCA) of complex systems handling heterogeneous material flows. The objectives of this paper are to describe the EASETECH...

  1. Siting Study for the Remote-Handled Low-Level Waste Disposal Project

    Energy Technology Data Exchange (ETDEWEB)

    Lisa Harvego; Joan Connolly; Lance Peterson; Brennon Orr; Bob Starr

    2010-10-01

    The U.S. Department of Energy has identified a mission need for continued disposal capacity for remote-handled low-level waste (LLW) generated at the Idaho National Laboratory (INL). An alternatives analysis that was conducted to evaluate strategies to achieve this mission need identified two broad options for disposal of INL generated remote-handled LLW: (1) offsite disposal and (2) onsite disposal. The purpose of this study is to identify candidate sites or locations within INL boundaries for the alternative of an onsite remote handled LLW disposal facility and recommend the highest-ranked locations for consideration in the National Environmental Policy Act process. The study implements an evaluation based on consideration of five key elements: (1) regulations, (2) key assumptions, (3) conceptual design, (4) facility performance, and (5) previous INL siting study criteria, and uses a five-step process to identify, screen, evaluate, score, and rank 34 separate sites located across INL. The result of the evaluation is identification of two recommended alternative locations for siting an onsite remote-handled LLW disposal facility. The two alternative locations that best meet the evaluation criteria are (1) near the Advanced Test Reactor Complex and (2) west of the Idaho Comprehensive Environmental Response, Compensation, and Liability Act Disposal Facility.

  2. Handling of wet residues in industry

    DEFF Research Database (Denmark)

    Villanueva, Alejandro

    is fundamental in most disposal routes for clarifying the possibility of treating the residue. The better the characterisation from the start is, the easier the assessment of the feasible disposal alternatives becomes. The decision about the handling/disposal solution for the residue is a trade-off between......, and can depend on factors such as the investment capacity, the relationships with the stakeholders, or the promotion of its environmental profile....

  3. Fuel handling machine and auxiliary systems for a fuel handling cell

    International Nuclear Information System (INIS)

    Suikki, M.

    2013-10-01

    This working report is an update for as well as a supplement to an earlier fuel handling machine design (Kukkola and Roennqvist 2006). A focus in the earlier design proposal was primarily on the selection of a mechanical structure and operating principle for the fuel handling machine. This report introduces not only a fuel handling machine design but also auxiliary fuel handling cell equipment and its operation. An objective of the design work was to verify the operating principles of and space allocations for fuel handling cell equipment. The fuel handling machine is a remote controlled apparatus capable of handling intensely radiating fuel assemblies in the fuel handling cell of an encapsulation plant. The fuel handling cell is air tight space radiation-shielded with massive concrete walls. The fuel handling machine is based on a bridge crane capable of traveling in the handling cell along wall tracks. The bridge crane has its carriage provided with a carousel type turntable having mounted thereon both fixed and telescopic masts. The fixed mast has a gripper movable on linear guides for the transfer of fuel assemblies. The telescopic mast has a manipulator arm capable of maneuvering equipment present in the fuel handling cell, as well as conducting necessary maintenance and cleaning operations or rectifying possible fault conditions. The auxiliary fuel handling cell systems consist of several subsystems. The subsystems include a service manipulator, a tool carrier for manipulators, a material hatch, assisting winches, a vacuum cleaner, as well as a hose reel. With the exception of the vacuum cleaner, the devices included in the fuel handling cell's auxiliary system are only used when the actual encapsulation process is not ongoing. The malfunctions of mechanisms or actuators responsible for the motion actions of a fuel handling machine preclude in a worst case scenario the bringing of the fuel handling cell and related systems to a condition appropriate for

  4. Fuel handling machine and auxiliary systems for a fuel handling cell

    Energy Technology Data Exchange (ETDEWEB)

    Suikki, M. [Optimik Oy, Turku (Finland)

    2013-10-15

    This working report is an update for as well as a supplement to an earlier fuel handling machine design (Kukkola and Roennqvist 2006). A focus in the earlier design proposal was primarily on the selection of a mechanical structure and operating principle for the fuel handling machine. This report introduces not only a fuel handling machine design but also auxiliary fuel handling cell equipment and its operation. An objective of the design work was to verify the operating principles of and space allocations for fuel handling cell equipment. The fuel handling machine is a remote controlled apparatus capable of handling intensely radiating fuel assemblies in the fuel handling cell of an encapsulation plant. The fuel handling cell is air tight space radiation-shielded with massive concrete walls. The fuel handling machine is based on a bridge crane capable of traveling in the handling cell along wall tracks. The bridge crane has its carriage provided with a carousel type turntable having mounted thereon both fixed and telescopic masts. The fixed mast has a gripper movable on linear guides for the transfer of fuel assemblies. The telescopic mast has a manipulator arm capable of maneuvering equipment present in the fuel handling cell, as well as conducting necessary maintenance and cleaning operations or rectifying possible fault conditions. The auxiliary fuel handling cell systems consist of several subsystems. The subsystems include a service manipulator, a tool carrier for manipulators, a material hatch, assisting winches, a vacuum cleaner, as well as a hose reel. With the exception of the vacuum cleaner, the devices included in the fuel handling cell's auxiliary system are only used when the actual encapsulation process is not ongoing. The malfunctions of mechanisms or actuators responsible for the motion actions of a fuel handling machine preclude in a worst case scenario the bringing of the fuel handling cell and related systems to a condition appropriate for

  5. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  6. Extension of ERIM multispectral data processing capabilities through improved data handling techniques

    Science.gov (United States)

    Kriegler, F. J.

    1973-01-01

    The improvement and extension of the capabilities of the Environmental Research Institute of Michigan processing facility in handling multispectral data are discussed. Improvements consisted of implementing hardware modifications which permitted more rapid access to the recorded data through improved numbering and indexing of such data. In addition, techniques are discussed for handling data from sources other than the ERIM M-5 and M-7 scanner systems.

  7. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  8. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  9. Armored Composite Ammunition Pressure Vessel

    National Research Council Canada - National Science Library

    Clark, William

    1999-01-01

    ...). This ammunition containment system must not only meet environmental and handling requirements but also provide armor protection against impacting threats and reduce the response of the stowed...

  10. Project Execution Plan for the Remote Handled Low-Level Waste Disposal Project

    Energy Technology Data Exchange (ETDEWEB)

    Danny Anderson

    2014-07-01

    As part of ongoing cleanup activities at the Idaho National Laboratory (INL), closure of the Radioactive Waste Management Complex (RWMC) is proceeding under the Comprehensive Environmental Response, Compensation, and Liability Act (42 USC 9601 et seq. 1980). INL-generated radioactive waste has been disposed of at RWMC since 1952. The Subsurface Disposal Area (SDA) at RWMC accepted the bulk of INL’s contact and remote-handled low-level waste (LLW) for disposal. Disposal of contact-handled LLW and remote-handled LLW ion-exchange resins from the Advanced Test Reactor in the open pit of the SDA ceased September 30, 2008. Disposal of remote-handled LLW in concrete disposal vaults at RWMC will continue until the facility is full or until it must be closed in preparation for final remediation of the SDA (approximately at the end of fiscal year FY 2017). The continuing nuclear mission of INL, associated ongoing and planned operations, and Naval spent fuel activities at the Naval Reactors Facility (NRF) require continued capability to appropriately dispose of contact and remote handled LLW. A programmatic analysis of disposal alternatives for contact and remote-handled LLW generated at INL was conducted by the INL contractor in Fiscal Year 2006; subsequent evaluations were completed in Fiscal Year 2007. The result of these analyses was a recommendation to the Department of Energy (DOE) that all contact-handled LLW generated after September 30, 2008, be disposed offsite, and that DOE proceed with a capital project to establish replacement remote-handled LLW disposal capability. An analysis of the alternatives for providing replacement remote-handled LLW disposal capability has been performed to support Critical Decision-1. The highest ranked alternative to provide this required capability has been determined to be the development of a new onsite remote-handled LLW disposal facility to replace the existing remote-handled LLW disposal vaults at the SDA. Several offsite DOE

  11. Trends in remote handling device development

    International Nuclear Information System (INIS)

    Raimondi, T.

    1991-01-01

    A brief review is given of studies on layouts and methods for handling some major components requiring remote maintenance in future fusion reactors: Neutral sources and beam lines, the blanket, divertor plates, armour tiles and vacuum pumps. Comparison is made to problems encountered in JET, methods and equipment used and development work done there. Areas requiring development and research are outlined. These include topics which are the subject of papers presented here, such as dynamic studies and control of transporters, improvements to the man-machine interface and hot cell equipment. A variety of other topics where effort is needed are also mentioned: Environmental tolerance of components and equipment, TV viewing and compensation of viewing difficulties with aids such as computer graphics and image processing, safety assessment, computer aids for remote manipulation, remote cutting and welding techniques, routine in-vessel inspection methods and selection of connectors and flanges for remote handling. (orig.)

  12. Minimizing the carbon footprint of material handling equipment: Comparison of electric and LPG forklifts

    Energy Technology Data Exchange (ETDEWEB)

    Facchini, F.; Mummolo, G.; Mossa, G.; Digiesi, S.; Boenzi, F.; Verriello, R.

    2016-07-01

    Purpose: The aim of this study is to identify the best Material Handling Equipment (MHE) to minimize the carbon footprint of inbound logistic activities, based on the type of the warehouse (layout, facilities and order-picking strategy) as well as the weight of the loads to be handled. Design/methodology/approach: A model to select the best environmental MHE for inbound logistic activities has been developed. Environmental performance of the MHE has been evaluated in terms of carbon Footprint (CF). The model is tested with a tool adopting a VBA macro as well as a simulation software allowing the evaluation of energy and time required by the forklift in each phase of the material handling cycle: picking, sorting and storing of the items. Findings: Nowadays, it is not possible to identify ‘a priori’ a particular engine equipped forklift performing better than others under an environmental perspective. Consistently, the application of the developed model allows to identify the best MHE tailored to each case analyzed. Originality/value: This work gives a contribution to the disagreement between environmental performances of forklifts equipped with different engines. The developed model can be considered a valid support for decision makers to identify the best MHE minimizing the carbon footprint of inbound logistic activities.

  13. Minimizing the carbon footprint of material handling equipment: Comparison of electric and LPG forklifts

    International Nuclear Information System (INIS)

    Facchini, F.; Mummolo, G.; Mossa, G.; Digiesi, S.; Boenzi, F.; Verriello, R.

    2016-01-01

    Purpose: The aim of this study is to identify the best Material Handling Equipment (MHE) to minimize the carbon footprint of inbound logistic activities, based on the type of the warehouse (layout, facilities and order-picking strategy) as well as the weight of the loads to be handled. Design/methodology/approach: A model to select the best environmental MHE for inbound logistic activities has been developed. Environmental performance of the MHE has been evaluated in terms of carbon Footprint (CF). The model is tested with a tool adopting a VBA macro as well as a simulation software allowing the evaluation of energy and time required by the forklift in each phase of the material handling cycle: picking, sorting and storing of the items. Findings: Nowadays, it is not possible to identify ‘a priori’ a particular engine equipped forklift performing better than others under an environmental perspective. Consistently, the application of the developed model allows to identify the best MHE tailored to each case analyzed. Originality/value: This work gives a contribution to the disagreement between environmental performances of forklifts equipped with different engines. The developed model can be considered a valid support for decision makers to identify the best MHE minimizing the carbon footprint of inbound logistic activities.

  14. Minimizing the carbon footprint of material handling equipment: Comparison of electric and LPG forklifts

    Directory of Open Access Journals (Sweden)

    Francesco Facchini

    2016-12-01

    Full Text Available Purpose: The aim of this study is to identify the best Material Handling Equipment (MHE to minimize the carbon footprint of inbound logistic activities, based on the type of the warehouse (layout, facilities and order-picking strategy as well as the weight of the loads to be handled. Design/methodology/approach: A model to select the best environmental MHE for inbound logistic activities has been developed. Environmental performance of the MHE has been evaluated in terms of carbon Footprint (CF. The model is tested with a tool adopting a VBA macro as well as a simulation software allowing the evaluation of energy and time required by the forklift in each phase of the material handling cycle: picking, sorting and storing of the items. Findings: Nowadays, it is not possible to identify ‘a priori’ a particular engine equipped forklift performing better than others under an environmental perspective. Consistently, the application of the developed model allows to identify the best MHE tailored to each case analyzed.   Originality/value: This work gives a contribution to the disagreement between environmental performances of forklifts equipped with different engines. The developed model can be considered a valid support for decision makers to identify the best MHE minimizing the carbon footprint of inbound logistic activities.

  15. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  16. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  17. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  18. Impact and environmental handling of the coal in Colombia

    International Nuclear Information System (INIS)

    Garcia Lozada, Hector

    1999-01-01

    The coal is a natural resource of great strategic importance for Colombia, in virtue not only of the magnitude of the reserves that possesses the country, but also of its physical-chemistry characteristic, which make it very attractive for the energy generation mainly in European countries and in United States, for the environmental advantages that it offers to consume a coal with contained low percentage of sulfur (maximum 1%) and high heating power. In this chapter a general vision of the Colombian carboniferous sector is presented, followed by a discussion on the environmental impacts of more relevance, associated to the industry and the carboniferous mining that happen in the country. Finally activities and projects of environmental administration are commented, that are in Colombia, with the object to improve the environmental administration of this mineral resource, from the institutional perspective of the participation of the economic agents of the sector, in the solution of the environmental conflicts

  19. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  20. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    Energy Technology Data Exchange (ETDEWEB)

    Goix, Sylvaine [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Lévêque, Thibaut [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); ADEME (French Agency for Environment and Energy Management), 20 Avenue du Grésillé, BP 90406, 49004 Angers Cedex 01 (France); Xiong, Tian-Tian [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Schreck, Eva [Géosciences Environnement Toulouse (GET), Observatoire Midi Pyrénées, Université de Toulouse, CNRS, IRD, 14 Avenue E. Belin, F-31400 Toulouse (France); and others

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.

  1. Dust prevention in bulk material transportation and handling

    Science.gov (United States)

    Kirichenko, A. V.; Kuznetsov, A. L.; Pogodin, V. A.

    2017-10-01

    The environmental problem of territory and atmosphere pollution caused by transportation and handling of dust-generating bulk cargo materials is quite common for the whole world. The reducing of weight of fine class coal caused by air blowing reaches the level of 0.5-0.6 t per railcar over the 500 km transportation distance, which is equal to the loss of 1 % of the total weight. The studies showed that all over the country in the process of the railroad transportation, the industry loses 3-5 metric tonnes of coal annually. There are several common tactical measurers to prevent dust formation: treating the dust-producing materials at dispatch point with special liquid solutions; watering the stacks and open handling points of materials; frequent dust removing and working area cleaning. Recently there appeared several new radical measures for pollution prevention in export of ore and coal materials via sea port terminals, specifically: wind-dust protection screens, the container cargo handling system of delivery materials to the hold of the vessels. The article focuses on the discussion of these measures.

  2. Climatic threats on the worldwide peace

    International Nuclear Information System (INIS)

    Valantin, J.M.

    2005-06-01

    This book approaches the climatic change under the international relation aspect. It recalls the progressive growth of the collective awareness about the threats of human activities on Earth's climate and analyzes more particularly the policies adopted by the US, UK and the European Union. It evokes also the problems encountered by the developing countries, the energy needs of which are continuously increasing. Finally, it puts the question of the capacity of the international community to solve, by negotiations and not by conflicts, the tensions generated by environmental crises. (J.S.)

  3. Eye-in-Hand Manipulation for Remote Handling: Experimental Setup

    Science.gov (United States)

    Niu, Longchuan; Suominen, Olli; Aref, Mohammad M.; Mattila, Jouni; Ruiz, Emilio; Esque, Salvador

    2018-03-01

    A prototype for eye-in-hand manipulation in the context of remote handling in the International Thermonuclear Experimental Reactor (ITER)1 is presented in this paper. The setup consists of an industrial robot manipulator with a modified open control architecture and equipped with a pair of stereoscopic cameras, a force/torque sensor, and pneumatic tools. It is controlled through a haptic device in a mock-up environment. The industrial robot controller has been replaced by a single industrial PC running Xenomai that has a real-time connection to both the robot controller and another Linux PC running as the controller for the haptic device. The new remote handling control environment enables further development of advanced control schemes for autonomous and semi-autonomous manipulation tasks. This setup benefits from a stereovision system for accurate tracking of the target objects with irregular shapes. The overall environmental setup successfully demonstrates the required robustness and precision that remote handling tasks need.

  4. Handling of multiassembly sealed baskets between reactor storage and a remote handling facility

    International Nuclear Information System (INIS)

    Massey, J.V.; Kessler, J.H.; McSherry, A.J.

    1989-06-01

    The storage of multiple fuel assemblies in sealed (welded) dry storage baskets is gaining increasing use to augment at-reactor fuel storage capacity. Since this increasing use will place a significant number of such baskets on reactor sites, some initial downstream planning for their future handling scenarios for retrieving multi-assembly sealed baskets (MSBs) from onsite storage and transferring and shipping the fuel (and/or the baskets) to a federally operated remote handling facility (RHF). Numerous options or at-reactor and away-from-reactor handling were investigated. Materials handling flowsheets were developed along with conceptual designs for the equipment and tools required to handle and open the MSBs. The handling options were evaluated and compared to a reference case, fuel handling sequence (i.e., fuel assemblies are taken from the fuel pool, shipped to a receiving and handling facility and placed into interim storage). The main parameters analyzed are throughout, radiation dose burden and cost. In addition to evaluating the handling of MSBs, this work also evaluated handling consolidated fuel canisters (CFCs). In summary, the handling of MSBs and CFCs in the store, ship and bury fuel cycle was found to be feasible and, under some conditions, to offer significant benefits in terms of throughput, cost and safety. 14 refs., 20 figs., 24 tabs

  5. Nuclear fuel handling apparatus

    International Nuclear Information System (INIS)

    Andrea, C.; Dupen, C.F.G.; Noyes, R.C.

    1977-01-01

    A fuel handling machine for a liquid metal cooled nuclear reactor in which a retractable handling tube and gripper are lowered into the reactor to withdraw a spent fuel assembly into the handling tube. The handling tube containing the fuel assembly immersed in liquid sodium is then withdrawn completely from the reactor into the outer barrel of the handling machine. The machine is then used to transport the spent fuel assembly directly to a remotely located decay tank. The fuel handling machine includes a decay heat removal system which continuously removes heat from the interior of the handling tube and which is capable of operating at its full cooling capacity at all times. The handling tube is supported in the machine from an articulated joint which enables it to readily align itself with the correct position in the core. An emergency sodium supply is carried directly by the machine to provide make up in the event of a loss of sodium from the handling tube during transport to the decay tank. 5 claims, 32 drawing figures

  6. Final Generic Environmental Impact Statement. Handling and storage of spent light water power reactor fuel. Volume 1. Executive summary and text

    International Nuclear Information System (INIS)

    1979-08-01

    The Generic Environmental Impact Statement on spent fuel storage was prepared by the Nuclear Regulatory Commission staff in response to a directive from the Commissioners published in the Federal Register, September 16, 1975 (40 FR 42801). The Commission directed the staff to analyze alternatives for the handling and storage of spent light water power reactor fuel with particular emphasis on developing long range policy. Accordingly, the scope of this statement examines alternative methods of spent fuel storage as well as the possible restriction or termination of the generation of spent fuel through nuclear power plant shutdown. Volume 1 includes the executive summary and the text

  7. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  8. Strategic environmental policy when the governments are threatened by relocation

    International Nuclear Information System (INIS)

    Greaker, Mads

    2003-01-01

    This paper analyzes how the threat of relocation influences environmental policy. The stringency of environmental policy is determined in a game between two governments. There is one firm in each jurisdiction, and both firms threaten to relocate their production to the other jurisdiction. Because there is asymmetric information about the cost of relocation, the governments do not know the credibility of the threat. We compare the outcome of this game with the outcome of a game in which relocation is not possible. We find that the threat of relocation can increase both the level of environmental regulation and welfare. The profit tax level proves to be the most decisive for the result; that is, the higher the profit tax level, the lower the level of environmental regulation

  9. Threat of land subsidence in and around Kolkata City and East ...

    Indian Academy of Sciences (India)

    ile wetland to minimize the adverse environmental impacts of groundwater development. This study, for the first time, indicates the threat of possible land subsidence due to unrestricted groundwater abstraction in the EKW and also out- lines a groundwater management plan for sustain- able development of groundwater in ...

  10. Recent advances to address European Union Health Security from cross border chemical health threats.

    Science.gov (United States)

    Duarte-Davidson, R; Orford, R; Wyke, S; Griffiths, M; Amlôt, R; Chilcott, R

    2014-11-01

    The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development. Crown Copyright © 2014. Published by Elsevier Ltd. All rights reserved.

  11. U.S. Geological Survey environmental health science strategy: Providing environmental health science for a changing world

    Science.gov (United States)

    Bright, Patricia R.; Buxton, Herbert T.; Balistrieri, Laurie S.; Barber, Larry B.; Chapelle, Francis H.; Cross, Paul C.; Krabbenhoft, David P.; Plumlee, Geoffrey S.; Sleeman, Jonathan M.; Tillitt, Donald E.; Toccalino, Patricia L.; Winton, James R.

    2013-01-01

    America has an abundance of natural resources. We have bountiful clean water, fertile soil, and unrivaled national parks, wildlife refuges, and public lands. These resources enrich our lives and preserve our health and wellbeing. These resources have been maintained because of our history of respect for their value and an enduring commitment to their vigilant protection. Awareness of the social, economic, and personal value of the health of our environment is increasing. The emergence of environmentally driven diseases caused by exposure to contaminants and pathogens is a growing concern worldwide. New health threats and patterns of established threats are affected by both natural and anthropogenic changes to the environment. Human activities are key drivers of emerging (new and re-emerging) health threats. Societal demands for land and natural resources, quality of life, and economic prosperity lead to environmental change. Natural earth processes, climate trends, and related climatic events will compound the environmental impact of human activities. These environmental drivers will influence exposure to disease agents, including viral, bacterial, prion, and fungal pathogens, parasites, synthetic chemicals and substances, natural earth materials, toxins, and other biogenic compounds.

  12. PEASANTS ESTRATEGIES AND KNOWLEDGE IN THE NATURALS RESOURCES HANDLE

    Directory of Open Access Journals (Sweden)

    Andrés Pérez Magaña

    2008-08-01

    Full Text Available This contribution had as objective identifying the Knowledge and the strategies that have developed the peasants of a michoacana community for natural resources handle whit agriculturals objective. Starting from idea of that in the Sierra Purepecha region a little has been studied about folk knowledge and agricultural, and that had been unestimated, since the agrarians sciences, its potential for the rural development. Since the focus agroecologic it was studied a community of peasants of the Michoacan Stated using the techniques of participating observation, the agroecological transect and the semistructured individual interview. The results show that the peasants have developed knowledge, which permit to distinguish and identify environmental unities, and the handle the production space; it permit to handle different strategies of natural resources such as: the construction of boars, enclosures alive, reforestation, the use of dung the association crops, distribution space of the crops, expansion of the biodiversity and the handle of the germplasma. These actions are favored for the collective behavior of the community. In these actions are reflexeted a social construction, in which is present the knowledge of the peasants and their capacity of answer to adverses socioenvaironmental factors for assureting its production and reproduction.

  13. Cybersecurity in healthcare: A systematic review of modern threats and trends.

    Science.gov (United States)

    Kruse, Clemens Scott; Frederick, Benjamin; Jacobson, Taylor; Monticone, D Kyle

    2017-01-01

    The adoption of healthcare technology is arduous, and it requires planning and implementation time. Healthcare organizations are vulnerable to modern trends and threats because it has not kept up with threats. The objective of this systematic review is to identify cybersecurity trends, including ransomware, and identify possible solutions by querying academic literature. The reviewers conducted three separate searches through the CINAHL and PubMed (MEDLINE) and the Nursing and Allied Health Source via ProQuest databases. Using key words with Boolean operators, database filters, and hand screening, we identified 31 articles that met the objective of the review. The analysis of 31 articles showed the healthcare industry lags behind in security. Like other industries, healthcare should clearly define cybersecurity duties, establish clear procedures for upgrading software and handling a data breach, use VLANs and deauthentication and cloud-based computing, and to train their users not to open suspicious code. The healthcare industry is a prime target for medical information theft as it lags behind other leading industries in securing vital data. It is imperative that time and funding is invested in maintaining and ensuring the protection of healthcare technology and the confidentially of patient information from unauthorized access.

  14. Mines and Underwater IEDs in U.S. Ports and Waterways: Context, Threats, Challenges, and Solutions

    National Research Council Canada - National Science Library

    Truver, Scott C

    2008-01-01

    .... The threats of the Cold War are gone, and the United States finds itself operating in an environment where piracy, illegal migration, drug smuggling, terrorism, arms proliferation, and environmental...

  15. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  16. Development and implementation of automated radioactive materials handling systems

    International Nuclear Information System (INIS)

    Jacoboski, D.L.

    1992-12-01

    Material handling of radioactive and hazardous materials has forced the need to pursue remotely operated and robotic systems in light of operational safety concerns. Manual maneuvering, repackaging, overpacking and inspecting of containers which store radioactive and hazardous materials is the present mode of operation at the Department of Energy (DOE) Fernald Environmental Management Project (FEMP) in Fernald Ohio. The manual methods are unacceptable in the eyes of concerned site workers and influential community oversight committees. As an example to respond to the FEMP material handling needs, design efforts have been initiated to provide a remotely operated system to repackage thousands of degradated drums containing radioactive Thorium: Later, the repackaged Thorium will be shipped offsite to a predesignated repository again requiring remote operation

  17. Avoiding climate change uncertainties in Strategic Environmental Assessment

    DEFF Research Database (Denmark)

    Larsen, Sanne Vammen; Kørnøv, Lone; Driscoll, Patrick Arthur

    2013-01-01

    This article is concerned with how Strategic Environmental Assessment (SEA) practice handles climate change uncertainties within the Danish planning system. First, a hypothetical model is set up for how uncertainty is handled and not handled in decision-making. The model incorporates the strategies...

  18. India's power program and its concern over environmental safety

    International Nuclear Information System (INIS)

    Prasad, G.E.; Mittra, J.

    2001-01-01

    India's need of electrical power is enormous and per capita consumption of power is to be increased at least by ten times to reach the level of world average. Thermal Power generation faces two fold problems. First, there is scarcity of good quality fuel and second, increasing environmental pollution. India's self reliant, three stage, 'closed-fuel-cycle' nuclear power program is promising better solution to the above problems. To ensure Radiation Protection and Safety of Radiation Sources, Indian Nuclear Power program emphasizes upon design and engineering safety by incorporating necessary safety features in the design, operational safety through structured training program and typically through software packages to handle rare unsafe events and regulation by complying safety directives. A health survey among the radiation workers indicates that there is no extra threat to the public from nuclear power program. Based on latest technology, as available in case of nuclear power option, it is quite possible to meet high energy requirement with least impact on the environment.. (authors)

  19. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  20. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  1. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  2. Simulator for candu600 fuel handling system. environmental implications

    International Nuclear Information System (INIS)

    Vulpe, S.; Valeca, S.; Predescu, D.

    2016-01-01

    Personnel training are a main topic in the security and reliability of several industrial processes. The simulator is a physical device that reproduces real operation of a device used in a production process technology. Typically, a simulator is intended to train the operators to work properly with the real device in the production process, but simulators can be involved frequently in the research and evaluation of performance of human operators. Process simulation has a significant role in the training of operators of nuclear plants. To ensure the safe operation, protection of workers and the environment, of any nuclear power plant, the training of its operators in all operating modes of the plant is essential. A trained operator who can handle any emergency in a controlled manner, without panic, protecting equipment and personnel is an asset for a nuclear power plant. (authors)

  3. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  4. The influence of postnatal handling on adult neuroendocrine and behavioural stress reactivity

    NARCIS (Netherlands)

    Meerlo, P; Horvath, KM; Nagy, GM; Bohus, B; Koolhaas, JM

    1999-01-01

    Environmental stimuli during early stages of life can influence the development of an organism and may result in permanent changes in adult behaviour and physiology. In the present study we investigated the influence of early postnatal handling on adult neuroendocrine and behavioural stress

  5. Environmentally acceptable incineration of chlorinated chemical waste : Review of theory and practice

    NARCIS (Netherlands)

    De Zeeuw, M.A.; Lemkowitz, S.M.

    1987-01-01

    Chlorinated hydrocarbons in the form of chemical waste, represent a threat to the environment and public health of the world. Their proper handling, removal and destruction is critical to long term safety. Increasingly strict government legislation is leading to an increase in the quantity of

  6. Recommendations for cask features for robotic handling from the Advanced Handling Technology Project

    International Nuclear Information System (INIS)

    Drotning, W.

    1991-02-01

    This report describes the current status and recent progress in the Advanced Handling Technology Project (AHTP) initiated to explore the use of advanced robotic systems and handling technologies to perform automated cask handling operations at radioactive waste handling facilities, and to provide guidance to cask designers on the impact of robotic handling on cask design. Current AHTP tasks have developed system mock-ups to investigate robotic manipulation of impact limiters and cask tiedowns. In addition, cask uprighting and transport, using computer control of a bridge crane and robot, were performed to demonstrate the high speed cask transport operation possible under computer control. All of the current AHTP tasks involving manipulation of impact limiters and tiedowns require robotic operations using a torque wrench. To perform these operations, a pneumatic torque wrench and control system were integrated into the tool suite and control architecture of the gantry robot. The use of captured fasteners is briefly discussed as an area where alternative cask design preferences have resulted from the influence of guidance for robotic handling vs traditional operations experience. Specific robotic handling experiences with these system mock-ups highlight a number of continually recurring design principles: (1) robotic handling feasibility is improved by mechanical designs which emphasize operation with limited dexterity in constrained workspaces; (2) clearances, tolerances, and chamfers must allow for operations under actual conditions with consideration for misalignment and imprecise fixturing; (3) successful robotic handling is enhanced by including design detail in representations for model-based control; (4) robotic handling and overall quality assurance are improved by designs which eliminate the use of loose, disassembled parts. 8 refs., 15 figs

  7. Effects of rough handling on short chain fatty acid production and ...

    African Journals Online (AJOL)

    The influence of stress due to rough handling (RH) on gastrointestinal tract (GIT) environmental pH, concentration of short chain fatty acids (SCFAs) and modulatory roles of two Lactobacillus strains was investigated in broiler chickens. Equal number of chicks was randomly assigned to one of the following treatment groups; ...

  8. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  9. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  10. Safety handling of beryllium for fusion technology R and D

    International Nuclear Information System (INIS)

    Yoshida, Hiroshi; Okamoto, Makoto; Terai, Takayuki; Odawara, Osamu; Ashibe, Kusuo; Ohara, Atsushi.

    1992-07-01

    Feasibility of beryllium use as a blanket neutron multiplier, first wall and plasma facing material has been studied for the D-T burning experiment reactors such as ITER. Various experimental work of beryllium and its compounds will be performed under the conditions of high temperature and high energy particle exposure simulating fusion reactor conditions. Beryllium is known as a hazardous substance and its handling has been carefully controlled by various health and safe guidances and/or regulations in many countries. Japanese regulations for hazardous substance provide various guidelines on beryllium for the protection of industrial workers and environment. This report was prepared for the safe handling of beryllium in a laboratory scale experiments for fusion technology R and D such as blanket development. Major items in this report are; (1) Brief review of guidances and regulations in USA, UK and Japan. (2) Safe handling and administration manuals at beryllium facilities in INEL, LANL and JET. (3) Conceptual design study of beryllium handling facility for small to mid-scale blanket R and D. (4) Data on beryllium toxicity, example of clinical diagnosis of beryllium disease, and environmental occurence of beryllium. (5) Personnel protection tools of Japanese Industrial Standard for hazardous substance. (author) 61 refs

  11. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  12. Classification plan and handling of the hydrographic basin of the Sueva River

    International Nuclear Information System (INIS)

    Gil T, Walter O; Correa F, Hyarold

    1998-01-01

    The study was centered in the design of a classification proposal and handling for the basin of the Sueva River, guided to begin processes of the hydric resource conservation and that it allowed to harmonize the productive processes that are given to the interior of the basin with the environmental offer; strategies were designed guided to link to the community to the diagnostic process and design of the plan that shows the more relevant aspects of the environmental problem

  13. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  14. Coal handling/storage in a sensitive environment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2005-04-01

    A leading Italian manufacturer Bedeschi has designed and built a coal handling plant for its Outao cement plant in an environmentally sensitive national park in Portugal, Setubal National Park. The receiving station is completely enclosed, to control dusts. The main 80 m{sup 3} hopper can receive several types of truck and an automatic dour seals off the receiving section as soon as the truck has left. Coals tend to be blended according to kiln requirements. A bucket-type reclaimer is used due to the sticky nature of the coal. 2 photos.

  15. Engineering solutions of environmental problems in organic waste handling

    Science.gov (United States)

    Briukhanov, A. Y.; Vasilev, E. V.; Shalavina, E. V.; Kucheruk, O. N.

    2017-10-01

    This study shows the urgent need to consider modernization of agricultural production in terms of sustainable development, which takes into account environmental implications of intensive technologies in livestock farming. Some science-based approaches are offered to address related environmental challenges. High-end technologies of organic livestock waste processing were substantiated by the feasibility study and nutrient balance calculation. The technologies were assessed on the basis of best available techniques criteria, including measures such as specific capital and operational costs associated with nutrient conservation and their delivery to the plants.

  16. Perceived Vulnerability to Disease Predicts Environmental Attitudes

    Science.gov (United States)

    Prokop, Pavol; Kubiatko, Milan

    2014-01-01

    Investigating predictors of environmental attitudes may bring valuable benefits in terms of improving public awareness about biodiversity degradation and increased pro-environmental behaviour. Here we used an evolutionary approach to study environmental attitudes based on disease-threat model. We hypothesized that people vulnerable to diseases may…

  17. Evaluating the police service quality for handling traffic crash reporting

    DEFF Research Database (Denmark)

    Janstrup, Kira Hyldekær; Kaplan, Sigal; Barfod, Michael Bruhn

    2017-01-01

    Purpose The phenomenon of traffic crash under-reporting has been extensively documented in terms of its extent, but not equally analysed in terms of its reasons. As police distrust has been recently identified as a major reason for crash under-reporting, the purpose of this paper is to look...... at the police service quality for handling the reporting of traffic crashes. Design/methodology/approach This study introduces a novel approach to evaluate service quality that combines multi-criteria decision analysis (MCDA) with latent class analysis (LCA). Moreover, this study presents the design of a web......-based survey on the basis of the SERVQUAL approach to detecting strengths, opportunities and threats with crash reporting to the police at a strategic level. Transportation stakeholders (e.g. researchers, authorities, consultants, NGO representatives, suppliers) with an interest in traffic safety in Denmark...

  18. Analysis of inland crude oil spill threats, vulnerabilities, and emergency response in the midwest United States.

    Science.gov (United States)

    Brody, Thomas M; Di Bianca, Paisly; Krysa, Jan

    2012-10-01

    Although coastal oil spills tend to be highly publicized, crude oil spills in the United States affect inland areas relatively often. Spills to inland areas often affect sensitive environments and can have greater impacts to health and welfare than spills to coastal areas. For these reasons, the authors investigated inland crude oil spill threats, vulnerabilities, and emergency response in the midwestern U.S. states of Illinois, Indiana, Michigan, Minnesota, Ohio, and Wisconsin. These states work with the Region 5 Offices of the U.S. Environmental Protection Agency. Region 5's geospatial data in the Inland Sensitivity Atlas were turned into metrics indicating inland crude oil spill threats and vulnerabilities among the Region's sub-watersheds. These threats and vulnerabilities were weighted using data from the National Response Center and the Department of Energy's Environmental Restoration Priority System. The locations of the Region's emergency responders were geocoded in GIS. The GIS calculated the emergency response times to the Region's sub-watersheds. The resulting scatter plots are connected to the sub-watersheds in the map so stakeholders can (1) see the outlying sub-watersheds of concern and (2) better understand how reducing threats and better response time can reduce the risk of inland crude oil spills. Published 2012. This article is a U.S. Government work and is in the public domain in the U.S.A.

  19. Threat-sensitive anti-intraguild predation behaviour: maternal strategies to reduce offspring predation risk in mites.

    Science.gov (United States)

    Walzer, Andreas; Schausberger, Peter

    2011-01-01

    Predation is a major selective force for the evolution of behavioural characteristics of prey. Predation among consumers competing for food is termed intraguild predation (IGP). From the perspective of individual prey, IGP differs from classical predation in the likelihood of occurrence because IG prey is usually more rarely encountered and less profitable because it is more difficult to handle than classical prey. It is not known whether IGP is a sufficiently strong force to evolve interspecific threat sensitivity in antipredation behaviours, as is known from classical predation, and if so whether such behaviours are innate or learned. We examined interspecific threat sensitivity in antipredation in a guild of predatory mite species differing in adaptation to the shared spider mite prey (i.e. Phytoseiulus persimilis, Neoseiulus californicus and Amblyseius andersoni). We first ranked the players in this guild according to the IGP risk posed to each other: A. andersoni was the strongest IG predator; P. persimilis was the weakest. Then, we assessed the influence of relative IGP risk and experience on maternal strategies to reduce offspring IGP risk: A. andersoni was insensitive to IGP risk. Threat sensitivity in oviposition site selection was induced by experience in P. persimilis but occurred independently of experience in N. californicus. Irrespective of experience, P. persimilis laid fewer eggs in choice situations with the high- rather than low-risk IG predator. Our study suggests that, similar to classical predation, IGP may select for sophisticated innate and learned interspecific threat-sensitive antipredation responses. We argue that such responses may promote the coexistence of IG predators and prey.

  20. Building relationships with foreign governments in support of threat reduction

    International Nuclear Information System (INIS)

    Cajigal, George L.

    2007-01-01

    The effectiveness of any multinational effort in support of threat reduction depends on the relationship developed between the nation receiving the assistance and the donor nations. The effectiveness of this relationship must be based on a solid legal and cooperative framework that establishes the ground rules for the interaction between all parties involved. The author proposes in this paper to outline major considerations by the donor nation and the nation receiving the assistance as they establish an effective approach to threat-reduction efforts. The legal framework needs to be founded on a well-developed, country-to-country agreement that establishes general ground rules and officially recognizes the collaborative effort in an internationally binding document between signatories. This document normally addresses such issues as liability, tax exemptions, import duties, contracts, applicable environmental regulations, etc. Also, of utmost importance is the establishment of a collaborative framework. The basis for such a collaborative framework must be the buy-in into a common objective, the willingness to share concerns and work toward resolutions, and continuous communications. Only when a proper legal framework and a collaborative approach are established can effective relationships be built to enhance threat-reduction efforts. (author)

  1. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    International Nuclear Information System (INIS)

    1993-01-01

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they're designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn't necessarily the high priority. And that could be very troubling news for the Arctic in the future

  2. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-12-31

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they`re designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn`t necessarily the high priority. And that could be very troubling news for the Arctic in the future.

  3. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  4. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  5. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  6. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  7. How threats influence the evolutionary resolution of within-group conflict.

    Science.gov (United States)

    Cant, Michael A; Johnstone, Rufus A

    2009-06-01

    Most examples of cooperation in nature share a common feature: individuals can interact to produce a productivity benefit or fitness surplus, but there is conflict over how these gains are shared. A central question is how threats to exercise outside options influence the resolution of conflict within such cooperative associations. Here we show how a simple principle from economic bargaining theory, the outside option principle, can help to solve this problem in biological systems. According to this principle, outside options will affect the resolution of conflict only when the payoff of taking up these options exceeds the payoffs individuals can obtain from bargaining or negotiating within the group; otherwise, threats to exercise outside options are not credible and are therefore irrelevant. We show that previous attempts to incorporate outside options in synthetic models of reproductive conflict fail to distinguish between credible and incredible threats, and then we use the outside option principle to develop credible synthetic models in two contexts: reproductive skew and biparental care. A striking prediction of our analysis is that outside options are least relevant to the resolution of conflict in cooperative groups of kin and are most relevant in transient associations or interactions among nonrelatives. Our analysis shows a way to link the resolution of within-group conflict to the environmental setting in which it occurs, and it illuminates the role of threats in the evolution of social behavior.

  8. Full scale tests on remote handled FFTF fuel assembly waste handling and packaging

    International Nuclear Information System (INIS)

    Allen, C.R.; Cash, R.J.; Dawson, S.A.; Strode, J.N.

    1986-01-01

    Handling and packaging of remote handled, high activity solid waste fuel assembly hardware components from spent FFTF reactor fuel assemblies have been evaluated using full scale components. The demonstration was performed using FFTF fuel assembly components and simulated components which were handled remotely using electromechanical manipulators, shielding walls, master slave manipulators, specially designed grapples, and remote TV viewing. The testing and evaluation included handling, packaging for current and conceptual shipping containers, and the effects of volume reduction on packing efficiency and shielding requirements. Effects of waste segregation into transuranic (TRU) and non-transuranic fractions also are discussed

  9. Asian river fishes in the Anthropocene: threats and conservation challenges in an era of rapid environmental change.

    Science.gov (United States)

    Dudgeon, D

    2011-12-01

    This review compares and contrasts the environmental changes that have influenced, or will influence, fishes and fisheries in the Yangtze and Mekong Rivers. These two rivers have been chosen because they differ markedly in the type and intensity of prevailing threats. The Mekong is relatively pristine, whereas the Three Gorges Dam on the Yangtze is the world's largest dam representing the apotheosis of environmental alteration of Asian rivers thus far. Moreover, it is situated at the foot of a planned cascade of at least 12 new dams on the upper Yangtze. Anthropogenic effects of dams and pollution of Yangtze fishes will be exacerbated by plans to divert water northwards along three transfer routes, in part to supplement the flow of the Yellow River. Adaptation to climate change will undoubtedly stimulate more dam construction and flow regulation, potentially causing perfect storm conditions for fishes in the Yangtze. China has already built dams along the upper course of the Mekong, and there are plans for as many as 11 mainstream dams in People's Democratic Republic (Laos) and Cambodia in the lower Mekong Basin. If built, they could have profound consequences for biodiversity, fisheries and human livelihoods, and such concerns have stalled dam construction. Potential effects of dams proposed for other rivers (such as Nujiang-Salween) are also cause for concern. Conservation or restoration measures to sustain some semblance of the rich fish biodiversity of Asian rivers can be identified, but their implementation may prove problematic in a context of increasing Anthropocene alteration of these ecosystems. © 2011 The Author. Journal of Fish Biology © 2011 The Fisheries Society of the British Isles.

  10. Egyptian Environmental Activities and Regulations for Management of Hazardous Substances and Hazardous Wastes

    International Nuclear Information System (INIS)

    El Zarka, M.

    1999-01-01

    A substantial use of hazardous substances is essential to meet the social and economic goals of the community in Egypt. Agrochemicals are being used extensively to increase crop yield. The outdated agrochemicals and their empty containers represent a serious environmental problem. Industrial development in different sectors in Egypt obligates handling of huge amounts of hazardous substances and hazardous wastes. The inappropriate handling of such hazardous substances creates several health and environmental problems. Egypt faces many challenges to control safe handling of such substances and wastes. Several regulations are governing handling of hazardous substances in Egypt. The unified Environmental Law 4 for the year 1994 includes a full chapter on the Management of Hazardous Substances and Hazardous Wastes. National and international activities have been taken to manage hazardous substances and hazardous wastes in an environmental sound manner

  11. The influence of the environmental management system on the environmental impact of seaport companies during an economic crisis: Lithuanian case study.

    Science.gov (United States)

    Anne, Olga; Burskyte, Vilma; Stasiskiene, Zaneta; Balciunas, Arunas

    2015-01-01

    Freight handling in EU ports fell by more than 12 % during the global economic crisis in 2008-2009 after almost a decade of continuous growth. The decrease of freight handling in the Klaipeda seaport, the only port in Lithuania, was 6.7 % and happened due to the dominant outward movement of goods (mainly oil products). The Klaipeda seaport, due to its peculiarity, is the only ice-free port in the northern part of Baltic Sea. The present study explores the environmental impact of Klaipeda seaport activities from 2001 to 2011. Moreover, it compares the environmental effectiveness of environmental protection strategies used in the four biggest companies that, in fact, cover about 88 % of total activities (except general cargo) of the seaport. The first group of targeted companies used an environmental protection strategy to implement an ISO 14001-based environmental management system, and the second group selected to follow environmental management practices without certification. The paper analyses the development of the companies' activities in regard to the change of environmental effectiveness. The paper evaluates the pressure of the economic crisis on the companies' activities and its influence on environmental decisions, with particular interest in the ability of different environmental protection systems to resist and handle the expected performance. The study identified a significant decrease in companies' activities during the crisis period. However, the economic activities and environmental effectiveness demonstrated similar short-term tendencies in regard to the environmental strategy selection but differed in long-term perspective.

  12. Technical session 4: Health and safety issues. Working environment control in beryllium handling area

    International Nuclear Information System (INIS)

    Yonehara, K.; Natori, Y.; Tatenuma, K.; Nakamichi, Masaru

    2016-01-01

    Beryllium (Be) and its intermetallic compound (beryllide) are recommended from Japan as the most promising solid neutron multiplier for nuclear fusion power plant. The shape as the neutron multiplier is small sphere (pebble), and the mass production technology of it must be developed urgently. Beryllium is the substance regulated by the law of Ordinance on Prevention of Hazards Due to Specified the Chemical Substances Control. We'll report on a way of the operational environmental management to make a safe Be handling area for the Be handling researchers and workers. (author)

  13. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  14. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  15. Environmental Report Utah State Prison Geothermal Project

    Energy Technology Data Exchange (ETDEWEB)

    None

    1980-03-01

    This environmental report assesses the potential impact of developing a geothermal resource for space heating at the Utah State Prison. Wells will be drilled on prison property for production and for injection to minimize reservoir depletion and provide for convenient disposal of cooled fluid. The most significant environmental concerns are the proper handling of drilling muds during well drilling and the disposal of produced water during well testing. These problems will be handled by following currently accepted practices to reduce the potential risks.

  16. Ergonomic material-handling device

    Science.gov (United States)

    Barsnick, Lance E.; Zalk, David M.; Perry, Catherine M.; Biggs, Terry; Tageson, Robert E.

    2004-08-24

    A hand-held ergonomic material-handling device capable of moving heavy objects, such as large waste containers and other large objects requiring mechanical assistance. The ergonomic material-handling device can be used with neutral postures of the back, shoulders, wrists and knees, thereby reducing potential injury to the user. The device involves two key features: 1) gives the user the ability to adjust the height of the handles of the device to ergonomically fit the needs of the user's back, wrists and shoulders; and 2) has a rounded handlebar shape, as well as the size and configuration of the handles which keep the user's wrists in a neutral posture during manipulation of the device.

  17. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  18. Conceptual Design Report for Remote-Handled Low-Level Waste Disposal Facility

    Energy Technology Data Exchange (ETDEWEB)

    Lisa Harvego; David Duncan; Joan Connolly; Margaret Hinman; Charles Marcinkiewicz; Gary Mecham

    2010-10-01

    This conceptual design report addresses development of replacement remote-handled low-level waste disposal capability for the Idaho National Laboratory. Current disposal capability at the Radioactive Waste Management Complex is planned until the facility is full or until it must be closed in preparation for final remediation (approximately at the end of Fiscal Year 2017). This conceptual design report includes key project assumptions; design options considered in development of the proposed onsite disposal facility (the highest ranked alternative for providing continued uninterrupted remote-handled low level waste disposal capability); process and facility descriptions; safety and environmental requirements that would apply to the proposed facility; and the proposed cost and schedule for funding, design, construction, and operation of the proposed onsite disposal facility.

  19. India's power programs and its concern over environmental safety

    International Nuclear Information System (INIS)

    Prasad, G.E.; Mittra, J.; Sarma, M.S.R.

    2000-01-01

    India's need for electrical power is enormous and per capita consumption of power is to be increased at least by 10 times to reach the level of the world average. Thermal power generation faces two-fold problems. First, there is scarcity of good quality fuel and second, increasing environmental pollution. India 's self reliant, . three stage, 'closed-fuel-cycle' nuclear power program is promising a better solution to the above problems. To ensure Radiation Protection and Safety of Radiation Sources, the Indian Nuclear Power program emphasizes upon design and engineering safety by incorporating' necessary safety features in the design, operational safety through a structured training program and typically through software packages to handle rare unsafe events and regulation by complying safety directives. A health survey among the radiation workers indicates that there is no extra threat to the public from the nuclear power program. Based on the latest technology, as available in case of the nuclear power option, it is quite possible to meet high energy requirements with least impact on the environment. (authors)

  20. Environmental management systems

    OpenAIRE

    Misiak, Małgorzata

    2016-01-01

    Considering environmental protection requirements in business operations may, in the long run, determine if a lasting comparative advantage can be achieved. That is why our textbook, rich in case studies, identifies not only the threats a business may pose to the environment but stresses the ways of reducing its negative impact. It discusses, among other things, the concept of corporate social responsibility, environmental management systems, methods and the importance of eco-labelling goods ...

  1. Major issues in threat analysis and resolving such problems: an addendum to the GAP analysis

    Directory of Open Access Journals (Sweden)

    T.D. Surasinghe

    2012-04-01

    Full Text Available Identification of regions that warrant conservation attention is a top priority among global environmental concerns. Conventionally, this objective was achieved via recognizing natural landscapes based on the number of IUCN Red Listed species, percentage of endemism and species diversity. A recent innovation in conservation biology is the use of GIS-based threat analysis models to identify key areas of conservation importance. Compared with GAP Analysis, which only identifies biodiversity-rich unprotected lands, threat analysis serves as a rigorous tool in conservation planning which specifically recognizes threats and habitat suitability to different taxa based on a spatially-explicit analysis. Threat analysis is a highly flexible process which involves building up a model with multiple independent (without autocorrelations variables that both positively and negatively affect distribution and population persistence of a concerned species. Parameters include rate of land-use change, population density, population growth rate, land management regimes, protection status, habitat suitability and land stewardship. Threat analysis models can be used to understand the current status of a particular species (or a community and can be used to project future trends about the species under consideration. This publication provides an overview of uses of GIS-based threat analyses in conservation biology and provides insights on the limitations of these models and the directions that should be taken in future.

  2. Pollutants in environmental historical national accounts. A thermodynamic approach

    Energy Technology Data Exchange (ETDEWEB)

    Lindmark, M [Umeaa Univ. (Sweden). Dept. of Economic History

    1996-06-01

    The scope of this paper is to introduce some ideas concerning environmentally integrated historical national accounts and to submit a method for handling pollutants in that framework. The paper starts with a background, discusses some difficulties concerning the handling of residuals in environmental accounting, and introduces a method which might be suitable for historical environmental accounting involving pollutants. As a final step the method is evaluated and the results are interpreted in relation to ordinary production data given by historical GDP series for Sweden. 29 refs, 3 figs

  3. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  4. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  5. Ecological and Economic Problems of Environmental Security

    Directory of Open Access Journals (Sweden)

    Mashchenko Maryna A.

    2018-03-01

    Full Text Available The article is aimed at defining a common mechanism for assessing the ecological and economic threats and ecological losses on the basis of a long-term study to ensure the environmental security of the State. The necessity of a new approach to the State regulation through achievement of environmental security is displayed, that will allow to reduce tensions of the ecological-economic problems in Ukraine. For implementation of this approach, a general mechanism for estimation of ecological-economic threats and ecological losses is provided, which is carried out through formation of an integral costs system. The costs system is presented in the article in the form of an in-depth mechanism for estimating the ecological-economic threats on the example of ecological impacts. Structuring and preparation of the costs system for applied researches is the next stage of this prolonged research.

  6. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  7. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  8. 30o inclination in handles of plastic boxes can reduce postural and muscular workload during handling

    Directory of Open Access Journals (Sweden)

    Luciana C. C. B. Silva

    2013-06-01

    Full Text Available BACKGROUND: The handling of materials, which occurs in the industrial sector, is associated with lesions on the lumbar spine and in the upper limbs. Inserting handles in industrial boxes is a way to reduce work-related risks. Although the position and angle of the handles are significant factors in comfort and safety during handling, these factors have rarely been studied objectively. OBJECTIVE: To compare the handling of a commercial box and prototypes with handles and to evaluate the effects on upper limb posture, muscle electrical activity, and perceived acceptability using different grips while handling materials from different heights. METHOD: Thirty-seven healthy volunteers evaluated the handles of prototypes that allowed for changes in position (top and bottom and angle (0°, 15°, and 30°. Wrist, elbow, and shoulder movements were evaluated using electrogoniometry and inclinometry. The muscle electrical activity in the wrist extensors, biceps brachii, and the upper portion of the trapezius was measured using a portable electromyographer. The recorded data on muscle movements and electrical activity were synchronized. Subjective evaluations of acceptability were evaluated using a visual analog scale. RESULTS AND CONCLUSIONS: The prototypes with handles at a 30° angle produced the highest acceptability ratings, more neutral wrist positions, lower levels of electromyographic activity for the upper trapezius, and lower elevation angles for the arms. The different measurement methods were complementary in evaluating the upper limbs during handling.

  9. New transport and handling contract

    CERN Multimedia

    SC Department

    2008-01-01

    A new transport and handling contract entered into force on 1.10.2008. As with the previous contract, the user interface is the internal transport/handling request form on EDH: https://edh.cern.ch/Document/TransportRequest/ To ensure that you receive the best possible service, we invite you to complete the various fields as accurately as possible and to include a mobile telephone number on which we can reach you. You can follow the progress of your request (schedule, completion) in the EDH request routing information. We remind you that the following deadlines apply: 48 hours for the transport of heavy goods (up to 8 tonnes) or simple handling operations 5 working days for crane operations, transport of extra-heavy goods, complex handling operations and combined transport and handling operations in the tunnel. For all enquiries, the number to contact remains unchanged: 72202. Heavy Handling Section TS-HE-HH 72672 - 160319

  10. Pollution, habitat loss, fishing, and climate change as critical threats to penguins.

    Science.gov (United States)

    Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara

    2015-02-01

    Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales. © 2014 The Authors. Conservation Biology

  11. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Three-Week Bright-Light Intervention Has Dose-Related Effects on Threat-Related Corticolimbic Reactivity and Functional Coupling

    DEFF Research Database (Denmark)

    Fisher, Patrick M; Madsen, Martin K; Mc Mahon, Brenda

    2014-01-01

    environmental stimuli (e.g., threat) and may underlie these effects. Serotonin signaling modulates this circuit and is implicated in the pathophysiology of seasonal and other affective disorders. METHODS: We evaluated the effects of a bright-light intervention protocol on threat-related corticolimbic reactivity......-related amygdala and prefrontal reactivity in a dose-dependent manner. Conversely, amygdala-prefrontal and intraprefrontal functional coupling increased significantly in a dose-dependent manner. Genotype status significantly moderated bright-light intervention effects on intraprefrontal functional coupling....... CONCLUSIONS: This is the first study to evaluate the effects of clinically relevant bright-light intervention on threat-related brain function. We show that amygdala-prefrontal reactivity and communication are significantly affected by bright-light intervention, an effect partly moderated by genotype...

  13. Trends in Modern Exception Handling

    Directory of Open Access Journals (Sweden)

    Marcin Kuta

    2003-01-01

    Full Text Available Exception handling is nowadays a necessary component of error proof information systems. The paper presents overview of techniques and models of exception handling, problems connected with them and potential solutions. The aspects of implementation of propagation mechanisms and exception handling, their effect on semantics and general program efficiency are also taken into account. Presented mechanisms were adopted to modern programming languages. Considering design area, formal methods and formal verification of program properties we can notice exception handling mechanisms are weakly present what makes a field for future research.

  14. Nuclear threats in the vicinity of the Nordic countries

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.; Moeller, B.

    1999-01-01

    This project is one of the new cross-disciplinary studies in the NKS (Nordic Nuclear Safety) research program 1998-2001. The main task for the project is to aggregate knowledge of nuclear threats in the vicinity of the Nordic countries, a 'base of knowledge', and make this available for the Nordic authorities as a supplement for the national emergency preparedness work. The project will focus on potential events in nuclear installations and the consequences for the Nordic countries especially on: vulnerable food chains; doses to man; environmental contamination; the emergency preparedness system. (au)

  15. A fiber optic link for the remote handling in nuclear environment

    International Nuclear Information System (INIS)

    Breuze, G.; Carnet, B.; Friant, A.; Blanc, F.; Lordet, J.; Boisde, G.

    1988-01-01

    At CEA a R/D program is running to improve performances of servomanipulators used in nuclear fuel reprocessing plants. Present work gives the main environmental parameters (gamma rays exposition, temperature) and shows the basis of the digital link designed to remote-handle such a manipulator. Up to 10 5 Gy behavior of optical fibers and electronic components was studied. Two different optical cables were built, one for the long link (100 m), the second to set in an especially designed winding unwinding wheel. Six way permanent or remote-handle connectors were developed to connect optical interfaces and a leaktight penetration. Measured budget of the link taking into account efficient photoblesching of the pure silica core fiber and influence of gamma rays on the slave interface is presented [fr

  16. Remote handling machines

    International Nuclear Information System (INIS)

    Sato, Shinri

    1985-01-01

    In nuclear power facilities, the management of radioactive wastes is made with its technology plus the automatic techniques. Under the radiation field, the maintenance or aid of such systems is important. To cope with this situation, MF-2 system, MF-3 system and a manipulator system as remote handling machines are described. MF-2 system consists of an MF-2 carrier truck, a control unit and a command trailer. It is capable of handling heavy-weight objects. The system is not by hydraulic but by electrical means. MF-3 system consists of a four-crawler truck and a manipulator. The truck is versatile in its posture by means of the four independent crawlers. The manipulator system is bilateral in operation, so that the delicate handling is made possible. (Mori, K.)

  17. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  18. Environmental security benefits arising from Russian/Norwegian/US cooperation in the high Arctic

    International Nuclear Information System (INIS)

    Dyer, R.S.

    1997-01-01

    Past practices associated with the civilian and military use of nuclear power in NW Russia present large environmental security risks of international concern. These risks arise from a variety of practices associated with weapons production, testing, power production and waste management. The threats presented by these activities are multimedia in nature, span political boundaries and cannot be simply or inexpensively remediated. Today, cooperative efforts are being undertaken to improve environmental security by remediating existing and potential emission sources. Initial efforts focused on the upgrade and expansion of the Murmansk Low-level Liquid Waste Treatment Facility, Murmansk, Russia. This facility handles wastes generated during the decommissioning of Russian Nuclear Navy submarines and from the operation of the Russian commercial nuclear-powered icebreaker fleet. This upgraded facility is now being constructed and is expected to be completed by March 1998. Completion of this facility will result in the cessation of any future dumping of liquid radioactive wastes into the Barents and Kara Seas. Another large environmental security risk is the LEPSE. The LEPSE is a ship docked in Murmansk, Russia, that contains ∼650 spent fuel elements as well as other solid and liquid wastes from Russian nuclear vessels. International efforts are now being mounted to remove the spent and damaged fuel from this ship, including the safe removal and storage/disposal of the fuel elements. This paper will summarize the environmental security problems presented by these different sources and the likely environmental security benefits associated with their remediation. 5 refs., 1 fig., 1 tab

  19. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  20. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  1. Conceptual Design Report for the Remote-Handled Low-Level Waste Disposal Project

    Energy Technology Data Exchange (ETDEWEB)

    David Duncan

    2011-05-01

    This conceptual design report addresses development of replacement remote-handled low-level waste disposal capability for the Idaho National Laboratory. Current disposal capability at the Radioactive Waste Management Complex is planned until the facility is full or until it must be closed in preparation for final remediation (approximately at the end of Fiscal Year 2017). This conceptual design report includes key project assumptions; design options considered in development of the proposed onsite disposal facility (the highest ranked alternative for providing continued uninterrupted remote-handled low level waste disposal capability); process and facility descriptions; safety and environmental requirements that would apply to the proposed facility; and the proposed cost and schedule for funding, design, construction, and operation of the proposed onsite disposal facility.

  2. Conceptual Design Report for the Remote-Handled Low-Level Waste Disposal Project

    Energy Technology Data Exchange (ETDEWEB)

    Lisa Harvego; David Duncan; Joan Connolly; Margaret Hinman; Charles Marcinkiewicz; Gary Mecham

    2011-03-01

    This conceptual design report addresses development of replacement remote-handled low-level waste disposal capability for the Idaho National Laboratory. Current disposal capability at the Radioactive Waste Management Complex is planned until the facility is full or until it must be closed in preparation for final remediation (approximately at the end of Fiscal Year 2017). This conceptual design report includes key project assumptions; design options considered in development of the proposed onsite disposal facility (the highest ranked alternative for providing continued uninterrupted remote-handled low level waste disposal capability); process and facility descriptions; safety and environmental requirements that would apply to the proposed facility; and the proposed cost and schedule for funding, design, construction, and operation of the proposed onsite disposal facility.

  3. Safety of Cargo Aircraft Handling Procedure

    Directory of Open Access Journals (Sweden)

    Daniel Hlavatý

    2017-07-01

    Full Text Available The aim of this paper is to get acquainted with the ways how to improve the safety management system during cargo aircraft handling. The first chapter is dedicated to general information about air cargo transportation. This includes the history or types of cargo aircraft handling, but also the means of handling. The second part is focused on detailed description of cargo aircraft handling, including a description of activities that are performed before and after handling. The following part of this paper covers a theoretical interpretation of safety, safety indicators and legislative provisions related to the safety of cargo aircraft handling. The fourth part of this paper analyzes the fault trees of events which might occur during handling. The factors found by this analysis are compared with safety reports of FedEx. Based on the comparison, there is a proposal on how to improve the safety management in this transportation company.

  4. Major threats of pollution and climate change to global coastal ecosystems and enhanced management for sustainability

    NARCIS (Netherlands)

    Lu, Y.; Yuan, J.; Lu, X.; Su, Chao; Zhang, Y.; Wang, C.; Cao, X.; Li, Q.; Su, Jilan; Ittekkot, Venugopalan; Garbutt, Richard Angus; Bush, S.R.; Fletcher, Stephen; Wagey, Tonny; Kachur, Anatolii; Sweijd, Neville

    2018-01-01

    Coastal zone is of great importance in the provision of various valuable ecosystem services. However, it is also sensitive and vulnerable to environmental changes due to high human populations and interactions between the land and ocean. Major threats of pollution from over enrichment of nutrients,

  5. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  6. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  7. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  8. Environmentalism and typological characteristics of globalistion consciousness

    Directory of Open Access Journals (Sweden)

    Roman M. Kolisnichenko

    2016-01-01

    Full Text Available Analyzed anthropo-saving and environmental-depth approaches to understanding the essence environmentalism. The definition of environmentalism as global environmental trends that recognizes the intrinsic value of the natural world, all its elements and aims to rescue mankind from global environmental threats by achieving a sustainable balance of planetary ecosystems, the proper state of the environment and harmonious development of man and nature. Developed the typology of globalization consciousness attitude to solving global problems in the relationship between man and nature. The main types globalistion consciousness, as the growth of thrift in relation to nature, located in the following sequence: ecodestructive, anthropocentric, ecoconsumerist, ecotraditional, environmental, sacred-ethical, naturecentric and antropofobiastic. Developing a typology of globalistion consciousness above criteria also highlighted its neutral type. Proved that environmental globalistion consciousness is environmentally oriented system of ideas that reflect solutions to global environmental problems in accordance with the principles environmentalism. This type of consciousness globalistion a high degree of awareness of global environmental problems, persistent desire to implement effective methods of humane solution, the optimal it is due, the need to maximize the spread of population. It is concluded that the formation environmental globalistion consciousness as a prerequisite for saving humanity from self created global environmental threats can be greatly accelerated by the terms of the assistance of governments, the media, educational institutions, political parties, public organizations and other institutions of political socialization.

  9. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    Science.gov (United States)

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  10. Ergonomics and patient handling.

    Science.gov (United States)

    McCoskey, Kelsey L

    2007-11-01

    This study aimed to describe patient-handling demands in inpatient units during a 24-hour period at a military health care facility. A 1-day total population survey described the diverse nature and impact of patient-handling tasks relative to a variety of nursing care units, patient characteristics, and transfer equipment. Productivity baselines were established based on patient dependency, physical exertion, type of transfer, and time spent performing the transfer. Descriptions of the physiological effect of transfers on staff based on patient, transfer, and staff characteristics were developed. Nursing staff response to surveys demonstrated how patient-handling demands are impacted by the staff's physical exertion and level of patient dependency. The findings of this study describe the types of transfers occurring in these inpatient units and the physical exertion and time requirements for these transfers. This description may guide selection of the most appropriate and cost-effective patient-handling equipment required for specific units and patients.

  11. Equipment for the handling of thorium materials

    International Nuclear Information System (INIS)

    Heisler, S.W. Jr.; Mihalovich, G.S.

    1988-01-01

    The Feed Materials Production Center (FMPC) is the United States Department of Energy's storage facility for thorium. FMPC thorium handling and overpacking projects ensure the continued safe handling and storage of the thorium inventory until final disposition of the materials is determined and implemented. The handling and overpacking of the thorium materials requires the design of a system that utilizes remote handling and overpacking equipment not currently utilized at the FMPC in the handling of uranium materials. The use of remote equipment significantly reduces radiation exposure to personnel during the handling and overpacking efforts. The design system combines existing technologies from the nuclear industry, the materials processing and handling industry and the mining industry. The designed system consists of a modified fork lift truck for the transport of thorium containers, automated equipment for material identification and inventory control, and remote handling and overpacking equipment for material identification and inventory control, and remote handling and overpacking equipment for repackaging of the thorium materials

  12. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  13. How to Handle Abuse

    Science.gov (United States)

    ... Handle Abuse KidsHealth / For Kids / How to Handle Abuse What's in this article? Tell Right Away How Do You Know Something Is Abuse? ... babysitter, teacher, coach, or a bigger kid. Child abuse can happen anywhere — at ... building. Tell Right Away A kid who is being seriously hurt ...

  14. Waste Handling Building Conceptual Study

    International Nuclear Information System (INIS)

    G.W. Rowe

    2000-01-01

    The objective of the ''Waste Handling Building Conceptual Study'' is to develop proposed design requirements for the repository Waste Handling System in sufficient detail to allow the surface facility design to proceed to the License Application effort if the proposed requirements are approved by DOE. Proposed requirements were developed to further refine waste handling facility performance characteristics and design constraints with an emphasis on supporting modular construction, minimizing fuel inventory, and optimizing facility maintainability and dry handling operations. To meet this objective, this study attempts to provide an alternative design to the Site Recommendation design that is flexible, simple, reliable, and can be constructed in phases. The design concept will be input to the ''Modular Design/Construction and Operation Options Report'', which will address the overall program objectives and direction, including options and issues associated with transportation, the subsurface facility, and Total System Life Cycle Cost. This study (herein) is limited to the Waste Handling System and associated fuel staging system

  15. Practices of Handling

    DEFF Research Database (Denmark)

    Ræbild, Ulla

    to touch, pick up, carry, or feel with the hands. Figuratively it is to manage, deal with, direct, train, or control. Additionally, as a noun, a handle is something by which we grasp or open up something. Lastly, handle also has a Nordic root, here meaning to trade, bargain or deal. Together all four...... meanings seem to merge in the fashion design process, thus opening up for an embodied engagement with matter that entails direction giving, organizational management and negotiation. By seeing processes of handling as a key fashion methodological practice, it is possible to divert the discourse away from...... introduces four ways whereby fashion designers apply their own bodies as tools for design; a) re-activating past garment-design experiences, b) testing present garment-design experiences c) probing for new garment-design experiences and d) design of future garment experiences by body proxy. The paper...

  16. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  17. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  18. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  19. Survival and sustainability. Environmental concerns in the 21st century

    Energy Technology Data Exchange (ETDEWEB)

    Goekcekus, Hueseyin; Tuerker, Umut [Near East Univ., Nicosia, North Cyprus (Turkey). Dept. of Civil Engineering; LaMoreaux, James W. (eds.) [P.E. LaMoreaux and Associates, Tuscaloosa, AL (United States)

    2011-07-01

    The International Conference on Environment: Survival and Sustainability, held at the Near East University, Nicosia, Northern Cyprus 19-24 February 2007, dealt with environmental threats and proposed solutions at all scales. The 21 themes addressed by the conference fell into four broad categories; Threats to Survival and Sustainability; Technological Advances towards Survival and Sustainability; Activities and Tools for Social Change; Defining Goals for Sustainable Societies. Activities and tools that move the society towards greater sustainability were emphasized at the conference. These included environmental law and ethics, environmental knowledge, technology and information systems, media, environmental awareness, education and lifelong learning, the use of literature for environmental awareness, the green factor in politics, international relations and environmental organizations. The breadth of the issues addressed at the conference made clear the need for greatly increased interdisciplinary and international collaboration the survival and sustainability concept. The exchanges at the conference represent a step in this direction. (orig.)

  20. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  1. SRV-automatic handling device

    International Nuclear Information System (INIS)

    Yamada, Koji

    1987-01-01

    Automatic handling device for the steam relief valves (SRV's) is developed in order to achieve a decrease in exposure of workers, increase in availability factor, improvement in reliability, improvement in safety of operation, and labor saving. A survey is made during a periodical inspection to examine the actual SVR handling operation. An SRV automatic handling device consists of four components: conveyor, armed conveyor, lifting machine, and control/monitoring system. The conveyor is so designed that the existing I-rail installed in the containment vessel can be used without any modification. This is employed for conveying an SRV along the rail. The armed conveyor, designed for a box rail, is used for an SRV installed away from the rail. By using the lifting machine, an SRV installed away from the I-rail is brought to a spot just below the rail so that the SRV can be transferred by the conveyor. The control/monitoring system consists of a control computer, operation panel, TV monitor and annunciator. The SRV handling device is operated by remote control from a control room. A trial equipment is constructed and performance/function testing is carried out using actual SRV's. As a result, is it shown that the SRV handling device requires only two operators to serve satisfactorily. The required time for removal and replacement of one SRV is about 10 minutes. (Nogami, K.)

  2. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  3. Grain Handling and Storage.

    Science.gov (United States)

    Harris, Troy G.; Minor, John

    This text for a secondary- or postecondary-level course in grain handling and storage contains ten chapters. Chapter titles are (1) Introduction to Grain Handling and Storage, (2) Elevator Safety, (3) Grain Grading and Seed Identification, (4) Moisture Control, (5) Insect and Rodent Control, (6) Grain Inventory Control, (7) Elevator Maintenance,…

  4. Proceedings of the 5th international conference on stability and handling of liquid fuels. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    Giles, H.N. [ed.

    1995-03-01

    This proceedings summarizes recent work concerning stability and handling of fuels. Jet fuels, gasolines, heavy oils, and distillate fuels were considered. Fuel issues relevant to environmental mandates were discussed. Selected papers are indexed separately for inclusion in the Energy Science and Technology Database.

  5. TRANSPORT/HANDLING REQUESTS

    CERN Multimedia

    Groupe ST/HM

    2002-01-01

    A new EDH document entitled 'Transport/Handling Request' will be in operation as of Monday, 11th February 2002, when the corresponding icon will be accessible from the EDH desktop, together with the application instructions. This EDH form will replace the paper-format transport/handling request form for all activities involving the transport of equipment and materials. However, the paper form will still be used for all vehicle-hire requests. The introduction of the EDH transport/handling request form is accompanied by the establishment of the following time limits for the various services concerned: 24 hours for the removal of office items, 48 hours for the transport of heavy items (of up to 6 metric tons and of standard road width), 5 working days for a crane operation, extra-heavy transport operation or complete removal, 5 working days for all transport operations relating to LHC installation. ST/HM Group, Logistics Section Tel: 72672 - 72202

  6. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  7. Indirect Encoding in Neuroevolutionary Ship Handling

    Directory of Open Access Journals (Sweden)

    Miroslaw Lacki

    2018-03-01

    Full Text Available In this paper the author compares the efficiency of two encoding schemes for artificial intelligence methods used in the neuroevolutionary ship maneuvering system. This may be also be seen as the ship handling system that simulates a learning process of a group of artificial helmsmen - autonomous control units, created with an artificial neural network. The helmsman observes input signals derived form an enfironment and calculates the values of required parameters of the vessel maneuvering in confined waters. In neuroevolution such units are treated as individuals in population of artificial neural networks, which through environmental sensing and evolutionary algorithms learn to perform given task efficiently. The main task of this project is to evolve a population of helmsmen with indirect encoding and compare results of simulation with direct encoding method.

  8. Environmental terrorism

    International Nuclear Information System (INIS)

    Zirschky, J.

    1988-01-01

    Environmental terrorism is described as the deliberate use or threat of use of physical, chemical, nuclear, or bacteriological agents in the commission of a terrorist act; an act in which either the agent is delivered to a target population by use of an environmental medium (such as air, water, or soil) or the agent is used to render a natural resource unsuitable for a desired use. Among the recommendations for safeguarding against environmental terrorism are: changes in reporting requirements for chemical inventories and sensitive information such as security measures; development of effective emergency response plans; development of a public relations program to be implemented after an incident in which the goal of the terrorist is to discredit a particular company; and protection from liability for terrorist acts

  9. Preliminary study of a blanket handling device and evaluation of the feasibility of eliminating the spread of radioactive contamination

    International Nuclear Information System (INIS)

    Leger, D.; Djerassi, H.; Maupou, M.; Charruyer, P.; Salpietro, E.

    1988-01-01

    A study concerning progress and future development of the BLANKET HANDLING DEVICE of NET-DN tokamak and the related potentialities against contamination dispersal during handling of internal segments. To prevent the dust dispersion during the mantainance operations, there are three options: a Tight-Intermediate Containment (TIC), a Containment Transfer Unit (CTU) or the dust fixation on the internal components. The design of the BHD takes account of multivarious dimensioning requirements (geometrical and dimensional constraints, including characteristics of the segments and torus), environmental and operational constraints (safety, lifetime, maintainability, cooling of Blanket segments, containment). The possible solutions concerning protection of special devices, during handling and travelling, are discussed

  10. Environmental policy and public health: air pollution, global climate change, and wilderness

    National Research Council Canada - National Science Library

    Rom, William N

    2012-01-01

    .... It scrutinizes the sources of pollution and threats to environmental integrity, the consequences of pollution on the environment and health and explains the legal basis for environmental action...

  11. Recording environmental assets in the national accounts

    OpenAIRE

    Carl Obst; Michael Vardon

    2014-01-01

    Accounting information is a core element of economic decision-making at both national and corporate levels. It is widely accepted that much economic activity is dependent upon natural capital and natural resources—generically termed environmental assets in an accounting context. Environmental assets are under threat of depletion and degradation from economic activity. Consequently, the incorporation of information on environmental assets into standard accounting frameworks is an essential ele...

  12. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  13. Indigenising environmentalism - a task for the next millennium ...

    African Journals Online (AJOL)

    The issue of environmentalism global arising from perceived threat to the environment on all front and thus requiring attention of everyone. In as much as productive activities have contributed to environmental degradation, then it is necessary to address the processes. The environment as a concept however holds different ...

  14. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  15. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  16. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  17. Cask system design guidance for robotic handling

    International Nuclear Information System (INIS)

    Griesmeyer, J.M.; Drotning, W.D.; Morimoto, A.K.; Bennett, P.C.

    1990-10-01

    Remote automated cask handling has the potential to reduce both the occupational exposure and the time required to process a nuclear waste transport cask at a handling facility. The ongoing Advanced Handling Technologies Project (AHTP) at Sandia National Laboratories is described. AHTP was initiated to explore the use of advanced robotic systems to perform cask handling operations at handling facilities for radioactive waste, and to provide guidance to cask designers regarding the impact of robotic handling on cask design. The proof-of-concept robotic systems developed in AHTP are intended to extrapolate from currently available commercial systems to the systems that will be available by the time that a repository would be open for operation. The project investigates those cask handling operations that would be performed at a nuclear waste repository facility during cask receiving and handling. The ongoing AHTP indicates that design guidance, rather than design specification, is appropriate, since the requirements for robotic handling do not place severe restrictions on cask design but rather focus on attention to detail and design for limited dexterity. The cask system design features that facilitate robotic handling operations are discussed, and results obtained from AHTP design and operation experience are summarized. The application of these design considerations is illustrated by discussion of the robot systems and their operation on cask feature mock-ups used in the AHTP project. 11 refs., 11 figs

  18. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  19. Production management of window handles

    Directory of Open Access Journals (Sweden)

    Manuela Ingaldi

    2014-12-01

    Full Text Available In the chapter a company involved in the production of aluminum window and door handles was presented. The main customers of the company are primarily companies which produce PCV joinery and wholesalers supplying these companies. One chosen product from the research company - a single-arm pin-lift window handle - was described and its production process depicted technologically. The chapter also includes SWOT analysis conducted in the research company and the value stream of the single-arm pin-lift window handle.

  20. 7 CFR 58.443 - Whey handling.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 3 2010-01-01 2010-01-01 false Whey handling. 58.443 Section 58.443 Agriculture... Procedures § 58.443 Whey handling. (a) Adequate sanitary facilities shall be provided for the handling of whey. If outside, necessary precautions shall be taken to minimize flies, insects and development of...

  1. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  2. Environmental standards and project construction: A review

    International Nuclear Information System (INIS)

    Mason, P.F.; Thornberry, H.L.

    1991-01-01

    In the past decade, changes have occurred in the area of environmental regulation. This paper identifies the typical environmental standards applicable to project construction, recent environmental regulatory issues and trends, and identifies new environmental issues which must be considered in project construction. These include (1) handling hazardous chemicals in the workplace, (2) construction at formerly utilized sites, (3) disposal of debris, construction materials and hazardous waste, and (4) training and experience of construction personnel in environmental issues

  3. Threats to safety during sedation outside of the operating room and the death of Michael Jackson.

    Science.gov (United States)

    Webster, Craig S; Mason, Keira P; Shafer, Steven L

    2016-03-01

    From an understanding of human psychology and the reliability of high-technology systems, this review considers critical threats to the safety of patients undergoing sedation outside of the operating room, and will stratify these threats along what we define as the 'Patient Risk Continuum'. We then consider interventions suitable for addressing identified risks. The technology, organization and delivery of healthcare continue to become more complex, highlighting the importance of maintaining the safety of patients. Sedation outside of the operating room is known to be associated with higher rates of adverse events. However, a number of recent safety initiatives have shown benefit in improving patient safety. The following threats to patients undergoing sedation, in increasing order of risk, are discussed: equipment and environmental factors, known patient risks, poor team performance, combinatorial problems and egregious violations. To address these threats, we discuss a number of approaches consistent with the systems approach to safety, namely: encouraging functions, forcing functions, cognitive safety nets, information sharing, recovery strategies and regulatory change. Demonstrating improvement with any safety initiative relies critically on quality data collected on the problem area in question.

  4. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  5. Steam coal processing technology: handling, high-order processing, COM, meth-coal

    Energy Technology Data Exchange (ETDEWEB)

    Kamata, H.; Onodera, J.

    1982-01-01

    Topics covered include: various handling techologies (overland and marine transport, storage, water removal, drying, comminution and sizing); various coal processing technologies (gravity concentration, magnetic separation, multi-stage flotation, liquid-phase pelletizing, chemical processing); production methods for coal-oil mixtures (COM), their physical properties, stability, storage, transport, advantages, plus recent trends in research and development; production of coal-methanol slurry (meth-coal), its stability, storage, transport, utilization and environmental problems, plus latest trends in research and development. (In Japanese)

  6. Elements of quality assurance in environmental surveillance

    International Nuclear Information System (INIS)

    Johnson, L.J.

    1975-01-01

    Qualities of an environmental surveillance program requiring control or assurance are reviewed. Requirements of accuracy, reproducibility, sensitivity, acceptability, and time and cost effectiveness are qualities discussed. The controls applicable to sample collection, handling, chemical analysis, measurement and data presentation are identified and discussed as they pertain to environmental monitoring. Quality assurance program recommendations for developing and reporting environmental surveillance data are provided

  7. Basic approaches for the handling of illnesses of the cultivation of the rice

    International Nuclear Information System (INIS)

    Tapiero Ortiz, A.L.

    2001-01-01

    Some basic concepts are exposed for the handling of illnesses in the cultivation of the rice, beginning with the illness definition in the plants, integrating the concept in a system plant-pathogen-environment that in turn would have the subsystem it plants, subsystem pathogen and subsystem environmental conditions. It discusses each one of these subsystems and their influence in the development of the infection. The illnesses of the rice are described taken place by the mushrooms Pyricularia oryzae and Rizoctonia solani and the resistance and receptivity to the pathogens on the part of genetic materials, as well as it influences of the environment and indications are given for their handling. The spotted of the grain of the rice like an illness is described caused by a complex of mushrooms, bacteria and nutritional and climatic factors that cause decrease in the yield and they reduce the quality of the grain and the seed. They are related the pathogens organisms causing the illness, the influence of the environment in their development and instructions are given for their handling

  8. The Effect of Gentle Handling on Depressive-Like Behavior in Adult Male Mice: Considerations for Human and Rodent Interactions in the Laboratory.

    Science.gov (United States)

    Neely, Caroline; Lane, Christina; Torres, Julio; Flinn, Jane

    2018-01-01

    Environmental factors play a significant role in well-being of laboratory animals. Regulations and guidelines recommend, if not require, that stressors such as bright lighting, smells, and noises are eliminated or reduced to maximize animal well-being. A factor that is often overlooked is handling and how researchers interact with their animals. Researchers, lab assistants, and husbandry staff in animal facilities may use inconsistent handling methods when interacting with rodents, but humans should be considered a part of the animal's social environment. This study examined the effects of different handling techniques on depressive-like behavior, measured by the Porsolt forced swim test, in adult C57BL/6J male mice. The same two researchers handled the mice in a gentle, aggressive, or minimal (control) fashion over approximately two weeks prior to testing. The results demonstrated a beneficial effect of gentle handling: gentle handling reduced swimming immobility in the forced swim test compared to mice that were aggressively or minimally handled. We argue that gentle handling, rather than methodical handling, can foster a better relationship between the handlers and rodents. Although handling is not standardized across labs, consistent gentle handling allows for less challenging behavioral testing, better data collection, and overall improved animal welfare.

  9. Development of commercial robots for radwaste handling

    International Nuclear Information System (INIS)

    Colborn, K.A.

    1988-01-01

    The cost and dose burden associated with low level radwaste handling activities is a matter of increasing concern to the commercial nuclear power industry. This concern is evidenced by the fact that many utilities have begun to revaluate waste generation, handling, and disposal activities at their plants in an effort to improve their overall radwaste handling operations. This paper reports on the project Robots for Radwaste Handling, to identify the potential of robots to improve radwaste handling operations. The project has focussed on the potential of remote or automated technology to improve well defined, recognizable radwaste operations. The project focussed on repetitive, low skill level radwaste handling and decontamination tasks which involve significant radiation exposure

  10. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  11. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  12. Preoperational checkout of the remote-handled transuranic waste handling at the Waste Isolation Pilot Plant

    International Nuclear Information System (INIS)

    1987-09-01

    This plan describes the preoperational checkout for handling Remote-Handled Transuranic (RH-TRU) Wastes from their receipt at the Waste Isolation Pilot Plant (WIPP) to their emplacement underground. This plan identifies the handling operations to be performed, personnel groups responsible for executing these operations, and required equipment items. In addition, this plan describes the quality assurance that will be exercised throughout the checkout, and finally, it establishes criteria by which to measure the success of the checkout. 7 refs., 5 figs

  13. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    Energy Technology Data Exchange (ETDEWEB)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B. [and others

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management.

  14. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    International Nuclear Information System (INIS)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B.

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management

  15. Preference Handling for Artificial Intelligence

    OpenAIRE

    Goldsmith, Judy; University of Kentucky; Junker, Ulrich; ILOG

    2009-01-01

    This article explains the benefits of preferences for AI systems and draws a picture of current AI research on preference handling. It thus provides an introduction to the topics covered by this special issue on preference handling.

  16. Religious Serpent Handling and Community Relations.

    Science.gov (United States)

    Williamson, W Paul; Hood, Ralph W

    2015-01-01

    Christian serpent handling sects of Appalachia comprise a community that has long been mischaracterized and marginalized by the larger communities surrounding them. To explore this dynamic, this article traces the emergence of serpent handling in Appalachia and the emergence of anti-serpent-handling state laws, which eventually failed to curb the practice, as local communities gave serpent handling groups support. We present two studies to consider for improving community relations with serpent handling sects. In study 1, we present data relating the incidence of reported serpent-bite deaths with the rise of anti-serpent-handling laws and their eventual abatement, based on increasing acceptance of serpent handlers by the larger community. Study 2 presents interview data on serpent bites and death that provide explanations for these events from the cultural and religious perspective. We conclude that first-hand knowledge about serpent handlers, and other marginalized groups, helps to lessen suspicion and allows them to be seen as not much different, which are tendencies that are important for promoting inter-community harmony.

  17. Dual-Use Threat Assessment Framework - An Attempt to Quantify the Risk

    International Nuclear Information System (INIS)

    Stephen, E. R.; Lavigne, J. J.; Colton, B.

    2007-01-01

    Advances in the biosciences over the past decade have been rapid and transformative. While these advances offer significant benefit to society, they also provide very significant challenges in terms of security. Concerns over misuse and/or accidental use/release (dual use) although not new, are now being viewed through the security lens. There is a wide-spread view that public or private sector scientists, supported through investments by pharmaceutical, environmental and agricultural interests working in the fields that comprise biotechnology, posses the ability to assess the implications of their own work and work within a regime of self-control that is for the most part self-governing (codes of practice). On the other end of the spectrum are those that would codify or legislative control. All this is being done in the absence of a mechanism for quantifying the threat. This presentation will discuss the development of an assessment framework that addresses both actual and potential threats. The framework was developed based on available intelligence and other open source information along with interviews with those persons familiar with the concept of dual use and the multiple, sometimes competing agendas of a variety of interest groups. The framework will help to bring some clarity to the discussion and at the same time, help to inform those that are positioned to respond to the threat. (author)

  18. Department of Energy Programmatic Spent Nuclear Fuel Management and Idaho National Engineering Laboratory Environmental Restoration and Waste Management Programs Draft Environmental Impact Statement

    International Nuclear Information System (INIS)

    1994-06-01

    This volume contains the following attachments: transportation of Naval spent nuclear fuel; description of Naval spent nuclear receipt and handling at the Expended Core Facility at the Idaho National Engineering Laboratory; comparison of storage in new water pools versus dry container storage; description of storage of Naval spent nuclear fuel at servicing locations; description of receipt, handling, and examination of Naval spent nuclear fuel at alternate DOE facilities; analysis of normal operations and accident conditions; and comparison of the Naval spent nuclear fuel storage environmental assessment and this environmental impact statement

  19. USGS Environmental health science strategy: providing environmental health science for a changing world: public review release

    Science.gov (United States)

    Bright, Patricia R.; Buxton, Herbert T.; Balistrieri, Laurie S.; Barber, Larry B.; Chapelle, Francis H.; Cross, Paul C.; Krabbenhoft, David P.; Plumlee, Geoffrey S.; Sleeman, Jonathan M.; Tillitt, Donald E.; Toccalino, Patricia L.; Winton, James R.

    2012-01-01

    America has an abundance of natural resources. We have bountiful clean water, fertile soil, and unrivaled national parks, wildlife refuges, and public lands. These resources enrich our lives and preserve our health and wellbeing. These resources have been maintained because of our history of respect for their value and an enduring commitment to their vigilant protection. Awareness of the social, economic, and personal value of the health of our environment is increasing. The emergence of environmentally driven diseases caused by environmental exposure to contaminants and pathogens is a growing concern worldwide. New health threats and patterns of established threats are affected by both natural and anthropogenic changes to the environment. Human activities are key drivers of emerging (new and re-emerging) health threats. Societal demands for land and natural resources, a better quality of life, improved economic prosperity, and the environmental impacts associated with these demands will continue to increase. Natural earth processes, climate trends, and related climatic events will add to the environmental impact of human activities. These environmental drivers will influence exposure to disease agents, including viral, bacterial, prion, and fungal pathogens, parasites, natural earth materials, toxins and other biogenic compounds, and synthetic chemicals and substances. The U.S. Geological Survey (USGS) defines environmental health science broadly as the interdisciplinary study of relations among the quality of the physical environment, the health of the living environment, and human health. The interactions among these three spheres are driven by human activities, ecological processes, and natural earth processes; the interactions affect exposure to contaminants and pathogens and the severity of environmentally driven diseases in animals and people. This definition provides USGS with a framework for synthesizing natural science information from across the Bureau

  20. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  1. Environmental liability and life-cycle management of used lubricating oils.

    Science.gov (United States)

    Guerin, Turlough F

    2008-12-30

    Used oil handling, as a business, requires an extensive understanding by management that environmental liabilities exist through its supply chain. Findings from a review of the legal requirements of operating a used oil handling business were: understanding the transfer of ownership of used petroleum hydrocarbons is critical to any such business and how this is documented; used oil handlers are responsible for providing training to their staff, including site personnel and any third party waste contractors, and for communicating best practice procedures relating to the management of used petroleum hydrocarbons to all those individuals and organisations involved in business relationships that the used oil handling companies have; used oil handlers should audit the performance of any third party contractors that it engages to conduct work on behalf of its customers. Hypothetical situations of a company planning to enter the used oil handling market are described in relation to petroleum hydrocarbon wastes it handles to illustrate the range of potential liabilities. Companies proposing to establish a used oil handling business should ensure that they provide accurate advice to its employees, its customer's employees and to its third party contractors, all of which may be responsible for handling used petroleum hydrocarbons as part of the service it intends to provide, and that it has a well documented system addressing how environmental issues are managed.

  2. How Retailers Handle Complaint Management

    DEFF Research Database (Denmark)

    Hansen, Torben; Wilke, Ricky; Zaichkowsky, Judy

    2009-01-01

    This article fills a gap in the literature by providing insight about the handling of complaint management (CM) across a large cross section of retailers in the grocery, furniture, electronic and auto sectors. Determinants of retailers’ CM handling are investigated and insight is gained as to the......This article fills a gap in the literature by providing insight about the handling of complaint management (CM) across a large cross section of retailers in the grocery, furniture, electronic and auto sectors. Determinants of retailers’ CM handling are investigated and insight is gained...... as to the links between CM and redress of consumers’ complaints. The results suggest that retailers who attach large negative consequences to consumer dissatisfaction are more likely than other retailers to develop a positive strategic view on customer complaining, but at the same time an increase in perceived...

  3. The 'threat' of radioactivity: how environmental education can help overcome it

    International Nuclear Information System (INIS)

    Villar, Heldio P.

    2009-01-01

    One of the most paradoxical tenets of environmentalists is that nuclear power and environmental preservation are as antagonistic as yin and yang. It is virtually impossible to reconcile them with the idea that, since the second law of thermodynamics decrees that you cannot produce energy without creating environmental change of some kind, the nuclear option is, of all available, the one that is capable of supplying huge amounts of energy with the least impact on the planet. Nevertheless, the public is always misled by the environmental cassandras that prognosticate doom for a world where nuclear reactors still operate. lnevitably, nuclear projects other than power stations, like research reactors and particle accelerators, are also met with public distrust. It is proposed herein that the introduction of the theoretical bases of radioactivity, radiation physics and nuclear power plants in the environmental education curricula will slowly but surely result in a greater awareness of the public towards the reality surrounding radiation and radioactivity. This initiative, coupled with a more realistic approach towards nuclear risks on the part of nuclear regulators and licensers, has the potential to make nuclear applications - not only in electric energy production - more palatable to the public, rendering it more prepared to reap the benefits thereof. (author)

  4. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  5. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  6. The place of environmental education and awareness in biodiversity ...

    African Journals Online (AJOL)

    This paper examines the place of environmental education and awareness in biodiversity conservation in Nigeria. Depletion of biodiversity in Nigeria is a major environmental problem and a serious threat to livelihood and the quality of life. It is very important that future development programmes aggressively develop ...

  7. 7 CFR 926.9 - Handle.

    Science.gov (United States)

    2010-01-01

    ... the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements and Orders; Fruits, Vegetables, Nuts), DEPARTMENT OF AGRICULTURE DATA COLLECTION, REPORTING AND RECORDKEEPING REQUIREMENTS APPLICABLE TO CRANBERRIES NOT SUBJECT TO THE CRANBERRY MARKETING ORDER § 926.9 Handle. Handle...

  8. Preventing radiological threat in the Republic of Azerbaijan

    International Nuclear Information System (INIS)

    Gabulov, I.A.

    2005-01-01

    Full text: Azerbaijan is a developing and transit country in the Caucasus, connecting East and West. In addition, Azerbaijan is neighboring countries with pronounced political instability, some of which have extensive nuclear infrastructure or try to develop nuclear infrastructure. Furthermore, in the recent past fundamentalist religious terrorism has taken roots in some of these countries. Therefore, in spite of the fact that the Republic of Azerbaijan has no nuclear facilities or nuclear materials in its own territory, it could be interesting for terrorist groups trying to develop a crude radiological dispersal device using radioactive sources that are widely used in everyday life especially in such areas as oil industry, medicine, agriculture and scientific researches. The issues of reduction and prevention of both radiological and nuclear terrorism threat are one of the main global challenges around the world. The Republic of Azerbaijan is a part of world community and so we are concerned that radioactive sources used for peaceful applications could be stolen by the terrorist groups and used in the development of radiological dispersal devices sometimes referred to as a 'dirty bomb'. It is obvious that using highly radioactive materials in radiological dispersal devices could be very disruptive to society, causing panic, environmental contamination, and large financial losses. One of the ways for reduction and prevention of radiological threat for the countries like Azerbaijan with underdeveloped nuclear security and radiation safety infrastructure is closely participation in the international cooperation programs. As an example of such cooperation, I would like to present the United States Department of Energy's International Radiological Threat Reduction (IRTR) Program. Good progress has made in the field of radiological security within the framework of this program that was started 2003. Actually, in comparison with any IAEA programs, the progress reached by

  9. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  10. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  11. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  12. Cannabinoid CB1 receptors in distinct circuits of the extended amygdala determine fear responsiveness to unpredictable threat.

    Science.gov (United States)

    Lange, M D; Daldrup, T; Remmers, F; Szkudlarek, H J; Lesting, J; Guggenhuber, S; Ruehle, S; Jüngling, K; Seidenbecher, T; Lutz, B; Pape, H C

    2017-10-01

    The brain circuits underlying behavioral fear have been extensively studied over the last decades. Although the vast majority of experimental studies assess fear as a transient state of apprehension in response to a discrete threat, such phasic states of fear can shift to a sustained anxious apprehension, particularly in face of diffuse cues with unpredictable environmental contingencies. Unpredictability, in turn, is considered an important variable contributing to anxiety disorders. The networks of the extended amygdala have been suggested keys to the control of phasic and sustained states of fear, although the underlying synaptic pathways and mechanisms remain poorly understood. Here, we show that the endocannabinoid system acting in synaptic circuits of the extended amygdala can explain the fear response profile during exposure to unpredictable threat. Using fear training with predictable or unpredictable cues in mice, combined with local and cell-type-specific deficiency and rescue of cannabinoid type 1 (CB1) receptors, we found that presynaptic CB1 receptors on distinct amygdala projections to bed nucleus of the stria terminalis (BNST) are both necessary and sufficient for the shift from phasic to sustained fear in response to an unpredictable threat. These results thereby identify the causal role of a defined protein in a distinct brain pathway for the temporal development of a sustained state of anxious apprehension during unpredictability of environmental influences, reminiscent of anxiety symptoms in humans.

  13. Remote handling at LAMPF

    International Nuclear Information System (INIS)

    Grisham, D.L.; Lambert, J.E.

    1983-01-01

    Experimental area A at the Clinton P. Anderson Meson Physics Facility (LAMPF) encompasses a large area. Presently there are four experimental target cells along the main proton beam line that have become highly radioactive, thus dictating that all maintenance be performed remotely. The Monitor remote handling system was developed to perform in situ maintenance at any location within area A. Due to the complexity of experimental systems and confined space, conventional remote handling methods based upon hot cell and/or hot bay concepts are not workable. Contrary to conventional remote handling which require special tooling for each specifically planned operation, the Monitor concept is aimed at providing a totally flexible system capable of remotely performing general mechanical and electrical maintenance operations using standard tools. The Monitor system is described

  14. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  15. Potential inhalation exposure and containment efficiency when using hoods for handling nanoparticles

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, Candace Su-Jung, E-mail: tsai51@purdue.edu [Purdue University, School of Health Science (United States)

    2013-09-15

    Inhalation exposure to airborne nanoparticles (NPs) has been reported during manual activities using typical fume hoods. This research studied potential inhalation exposure associated with the manual handling of NPs using two new nanoparticle-handling enclosures and two biological safety cabinets, and discussed the ability to contain NPs in the hoods to reduce environmental release and exposure. Airborne concentrations of 5 nm to 20 {mu}m diameter particles were measured while handling nanoalumina particles in various ventilated enclosures. Tests were conducted using two handling conditions and concentrations were measured using real-time particle counters, and particles were collected on transmission electron microscope grids to determine particle morphology and elemental composition. Airflow patterns were characterized visually using a laser-light sheet and fog. The average number concentration increase at breathing zone outside the enclosure was less than 1,400 particle/cm{sup 3} for each particle size at all tested conditions and the estimated overall mass concentration was about 83 {mu}g/m{sup 3} which was less than the dosage of typical nanoparticle inhalation exposure studies. The typical front-to-back airflow was used in the studied hoods, which could potentially induce reverse turbulence in the wake region. However, containment of NPs using studied hoods was demonstrated with excellent performance. Smoke tests showed that worker's hand motion could potentially cause nanoparticle escape. The challenge of front-to-back airflow can be partially overcome by gentle motion, low face velocity, and front exhaust to reduce nanoparticle escape.

  16. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  17. Evaluation of Groundwater Impacts to Support the National Environmental Policy Act Environmental Assessment for the INL Remote-Handled Low-Level Waste Disposal Project

    Energy Technology Data Exchange (ETDEWEB)

    Annette Schafer, Arthur S. Rood, A. Jeffrey Sondrup

    2011-12-23

    Groundwater impacts have been analyzed for the proposed remote-handled low-level waste disposal facility. The analysis was prepared to support the National Environmental Policy Act environmental assessment for the top two ranked sites for the proposed disposal facility. A four-phase screening and analysis approach was documented and applied. Phase I screening was site independent and applied a radionuclide half-life cut-off of 1 year. Phase II screening applied the National Council on Radiation Protection analysis approach and was site independent. Phase III screening used a simplified transport model and site-specific geologic and hydrologic parameters. Phase III neglected the infiltration-reducing engineered cover, the sorption influence of the vault system, dispersion in the vadose zone, vertical dispersion in the aquifer, and the release of radionuclides from specific waste forms. These conservatisms were relaxed in the Phase IV analysis which used a different model with more realistic parameters and assumptions. Phase I screening eliminated 143 of the 246 radionuclides in the inventory from further consideration because each had a half-life less than 1 year. An additional 13 were removed because there was no ingestion dose coefficient available. Of the 90 radionuclides carried forward from Phase I, 57 radionuclides had simulated Phase II screening doses exceeding 0.4 mrem/year. Phase III and IV screening compared the maximum predicted radionuclide concentration in the aquifer to maximum contaminant levels. Of the 57 radionuclides carried forward from Phase II, six radionuclides were identified in Phase III as having simulated future aquifer concentrations exceeding maximum contaminant limits. An additional seven radionuclides had simulated Phase III groundwater concentrations exceeding 1/100th of their respective maximum contaminant levels and were also retained for Phase IV analysis. The Phase IV analysis predicted that none of the thirteen remaining

  18. MRI of meniscal bucket-handle tears

    Energy Technology Data Exchange (ETDEWEB)

    Magee, T.H.; Hinson, G.W. [Menorah Medical Center, Overland Park, KS (United States). Dept. of Radiology

    1998-09-01

    A meniscal bucket-handle tear is a tear with an attached fragment displaced from the meniscus of the knee joint. Low sensitivity of MRI for detection of bucket-handle tears (64% as compared with arthroscopy) has been reported previously. We report increased sensitivity for detecting bucket-handle tears with the use of coronal short tau inversion recovery (STIR) images. Results. By using four criteria for diagnosis of meniscal bucket-handle tears, our overall sensitivity compared with arthroscopy was 93% (28 of 30 meniscal bucket-handle tears seen at arthroscopy were detected by MRI). The meniscal fragment was well visualized in all 28 cases on coronal STIR images. The double posterior cruciate ligament sign was seen in 8 of 30 cases, the flipped meniscus was seen in 10 of 30 cases and a fragment in the intercondylar notch was seen in 18 of 30 cases. (orig.)

  19. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  20. Sample handling and chemical procedures for efficacious trace analysis of urine by neutron activation analysis

    International Nuclear Information System (INIS)

    Blotcky, A.J.; Rack, E.P.; Roman, F.R.

    1988-01-01

    Important for the determination of trace elements, ions, or compounds in urine by chemical neutron activation analysis is the optimization of sample handling, preirradiation chemistry, and radioassay procedures necessary for viable analysis. Each element, because of its natural abundance in the earth's crust and, hence, its potential for reagent and environmental contamination, requires specific procedures for storage, handling, and preirradiation chemistry. Radioassay techniques for radionuclides vary depending on their half-lives and decay characteristics. Described in this paper are optimized procedures for aluminum and selenium. While 28 Al (T 1/2 = 2.24 min) and 77m Se(T 1/2 = 17.4s) have short half-lives, their gamma-ray spectra are quite different. Aluminum-28 decays by a 1779-keV gamma and 77m Se by a 162-keV gamma. Unlike selenium, aluminum is a ubiquitous element in the environment requiring special handling to minimize contamination in all phases of its analytical determination

  1. Sophisticated fuel handling system evolved

    International Nuclear Information System (INIS)

    Ross, D.A.

    1988-01-01

    The control systems at Sellafield fuel handling plant are described. The requirements called for built-in diagnostic features as well as the ability to handle a large sequencing application. Speed was also important; responses better than 50ms were required. The control systems are used to automate operations within each of the three main process caves - two Magnox fuel decanners and an advanced gas-cooled reactor fuel dismantler. The fuel route within the fuel handling plant is illustrated and described. ASPIC (Automated Sequence Package for Industrial Control) which was developed as a controller for the plant processes is described. (U.K.)

  2. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  3. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  4. The natural angle between the hand and handle and the effect of handle orientation on wrist radial/ulnar deviation during maximal push exertions.

    Science.gov (United States)

    Young, Justin G; Lin, Jia-Hua; Chang, Chien-Chi; McGorry, Raymond W

    2013-01-01

    The purpose of this experiment was to quantify the natural angle between the hand and a handle, and to investigate three design factors: handle rotation, handle tilt and between-handle width on the natural angle as well as resultant wrist radial/ulnar deviation ('RUD') for pushing tasks. Photographs taken of the right upper limb of 31 participants (14 women and 17 men) performing maximal seated push exertions on different handles were analysed. Natural hand/handle angle and RUD were assessed. It was found that all of the three design factors significantly affected natural handle angle and wrist RUD, but participant gender did not. The natural angle between the hand and the cylindrical handle was 65 ± 7°. Wrist deviation was reduced for handles that were rotated 0° (horizontal) and at the narrow width (31 cm). Handles that were tilted forward 15° reduced radial deviation consistently (12-13°) across handle conditions. Manual materials handling (MMH) tasks involving pushing have been related to increased risk of musculoskeletal injury. This study shows that handle orientation influences hand and wrist posture during pushing, and suggests that the design of push handles on carts and other MMH aids can be improved by adjusting their orientation to fit the natural interface between the hand and handle.

  5. 327 Building liquid waste handling options modification project plan

    International Nuclear Information System (INIS)

    Ham, J.E.

    1998-01-01

    This report evaluates the modification options for handling radiological liquid waste (RLW) generated during decontamination and cleanout of the 327 Building. The overall objective of the 327 Facility Stabilization Project is to establish a passively safe and environmentally secure configuration of the 327 Facility. The issue of handling of RLW from the 327 Facility (assuming the 34O Facility is not available to accept the RLW) has been conceptually examined in at least two earlier engineering studies (Parsons 1997a and Hobart l997). Each study identified a similar preferred alternative that included modifying the 327 Facility RLWS handling systems to provide a truck load-out station, either within the confines of the facility or exterior to the facility. The alternatives also maximized the use of existing piping, tanks, instrumentation, controls and other features to minimize costs and physical changes. An issue discussed in each study involved the anticipated volume of the RLW stream. Estimates ranged between 113,550 and 387,500 liters in the earlier studies. During the development of the 324/327 Building Stabilization/Deactivation Project Management Plan, the lower estimate of approximately 113,550 liters was confirmed and has been adopted as the baseline for the 327 Facility RLW stream. The goal of this engineering study is to reevaluate the existing preferred alternative and select a new preferred alternative, if appropriate. Based on the new or confirmed preferred alternative, this study will also provide a conceptual design and cost estimate for required modifications to the 327 Facility to allow removal of RLWS and treatment of the RLW generated during deactivation

  6. 9 CFR 3.118 - Handling.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Handling. 3.118 Section 3.118 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE STANDARDS Specifications for the Humane Handling, Care, Treatment, and Transportation of Marine...

  7. Safety measuring for sodium handling

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Ji Young; Jeong, K C; Kim, T J; Kim, B H; Choi, J H

    2001-09-01

    This is the report for the safety measures of sodium handling. These contents are prerequisites for the development of sodium technology and thus the workers participate in sodium handling and experiments have to know them perfectly. As an appendix, the relating parts of the laws are presented.

  8. A Perspective on Remote Handling Operations and Human Machine Interface for Remote Handling in Fusion

    International Nuclear Information System (INIS)

    Haist, B.; Hamilton, D.; Sanders, St.

    2006-01-01

    A large-scale fusion device presents many challenges to the remote handling operations team. This paper is based on unique operational experience at JET and gives a perspective on remote handling task development, logistics and resource management, as well as command, control and human-machine interface systems. Remote operations require an accurate perception of a dynamic environment, ideally providing the operators with the same unrestricted knowledge of the task scene as would be available if they were actually at the remote work location. Traditional camera based systems suffer from a limited number of viewpoints and also degrade quickly when exposed to high radiation. Virtual Reality and Augmented Reality software offer great assistance. The remote handling system required to maintain a tokamak requires a large number of different and complex pieces of equipment coordinating to perform a large array of tasks. The demands on the operator's skill in performing the tasks can escalate to a point where the efficiency and safety of operations are compromised. An operations guidance system designed to facilitate the planning, development, validation and execution of remote handling procedures is essential. Automatic planning of motion trajectories of remote handling equipment and the remote transfer of heavy loads will be routine and need to be reliable. This paper discusses the solutions developed at JET in these areas and also the trends in management and presentation of operational data as well as command, control and HMI technology development offering the potential to greatly assist remote handling in future fusion machines. (author)

  9. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  10. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  11. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  12. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  13. Options and processes for spent catalyst handling and utilization.

    Science.gov (United States)

    Marafi, M; Stanislaus, A

    2003-07-18

    The quantity of spent hydroprocessing catalysts discarded as solid wastes in the petroleum refining industries has increased remarkably in recent years due to a rapid growth in the hydroprocessing capacity to meet the rising demand for low-sulfur fuels. Due to their toxic nature, spent hydroprocessing catalysts have been branded as hazardous wastes, and the refiners are experiencing pressure from environmental authorities to handle them safely. Several alternative methods such as reclamation of metals, rejuvenation and reuse, disposal in landfills and preparation of useful materials using spent catalysts as raw materials are available to deal with the spent catalyst problem. The technical feasibility as well as the environmental and economic aspects of these options are reviewed. In addition, details of two bench-scale processes, one for rejuvenation of spent hydroprocessing catalysts, and the other for producing non-leachable synthetic aggregate materials that were developed in this laboratory, are presented in this paper.

  14. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  15. Scientifically defensible fish conservation and recovery plans: Addressing diffuse threats and developing rigorous adaptive management plans

    Science.gov (United States)

    Maas-Hebner, Kathleen G.; Schreck, Carl B.; Hughes, Robert M.; Yeakley, Alan; Molina, Nancy

    2016-01-01

    We discuss the importance of addressing diffuse threats to long-term species and habitat viability in fish conservation and recovery planning. In the Pacific Northwest, USA, salmonid management plans have typically focused on degraded freshwater habitat, dams, fish passage, harvest rates, and hatchery releases. However, such plans inadequately address threats related to human population and economic growth, intra- and interspecific competition, and changes in climate, ocean, and estuarine conditions. Based on reviews conducted on eight conservation and/or recovery plans, we found that though threats resulting from such changes are difficult to model and/or predict, they are especially important for wide-ranging diadromous species. Adaptive management is also a critical but often inadequately constructed component of those plans. Adaptive management should be designed to respond to evolving knowledge about the fish and their supporting ecosystems; if done properly, it should help improve conservation efforts by decreasing uncertainty regarding known and diffuse threats. We conclude with a general call for environmental managers and planners to reinvigorate the adaptive management process in future management plans, including more explicitly identifying critical uncertainties, implementing monitoring programs to reduce those uncertainties, and explicitly stating what management actions will occur when pre-identified trigger points are reached.

  16. The relationship between manual handling performance and recent flying experience in air transport pilots.

    Science.gov (United States)

    Ebbatson, Matt; Harris, Don; Huddlestone, John; Sears, Rodney

    2010-02-01

    Modern jet transport aircraft are typically flown using the on-board automation by the pilot programming commands into the auto-flight systems. Anecdotal evidence exists suggesting that pilots of highly automated aircraft experience manual flying skills decay as a result of a lack of opportunity to practise hand-flying during line operations. The ability of a pilot to revert to basic manual control is essential, for example, in cases where the aircraft's automatic capability is diminished or when reconfiguring the automatics is an ineffective use of crew capacity. However, there is a paucity of objective data to substantiate this perceived threat to flight safety. Furthermore, traditional performance measurement techniques may lack the ability to identify subtle but significant differences in pilots' manual handling ability in large transport aircraft. This study examines the relationship between pilot manual handling performance and their recent flying experience using both traditional flight path tracking measures and frequency-based control strategy measures. Significant relationships are identified between pilots' very recent flying experience and their manual control strategy. Statement of Relevance: The study demonstrates a novel application of frequency analysis, which produces a broader and more sensitive analysis of pilot performance than has been offered in previous research. Additionally, the relationships that are found to exist between recent flying experience and manual flying performance will help to guide future pilot assessment and training.

  17. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist

    Science.gov (United States)

    Perera, Frederica

    2017-01-01

    Fossil-fuel combustion by-products are the world’s most significant threat to children’s health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO2), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases—all of which may be “seeded“ in utero and affect health and functioning immediately and over the life course. By impairing children’s health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the

  18. Pollution from Fossil-Fuel Combustion is the Leading Environmental Threat to Global Pediatric Health and Equity: Solutions Exist.

    Science.gov (United States)

    Perera, Frederica

    2017-12-23

    Fossil-fuel combustion by-products are the world's most significant threat to children's health and future and are major contributors to global inequality and environmental injustice. The emissions include a myriad of toxic air pollutants and carbon dioxide (CO₂), which is the most important human-produced climate-altering greenhouse gas. Synergies between air pollution and climate change can magnify the harm to children. Impacts include impairment of cognitive and behavioral development, respiratory illness, and other chronic diseases-all of which may be "seeded" in utero and affect health and functioning immediately and over the life course. By impairing children's health, ability to learn, and potential to contribute to society, pollution and climate change cause children to become less resilient and the communities they live in to become less equitable. The developing fetus and young child are disproportionately affected by these exposures because of their immature defense mechanisms and rapid development, especially those in low- and middle-income countries where poverty and lack of resources compound the effects. No country is spared, however: even high-income countries, especially low-income communities and communities of color within them, are experiencing impacts of fossil fuel-related pollution, climate change and resultant widening inequality and environmental injustice. Global pediatric health is at a tipping point, with catastrophic consequences in the absence of bold action. Fortunately, technologies and interventions are at hand to reduce and prevent pollution and climate change, with large economic benefits documented or predicted. All cultures and communities share a concern for the health and well-being of present and future children: this shared value provides a politically powerful lever for action. The purpose of this commentary is to briefly review the data on the health impacts of fossil-fuel pollution, highlighting the neurodevelopmental

  19. Asthma, guides for diagnostic and handling

    International Nuclear Information System (INIS)

    Salgado, Carlos E; Caballero A, Andres S; Garcia G, Elizabeth

    1999-01-01

    The paper defines the asthma, includes topics as diagnostic, handling of the asthma, special situations as asthma and pregnancy, handling of the asthmatic patient's perioperatory and occupational asthma

  20. Impact of shuttle environment on prelaunch handling of nickel-hydrogen batteries

    Science.gov (United States)

    Green, R. S.

    1986-01-01

    Deployment of the American Satellite Company 1 spacecraft for the Space Shuttle Discovery in August 1985 set a new milestone in nickel-hydrogen battery technology. This communications satellite is equipped with two 35 Ah nickel-hydrogen batteries and it is the first such satellite launched into orbit via the Space Shuttle. The prelaunch activities, combined with the environmental constraints onboard the Shuttle, led to the development of a new battery handling procedure. An outline of the prelaunch activities, with particular attention to battery charging, is presented.

  1. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  2. Environmental Risk Profiling of the Volta Delta, Ghana

    Science.gov (United States)

    Nyarko, B. K.; Appeaning-Addo, K.; Amisigo, B.

    2017-12-01

    Volta Delta communities find it difficult to absorb or bear risk at different levels, because of the physical and economic impacts of environmental hazards. In this regards various agencies and organizations have in recent years launched initiatives to measure and identify risk areas with a set of indicators and indices. The theory underpinning this study is concepts of Modern Portfolio Theory (MPT). The Cox proportional hazards regression model will be used as the model for the risk profile. Finding the optimal level of environmental risk for activities in the Volta Delta considering the risk required, risk capacity and risk tolerance. Using data from different sources, an environmental risk profile was developed for the Volta Delta. The result indicates that risks are distributed across the Delta. However, areas that have government interventions, such as sea defense system and irrigation facilities have less threat. In addition wealthy areas do effectively reduce the threat of any form of disaster.

  3. Remote-handled transuranic system assessment appendices. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-11-01

    Volume 2 of this report contains six appendices to the report: Inventory and generation of remote-handled transuranic waste; Remote-handled transuranic waste site storage; Characterization of remote-handled transuranic waste; RH-TRU waste treatment alternatives system analysis; Packaging and transportation study; and Remote-handled transuranic waste disposal alternatives.

  4. Remote-handled transuranic system assessment appendices. Volume 2

    International Nuclear Information System (INIS)

    1995-11-01

    Volume 2 of this report contains six appendices to the report: Inventory and generation of remote-handled transuranic waste; Remote-handled transuranic waste site storage; Characterization of remote-handled transuranic waste; RH-TRU waste treatment alternatives system analysis; Packaging and transportation study; and Remote-handled transuranic waste disposal alternatives

  5. Frequently updated noise threat maps created with use of supercomputing grid

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2014-09-01

    Full Text Available An innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed serviceswere developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers. Selected experimental results achieved by the usage of the services proposed were presented. The assessment of the environmental noise threats includes creation of the noise maps using either ofline or online data, acquired through a grid of the monitoring stations. A concept of estimation of the source model parameters based on the measured sound level for the purpose of creating frequently updated noise maps was presented. Connecting the noise mapping grid service with a distributed sensor network enables to automatically update noise maps for a specified time period. Moreover, a unique attribute of the developed software is the estimation of the auditory effects evoked by the exposure to noise. The estimation method uses a modified psychoacoustic model of hearing and is based on the calculated noise level values and on the given exposure period. Potential use scenarios of the grid services for research or educational purpose were introduced. Presentation of the results of predicted hearing threshold shift caused by exposure to excessive noise can raise the public awareness of the noise threats.

  6. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  7. Decentralised bioenergy systems: A review of opportunities and threats

    International Nuclear Information System (INIS)

    Mangoyana, Robert B.; Smith, Timothy F.

    2011-01-01

    Decentralised bioenergy systems are receiving increasing attention due to the potential ability to support local development, create local employment, and contribute to climate change mitigation. These issues, along with other bioenergy sustainability issues, are reviewed through eighteen international case studies with the objective of identifying opportunities and threats to decentralised bioenergy systems. The case studies were selected based on feedstock type, bioenergy type, production capacity, synergistic alliances, ownership structure and physical locations. This variation was used to provide a basis for evaluating opportunities and threats from different contexts. Commercial viability remains the primary concern for the sustainability of decentralised bioenergy systems. There are, however, opportunities for compounding benefits through integrating small scale decentralised bioenergy systems with other production systems. Integrated production, including closed loop models, allow waste materials from one process to be used as inputs in other production processes, and thereby increasing economic, social and environmental outcomes. Synergistic opportunities along the bioenergy production chain, which include feedstock production, bioenergy marketing and distribution could also be exploited by communities and other investors to minimise decentralised production risk. - Research Highlights: → Small scale decentralised bioenergy production is a potentially sustainable energy system. →Economic viability limits small scale decentralised bioenergy production. → Synergistic alliances along the bioenergy production chain could enhance viability.

  8. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  9. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  10. Environmental surveillance at Los Alamos during 1991. Environmental protection group

    Energy Technology Data Exchange (ETDEWEB)

    Dewart, J.; Kohen, K.L. [comps.

    1993-08-01

    This report describes the environmental surveillance program conducted by Los Alamos National Laboratory during 1991. Routine monitoring for radiation and for radioactive and chemical materials is conducted on the Laboratory site as well as in the surrounding region. Monitoring results are used to determine compliance with appropriate standards and to permit early identification of potentially undesirable trends. Results and interpretation of data for 1991 cover external penetrating radiation; quantities of airborne emissions and effluents; concentrations of chemicals and radionuclides in ambient air, surface waters and groundwaters, municipal water supply, soils and sediments, and foodstuffs; and environmental compliance. Comparisons with appropriate standards, regulations, and background levels provide the basis for concluding that environmental effects from Laboratory operations are small and do not pose a threat to the public, Laboratory employees, or the environment.

  11. Vehicle navigation in populated areas using predictive control with environmental uncertainty handling

    Directory of Open Access Journals (Sweden)

    Skrzypczyk Krzysztof

    2017-06-01

    Full Text Available This paper addresses the problem of navigating an autonomous vehicle using environmental dynamics prediction. The usefulness of the Game Against Nature formalism adapted to modelling environmental prediction uncertainty is discussed. The possibility of the control law synthesis on the basis of strategies against Nature is presented. The properties and effectiveness of the approach presented are verified by simulations carried out in MATLAB.

  12. A Study Of Environmental Impacts On The Coral Resources In The Vicinity Of The Saint Martin Island Bangladesh

    Directory of Open Access Journals (Sweden)

    Shaikh Sayed Ahammed

    2015-08-01

    Full Text Available A study of the environmental impacts on the coral resources in the vicinity of the Saint Martin Island Bangladesh was conducted with a view to making an assessment of the current status of coral resources in the island and identifying major natural and anthropogenic environmental threats to the future sustainability of these resources. It is evident that the coral resources have been reduced significantly and currently only 41 coral species are available. The existing environmental condition assessed by pH salinity turbidity and temperature in the island is not found responsible for the survival of the corals. The study also reveals that the major anthropogenic interventions are responsible for the gradual depletion of the coral resources. The major anthropogenic threats to the coral resources are coral collection and overfishing. In addition coral extraction is identified as a potential threat to the future integrity of coral communities in the island. Environmental threats from anthropogenic activities related to sedimentation land erosion and pollution are also the concerns for the coral communities in the island. For the conservation of the coral population no coral monitoring cell has been established in this island.

  13. DDOS ATTACK DETECTION SIMULATION AND HANDLING MECHANISM

    Directory of Open Access Journals (Sweden)

    Ahmad Sanmorino

    2013-11-01

    Full Text Available In this study we discuss how to handle DDoS attack that coming from the attacker by using detection method and handling mechanism. Detection perform by comparing number of packets and number of flow. Whereas handling mechanism perform by limiting or drop the packets that detected as a DDoS attack. The study begins with simulation on real network, which aims to get the real traffic data. Then, dump traffic data obtained from the simulation used for detection method on our prototype system called DASHM (DDoS Attack Simulation and Handling Mechanism. From the result of experiment that has been conducted, the proposed method successfully detect DDoS attack and handle the incoming packet sent by attacker.

  14. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  15. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  16. Identifying potential environmental impacts of waste handling strategies in textile industry.

    Science.gov (United States)

    Yacout, Dalia M M; Hassouna, M S

    2016-08-01

    Waste management is a successful instrument to minimize generated waste and improve environmental conditions. In spite of the large share of developing countries in the textile industry, limited information is available concerning the waste management strategies implemented for textiles on those countries and their environmental impacts. In the current study, two waste management approaches for hazardous solid waste treatment of acrylic fibers (landfill and incineration) were investigated. The main research questions were: What are the different impacts of each waste management strategy? Which waste management strategy is more ecofriendly? Life cycle assessment was employed in order to model the environmental impacts of each waste streaming approach separately then compare them together. Results revealed that incineration was the more ecofriendly approach. Highest impacts of both approaches were on ecotoxicity and carcinogenic potentials due to release of metals from pigment wastes. Landfill had an impact of 46.8 % on human health as compared to 28 % by incineration. Incineration impact on ecosystem quality was higher than landfill impact (68.4 and 51.3 %, respectively). As for resources category, incineration had a higher impact than landfill (3.5 and 2.0 %, respectively). Those impacts could be mitigated if state-of-the-art landfill or incinerator were used and could be reduced by applying waste to energy approaches for both management systems In conclusion, shifting waste treatment from landfill to incineration would decrease the overall environmental impacts and allow energy recovery. The potential of waste to energy approach by incineration with heat recovery could be considered in further studies. Future research is needed in order to assess the implementation of waste management systems and the preferable waste management strategies in the textile industry on developing countries.

  17. Ergonomics of disposable handles for minimally invasive surgery.

    Science.gov (United States)

    Büchel, D; Mårvik, R; Hallabrin, B; Matern, U

    2010-05-01

    The ergonomic deficiencies of currently available minimally invasive surgery (MIS) instrument handles have been addressed in many studies. In this study, a new ergonomic pistol handle concept, realized as a prototype, and two disposable ring handles were investigated according to ergonomic properties set by new European standards. In this study, 25 volunteers performed four practical tasks to evaluate the ergonomics of the handles used in standard operating procedures (e.g., measuring a suture and cutting to length, precise maneuvering and targeting, and dissection of a gallbladder). Moreover, 20 participants underwent electromyography (EMG) tests to measure the muscle strain they experienced while carrying out the basic functions (grasp, rotate, and maneuver) in the x, y, and z axes. The data measured included the number of errors, the time required for task completion, perception of pressure areas, and EMG data. The values for usability in the test were effectiveness, efficiency, and user satisfaction. Surveys relating to the subjective rating were completed after each task for each of the three handles tested. Each handle except the new prototype caused pressure areas and pain. Extreme differences in muscle strain could not be observed for any of the three handles. Experienced surgeons worked more quickly with the prototype when measuring and cutting a suture (approximately 20%) and during precise maneuvering and targeting (approximately 20%). On the other hand, they completed the dissection task faster with the handle manufactured by Ethicon. Fewer errors were made with the prototype in dissection of the gallbladder. In contrast to the handles available on the market, the prototype was always rated as positive by the volunteers in the subjective surveys. None of the handles could fulfil all of the requirements with top scores. Each handle had its advantages and disadvantages. In contrast to the ring handles, the volunteers could fulfil most of the tasks more

  18. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  19. Radiological safety aspects of handling plutonium

    International Nuclear Information System (INIS)

    Sundararajan, A.R.

    2016-01-01

    Department of Atomic Energy in its scheme of harnessing the nuclear energy for electrical power generation and strategic applications has given a huge role to utilization of plutonium. In the power production programme, fast reactors with plutonium as fuel are expected to play a major role. This would require establishing fuel reprocessing plants to handle both thermal and fast reactor fuels. So in the nuclear fuel cycle facilities variety of chemical, metallurgical, mechanical operations have to be carried out involving significant inventories of "2"3"9 Pu and associated radionuclides. Plutonium is the most radiotoxic radionuclide and therefore any facility handling it has to be designed and operated with utmost care. Two problems of major concern in the protection of persons working in plutonium handling facilities are the internal exposure to the operating personnel from uptake of plutonium and transplutonic nuclides as they are highly radiotoxic and the radiation exposure of hands and eye lens during fuel fabrication operations especially while handling recycled high burn up plutonium. In view of the fact that annual limit for intake is very small for "2"3"9Pu and its radiation emission characteristics are such that it is a huge challenge for the health physicists to detect Pu in air and in workers. This paper discusses the principles and practices followed in providing radiological surveillance to workers in plutonium handling areas. The challenges in protecting the workers from receiving exposures to hands and eye lens in handling high burn up plutonium are also discussed. The sites having Pu fuel cycle facilities should have trained medical staff to handle cases involving excessive intake of plutonium. (author)

  20. Enclosure for handling high activity materials

    International Nuclear Information System (INIS)

    Jimeno de Osso, F.

    1977-01-01

    One of the most important problems that are met at the laboratories producing and handling radioisotopes is that of designing, building and operating enclosures suitable for the safe handling of active substances. With this purpose in mind, an enclosure has been designed and built for handling moderately high activities under a shielding made of 150 mm thick lead. In this report a description is given of those aspects that may be of interest to people working in this field. (Author)

  1. Enclosure for handling high activity materials

    Energy Technology Data Exchange (ETDEWEB)

    Jimeno de Osso, F

    1977-07-01

    One of the most important problems that are met at the laboratories producing and handling radioisotopes is that of designing, building and operating enclosures suitable for the safe handling of active substances. With this purpose in mind, an enclosure has been designed and built for handling moderately high activities under a shielding made of 150 mm thick lead. In this report a description is given of those aspects that may be of interest to people working in this field. (Author)

  2. The Effect of Gentle Handling on Depressive-Like Behavior in Adult Male Mice: Considerations for Human and Rodent Interactions in the Laboratory

    OpenAIRE

    Neely, Caroline; Lane, Christina; Torres, Julio; Flinn, Jane

    2018-01-01

    Environmental factors play a significant role in well-being of laboratory animals. Regulations and guidelines recommend, if not require, that stressors such as bright lighting, smells, and noises are eliminated or reduced to maximize animal well-being. A factor that is often overlooked is handling and how researchers interact with their animals. Researchers, lab assistants, and husbandry staff in animal facilities may use inconsistent handling methods when interacting with rodents, but humans...

  3. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  4. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  5. Specialization and Flexibility in Port Cargo Handling

    Directory of Open Access Journals (Sweden)

    Hakkı KİŞİ

    2016-11-01

    Full Text Available Cargo handling appears to be the fundamental function of ports. In this context, the question of type of equipment and capacity rate need to be tackled with respect to cargo handling principles. The purpose of this study is to discuss the types of equipment to be used in ports, relating the matter to costs and capacity. The question is studied with a basic economic theoretical approach. Various conditions like port location, size, resources, cargo traffic, ships, etc. are given parameters to dictate the type and specification of the cargo handling equipment. Besides, a simple approach in the context of cost capacity relation can be useful in deciding whether to use specialized or flexible equipment. Port equipment is sometimes expected to be flexible to handle various types of cargo as many as possible and sometimes to be specialized to handle one specific type of cargo. The cases that might be suitable for those alternatives are discussed from an economic point of view in this article. Consequently, effectiveness and efficiency criteria play important roles in determining the handling equipment in ports.

  6. Environmental radiation data, 7

    International Nuclear Information System (INIS)

    Nagaoka, Toshi; Sakamoto, Ryuichi; Saito, Kimiaki; Tsutsumi, Masahiro; Moriuchi, Shigeru

    1989-10-01

    The Environmental Radiation Physics Laboratory has conducted a large number of background radiation surveys in these years, aiming at the analysis of characteristics and behaviour of environmental radiation, the development of measurement techniques and instruments of environmental radiation, and the evaluation of environmental radiation dose. The environmental radiation data obtained by these surveys are useful for broad purposes as actual survey data. Therefore, it is desirable to make the recording media and the FORMAT of these data available for usual computers. In the light of this circumstance, these data were rearranged and recompiled systematically to meet the demand. This report mentions about the data obtained by the background radiation surveys in and around Tokyo performed during 1982 - 1988 using portable instruments, as well as the information necessary for the data handling. (author)

  7. HMSRP Hawaiian Monk Seal Handling Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set contains records for all handling and measurement of Hawaiian monk seals since 1981. Live seals are handled and measured during a variety of events...

  8. Assessment of the threat from diverted radioactive material and 'orphan sources' - An international comparison

    International Nuclear Information System (INIS)

    Steinhausler, F.

    2001-01-01

    Full text: Multiple international activities have been undertaken to contain the trafficking of weapons-usable material in order to reduce the risk from the proliferation of such material. In addition, over the past decade the issue of unintended handling and transport of radioactive material has become increasingly important. Concurrent with the growing number of radioactive sources in industry, medicine, agriculture and research, the probability for losing control over such sources increases as well ('orphan sources'). The potential impact on society and the environment from these two categories of threat has been documented extensively in the literature. In this study representatives from 11 countries in the Americas, Europe and Asia-Pacific formed a network to exchange information concerning nuclear and other radioactive material on the following topic areas: Legislation and regulatory practices for the production, processing, handling, use, holding, storage, transport, import, and export; History of site-specific non-compliance and enforcement actions, as well as punitive actions; National approach for handling the issue of orphan sources; The role of national security forces; Managerial and technical procedures to ensure material inventory control and accountancy; Aspects of physical protection on-site and during transport; Technical/scientific expertise and equipment available at the national level to detect, identify and quantify such material in the field; Level of practical implementation of technical equipment to detect such material at border crossings, airports, railway stations, and mail distribution centres; Cases of seizure of nuclear and contaminated materials, illegal sales and fraud; Training programmes available for preventing, detecting and responding to the loss of control. The results of the analysis show that, despite several international consensus documents and supporting legislation, in several cases major additional efforts are needed

  9. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  10. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  11. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  12. Environmental impact assessment of waste electronic and electric ...

    African Journals Online (AJOL)

    Wuhib.Z

    Key words: Printed circuit boards (PCBs), e-waste, leaching tests, heavy metals, ..... Maximum leachability (in mg/kg) of metals versus leaching test methods (all tests were in triplicate). and c) ..... Environmental threats of discarded picture tubes.

  13. Management of transport and handling contracts

    CERN Document Server

    Rühl, I

    2004-01-01

    This paper shall outline the content, application and management strategies for the various contracts related to transport and handling activities. In total, the two sections Logistics and Handling Maintenance are in charge of 27 (!) contracts ranging from small supply contracts to big industrial support contracts. The activities as well as the contracts can generally be divided into four main topics "Vehicle Fleet Management"; "Supply, Installation and Commissioning of Lifting and Hoisting Equipment"; "Equipment Maintenance" and "Industrial Support for Transport and Handling". Each activity and contract requires different approaches and permanent adaptation to the often changing CERN's requirements. In particular, the management and the difficulties experienced with the contracts E072 "Maintenance of lifting and hoisting equipment", F420 "Supply of seven overhead traveling cranes for LHC" and S090/S103 "Industrial support for transport and handling" will be explained in detail.

  14. Gallon Model for the evaluation of environmental impacts

    International Nuclear Information System (INIS)

    Gallon Martinez, Juan Carlos

    2003-01-01

    When it is necessary to know the impact grade that will have the environment for the introduction of a project or handling plan, it is appealed to a study of environmental impact that quantifies variables of qualitative type to obtain results of quantitative type. The evaluation of environmental impacts is necessary to know which phases or actions of the different projects have negative or positive repercussions or far-reaching about the different susceptible environmental factors to receive impacts, and to determine previously, the most important aspects to determine the level of impact of the projects or handling plans. The evaluation measures the repercussions and consequences of the different activities of the industry on the environment, allowing to evaluate the future conditions of the habitat, being an excellent tool for making decisions regarding the possible future impact that can have an industrial process or project to diminish the nature

  15. Ergonomics: safe patient handling and mobility.

    Science.gov (United States)

    Hallmark, Beth; Mechan, Patricia; Shores, Lynne

    2015-03-01

    This article reviews and investigates the issues surrounding ergonomics, with a specific focus on safe patient handling and mobility. The health care worker of today faces many challenges, one of which is related to the safety of patients. Safe patient handling and mobility is on the forefront of the movement to improve patient safety. This article reviews the risks associated with patient handling and mobility, and informs the reader of current evidence-based practice relevant to this area of care. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Environmental Risk Assessment System for Phosphogypsum Tailing Dams

    OpenAIRE

    Xin Sun; Ping Ning; Xiaolong Tang; Honghong Yi; Kai Li; Lianbi Zhou; Xianmang Xu

    2013-01-01

    This paper may be of particular interest to the readers as it provides a new environmental risk assessment system for phosphogypsum tailing dams. In this paper, we studied the phosphogypsum tailing dams which include characteristics of the pollution source, environmental risk characteristics and evaluation requirements to identify the applicable environmental risk assessment methods. Two analytical methods, that is, the analytic hierarchy process (AHP) and fuzzy logic, were used to handle the...

  17. Environmental management: A system approach

    Science.gov (United States)

    Petak, William J.

    1981-05-01

    This paper presents a system framework whose purpose is to improve understanding of environmental management. By analyzing the links between elements of the environmental management system, it is possible to construct a model that aids thinking systematically about the decision-making subsystem, and other subsystems, of the entire environmental management system. Through a multidisciplinary environmental approach, each of the individual subsystems is able to adapt to threats and opportunities. The fields of government, market economics, social responsibility and ecology, for example, are so complex that it is extremely difficult to develop a framework that gives full consideration to all aspects. This paper, through the application of a highly idealized system framework, attempts to show the general relationships that exist between complex system elements.

  18. Remote handling equipment

    International Nuclear Information System (INIS)

    Clement, G.

    1984-01-01

    After a definition of intervention, problems encountered for working in an adverse environment are briefly analyzed for development of various remote handling equipments. Some examples of existing equipments are given [fr

  19. Responses to professional identity threat: Identity management strategies in incident narratives of health care professionals.

    Science.gov (United States)

    van Os, Annemiek; de Gilder, Dick; van Dyck, Cathy; Groenewegen, Peter

    2015-01-01

    The purpose of this paper is to explore sensemaking of incidents by health care professionals through an analysis of the role of professional identity in narratives of incidents. Using insights from social identity theory, the authors argue that incidents may create a threat of professional identity, and that professionals make use of identity management strategies in response to this identity threat. The paper draws on a qualitative analysis of incident narratives in 14 semi-structured interviews with physicians, nurses, and residents at a Dutch specialist hospital. The authors used an existing framework of identity management strategies to categorize the narratives. The analysis yielded two main results. First, nurses and residents employed multiple types of identity management strategies simultaneously, which points to the possible benefit of combining different strategies. Second, physicians used the strategy of patronization of other professional groups, a specific form of downward comparison. The authors discuss the implications of the findings in terms of the impact of identity management strategies on the perpetuation of hierarchical differences in health care. The authors argue that efforts to manage incident handling may profit from considering social identity processes in sensemaking of incidents. This is the first study that systematically explores how health care professionals use identity management strategies to maintain a positive professional identity in the face of incidents. This study contributes to research on interdisciplinary cooperation in health care.

  20. Ground beef handling and cooking practices in restaurants in eight States.

    Science.gov (United States)

    Bogard, April K; Fuller, Candace C; Radke, Vincent; Selman, Carol A; Smith, Kirk E

    2013-12-01

    Eating in table-service restaurants has been implicated as a risk factor for Escherichia coli O157:H7 infection. To explore this association and learn about the prevalence of risky ground beef preparation practices in restaurants, the Environmental Health Specialists Network (EHS-Net) assessed ground beef handling policies and practices in restaurants in California, Colorado, Connecticut, Georgia, Minnesota, New York, Oregon, and Tennessee. Eligible restaurants prepared and served hamburgers. EHS-Net specialists interviewed a restaurant employee with authority over the kitchen (defined as the manager) using a standard questionnaire about food safety policies, hamburger preparation policies, and use of irradiated ground beef. Interviews were followed by observations of ground beef preparation. Data from 385 restaurants were analyzed: 67% of the restaurants were independently owned and 33% were chain restaurants; 75% of the restaurants were sit down, 19% were quick service or fast food, and 6% were cafeteria or buffet restaurants. Eighty-one percent of restaurants reported determining doneness of hamburgers by one or more subjective measures, and 49% reported that they never measure the final cook temperatures of hamburgers. At least two risky ground beef handling practices were observed in 53% of restaurants. Only 1% of restaurants reported purchasing irradiated ground beef, and 29% were unfamiliar with irradiated ground beef. Differences in risky ground beef handling policies and practices were noted for type of restaurant ownership (independently owned versus chain) and type of food service style (sit down versus quick service or fast food). This study revealed the pervasiveness of risky ground beef handling policies and practices in restaurants and the need for educational campaigns targeting food workers and managers. These results highlight the importance of continued efforts to reduce the prevalence of E. coli O157:H7 in ground beef.

  1. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  2. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  3. Welding method by remote handling

    International Nuclear Information System (INIS)

    Hashinokuchi, Minoru.

    1994-01-01

    Water is charged into a pit (or a water reservoir) and an article to be welded is placed on a support in the pit by remote handling. A steel plate is disposed so as to cover the article to be welded by remote handling. The welding device is positioned to the portion to be welded and fixed in a state where the article to be welded is shielded from radiation by water and the steel plate. Water in the pit is drained till the portion to be welded is exposed to the atmosphere. Then, welding is conducted. After completion of the welding, water is charged again to the pit and the welding device and fixing jigs are decomposed in a state where the article to be welded is shielded again from radiation by water and the steel plate. Subsequently, the steel plate is removed by remote handling. Then, the article to be welded is returned from the pit to a temporary placing pool by remote handling. This can reduce operator's exposure. Further, since the amount of the shielding materials can be minimized, the amount of radioactive wastes can be decreased. (I.N.)

  4. Oceania's most pressing environmental concerns

    International Nuclear Information System (INIS)

    Dahl, A.L.

    1984-01-01

    The islands and coastal waters of Oceania are unique eco-systems. The characteristics which set them apart, however, also make them vulnerable to a wide range of environmental threats. This article provides an overview of the various regional and localized problems in the South Pacific and outlines the principles for sustained use of island resources

  5. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  6. Global Environmental Change: What Can Health Care Providers and the Environmental Health Community Do About It Now?

    Science.gov (United States)

    Schwartz, Brian S.; Parker, Cindy; Glass, Thomas A.; Hu, Howard

    2006-01-01

    The debate about whether global environmental change is real is now over; in its wake is the realization that it is happening more rapidly than predicted. These changes constitute a profound challenge to human health, both as a direct threat and as a promoter of other risks. We call on health care providers to inform themselves about these issues and to become agents of change in their communities. It is our responsibility as clinicians to educate patients and their communities on the connections between regressive policies, unsustainable behaviors, global environmental changes, and threats to health and security. We call on professional organizations to assist in educating their members about these issues, in helping clinicians practice behavior change with their patients, and in adding their voices to this issue in our statehouses and Congress. We call for the development of carbon- and other environmental-labeling of consumer products so individuals can make informed choices; we also call for the rapid implementation of policies that provide tangible economic incentives for choosing environmentally sustainable products and services. We urge the environmental health community to take up the challenge of developing a global environmental health index that will incorporate human health into available “planetary health” metrics and that can be used as a policy tool to evaluate the impact of interventions and document spatial and temporal shifts in the healthfulness of local areas. Finally, we urge our political, business, public health, and academic leaders to heed these environmental warnings and quickly develop regulatory and policy solutions so that the health of populations and the integrity of their environments will be ensured for future generations. PMID:17185267

  7. Global environmental change: what can health care providers and the environmental health community do about it now?

    Science.gov (United States)

    Schwartz, Brian S; Parker, Cindy; Glass, Thomas A; Hu, Howard

    2006-12-01

    The debate about whether global environmental change is real is now over; in its wake is the realization that it is happening more rapidly than predicted. These changes constitute a profound challenge to human health, both as a direct threat and as a promoter of other risks. We call on health care providers to inform themselves about these issues and to become agents of change in their communities. It is our responsibility as clinicians to educate patients and their communities on the connections between regressive policies, unsustainable behaviors, global environmental changes, and threats to health and security. We call on professional organizations to assist in educating their members about these issues, in helping clinicians practice behavior change with their patients, and in adding their voices to this issue in our statehouses and Congress. We call for the development of carbon and other environmental-labeling of consumer products so individuals can make informed choices; we also call for the rapid implementation of policies that provide tangible economic incentives for choosing environmentally sustainable products and services. We urge the environmental health community to take up the challenge of developing a global environmental health index that will incorporate human health into available "planetary health" metrics and that can be used as a policy tool to evaluate the impact of interventions and document spatial and temporal shifts in the healthfulness of local areas. Finally, we urge our political, business, public health, and academic leaders to heed these environmental warnings and quickly develop regulatory and policy solutions so that the health of populations and the integrity of their environments will be ensured for future generations.

  8. Healthy communities: addressing vulnerability and environmental health

    CSIR Research Space (South Africa)

    Wright, C

    2009-01-01

    Full Text Available Air pollution in South Africa is a serious environmental health threat, particularly in urban and peri-urban metropolitan areas, but also in low income settlements where indoor air pollution from domestic fuel use is a concern. A healthy population...

  9. Adapting to and coping with the threat and impacts of climate change.

    Science.gov (United States)

    Reser, Joseph P; Swim, Janet K

    2011-01-01

    This article addresses the nature and challenge of adaptation in the context of global climate change. The complexity of "climate change" as threat, environmental stressor, risk domain, and impacting process with dramatic environmental and human consequences requires a synthesis of perspectives and models from diverse areas of psychology to adequately communicate and explain how a more psychological framing of the human dimensions of global environmental change can greatly inform and enhance effective and collaborative climate change adaptation and mitigation policies and research. An integrative framework is provided that identifies and considers important mediating and moderating parameters and processes relating to climate change adaptation, with particular emphasis given to environmental stress and stress and coping perspectives. This psychological perspective on climate change adaptation highlights crucial aspects of adaptation that have been neglected in the arena of climate change science. Of particular importance are intra-individual and social "psychological adaptation" processes that powerfully mediate public risk perceptions and understandings, effective coping responses and resilience, overt behavioral adjustment and change, and psychological and social impacts. This psychological window on climate change adaptation is arguably indispensable to genuinely multidisciplinary and interdisciplinary research and policy initiatives addressing the impacts of climate change.

  10. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  11. Civilsamfundets ABC: H for Handling

    DEFF Research Database (Denmark)

    Lund, Anker Brink; Meyer, Gitte

    2015-01-01

    Hvad er civilsamfundet? Anker Brink Lund og Gitte Meyer fra CBS Center for Civil Society Studies gennemgår civilsamfundet bogstav for bogstav. Vi er nået til H for Handling.......Hvad er civilsamfundet? Anker Brink Lund og Gitte Meyer fra CBS Center for Civil Society Studies gennemgår civilsamfundet bogstav for bogstav. Vi er nået til H for Handling....

  12. The technique on handling radiation

    International Nuclear Information System (INIS)

    1997-11-01

    This book describes measurement of radiation and handling radiation. The first part deals with measurement of radiation. The contents of this part are characteristic on measurement technique of radiation, radiation detector, measurement of energy spectrum, measurement of radioactivity, measurement for a level of radiation and county's statistics on radiation. The second parts explains handling radiation with treating of sealed radioisotope, treating unsealed source and radiation shield.

  13. Uranium hexafluoride handling

    International Nuclear Information System (INIS)

    1991-01-01

    The United States Department of Energy, Oak Ridge Field Office, and Martin Marietta Energy Systems, Inc., are co-sponsoring this Second International Conference on Uranium Hexafluoride Handling. The conference is offered as a forum for the exchange of information and concepts regarding the technical and regulatory issues and the safety aspects which relate to the handling of uranium hexafluoride. Through the papers presented here, we attempt not only to share technological advances and lessons learned, but also to demonstrate that we are concerned about the health and safety of our workers and the public, and are good stewards of the environment in which we all work and live. These proceedings are a compilation of the work of many experts in that phase of world-wide industry which comprises the nuclear fuel cycle. Their experience spans the entire range over which uranium hexafluoride is involved in the fuel cycle, from the production of UF 6 from the naturally-occurring oxide to its re-conversion to oxide for reactor fuels. The papers furnish insights into the chemical, physical, and nuclear properties of uranium hexafluoride as they influence its transport, storage, and the design and operation of plant-scale facilities for production, processing, and conversion to oxide. The papers demonstrate, in an industry often cited for its excellent safety record, continuing efforts to further improve safety in all areas of handling uranium hexafluoride

  14. Knowledge and Attitudes towards Handling Eggs in the Home: An Unexplored Food Safety Issue?

    Science.gov (United States)

    Whiley, Harriet; Clarke, Beverley; Ross, Kirstin

    2017-01-06

    Foodborne illness is a global public health issue, with food handling in the home identified as an underestimated source. In Australia, there has been a significant increase in the incidence of salmonellosis with the majority of outbreaks linked to eggs. This study investigated Australian eggs consumer attitudes, behaviours and risk perceptions associated with the handling of raw eggs in the home. It was identified that 67% of participants chose free range eggs, 11% kept poultry, 7% did not have any preference, 7% cage eggs, 4% barn eggs, 2% organic eggs and 1% pasteurized eggs. The majority of participants (91%) reported they stored eggs in the fridge. It was identified that there is an underestimation of "risky behaviour" associated with the consumption of raw eggs in the home, as 84% of participants indicated that they did not consume raw eggs, but subsequently 86% indicated that they had eaten mixture/batter containing raw eggs. Participants' responses relating to food safety were also examined in relation to their profession and gender. Safer food handling practices were identified by Environmental Health Officers (EHO) and Food handlers compared to all other professions ( p 0.05) their responses.

  15. Environmental program audit, Paducah Gaseous Diffusion Plant, Paducah, Kentucky. Final report

    International Nuclear Information System (INIS)

    1985-08-01

    The environmental monitoring program, environmental control equipment and its use, and the facility's compliance with DOE orders, Federal and State laws and regulations were evaluated in this audit. No imminent threat to public health and safety was discovered. A needed quality assurance program is being added. Recommendations are given

  16. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  17. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  18. Radioactive and mixed waste management plan for the Lawrence Berkeley Laboratory Hazardous Waste Handling Facility

    International Nuclear Information System (INIS)

    1995-01-01

    This Radioactive and Mixed Waste Management Plan for the Hazardous Waste Handling Facility at Lawrence Berkeley Laboratory is written to meet the requirements for an annual report of radioactive and mixed waste management activities outlined in DOE Order 5820.2A. Radioactive and mixed waste management activities during FY 1994 listed here include principal regulatory and environmental issues and the degree to which planned activities were accomplished

  19. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  20. Early handling effect on female rat spatial and non-spatial learning and memory.

    Science.gov (United States)

    Plescia, Fulvio; Marino, Rosa A M; Navarra, Michele; Gambino, Giuditta; Brancato, Anna; Sardo, Pierangelo; Cannizzaro, Carla

    2014-03-01

    This study aims at providing an insight into early handling procedures on learning and memory performance in adult female rats. Early handling procedures were started on post-natal day 2 until 21, and consisted in 15 min, daily separations of the dams from their litters. Assessment of declarative memory was carried out in the novel-object recognition task; spatial learning, reference- and working memory were evaluated in the Morris water maze (MWM). Our results indicate that early handling induced an enhancement in: (1) declarative memory, in the object recognition task, both at 1h and 24h intervals; (2) reference memory in the probe test and working memory and behavioral flexibility in the "single-trial and four-trial place learning paradigm" of the MWM. Short-term separation by increasing maternal care causes a dampening in HPA axis response in the pups. A modulated activation of the stress response may help to protect brain structures, involved in cognitive function. In conclusion, this study shows the long-term effects of a brief maternal separation in enhancing object recognition-, spatial reference- and working memory in female rats, remarking the impact of early environmental experiences and the consequent maternal care on the behavioral adaptive mechanisms in adulthood. Copyright © 2013 Elsevier B.V. All rights reserved.

  1. Handling Pyrophoric Reagents

    Energy Technology Data Exchange (ETDEWEB)

    Alnajjar, Mikhail S.; Haynie, Todd O.

    2009-08-14

    Pyrophoric reagents are extremely hazardous. Special handling techniques are required to prevent contact with air and the resulting fire. This document provides several methods for working with pyrophoric reagents outside of an inert atmosphere.

  2. How does co-product handling affect the carbon footprint of milk? Case study of milk production in New Zealand and Sweden

    DEFF Research Database (Denmark)

    Flysjö, Anna Maria; Cederberg, Christel; Henriksson, Maria

    2011-01-01

    Purpose This paper investigates different methodologies of handling co-products in life cycle assessment (LCA) or carbon footprint (CF) studies. Co-product handling can have a significant effect on final LCA/CF results, and although there are guidelines on the preferred order for different methods...... (when slaughtered), calves, manure, hides, etc., the environmental burden (here GHG emissions) must be distributed between these outputs (in the present study no emissions are attributed to hides specifically, or to manure which is recycled on-farm). Different methodologically approaches, (1) system...

  3. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  4. Facing global environmental change. Environmental, human, energy, food, health and water security concepts

    Energy Technology Data Exchange (ETDEWEB)

    Brauch, Hans Guenter [Freie Univ. Berlin (Germany). Dept. of Political and Social Sciences; United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); AFES-Press, Mosbach (Germany); Oswald Spring, Ursula [National Univ. of Mexico (UNAM), Cuernavaca, MOR (MX). Centro Regional de Investigaciones Multidiscipinarias (CRIM); United Nations Univ., Bonn (DE). Inst. for Environment and Human Security (UNU-EHS); Grin, John [Amsterdam Univ. (Netherlands). Amsterdam School for Social Science Research; Mesjasz, Czeslaw [Cracow Univ. of Economics (Poland). Faculty of Management; Kameri-Mbote, Patricia [Nairobi Univ. (Kenya). School of Law; International Environmental Law Research Centre, Nairobi (Kenya); Behera, Navnita Chadha [Jamia Millia Islamia Univ., New Delhi (India). Nelson Mandela Center for Peace and Conflict Resolution; Chourou, Bechir [Tunis-Carthage Univ., Hammam-Chatt (Tunisia); Krummenacher, Heinz (eds.) [swisspeace, Bern (Switzerland). FAST International

    2009-07-01

    This policy-focused, global and multidisciplinary security handbook on Facing Global Environmental Change addresses new security threats of the 21st century posed by climate change, desertification, water stress, population growth and urbanization. These security dangers and concerns lead to migration, crises and conflicts. They are on the agenda of the UN, OECD, OSCE, NATO and EU. In 100 chapters, 132 authors from 49 countries analyze the global debate on environmental, human and gender, energy, food, livelihood, health and water security concepts and policy problems. In 10 parts they discuss the context and the securitization of global environmental change and of extreme natural and societal outcomes. They suggest a new research programme to move from knowledge to action, from reactive to proactive policies and to explore the opportunities of environ-mental cooperation for a new peace policy. (orig.)

  5. ATA diagnostic data handling system: an overview

    International Nuclear Information System (INIS)

    Chambers, F.W.; Kallman, J.; McDonald, J.; Slominski, M.

    1984-01-01

    The functions to be performed by the ATA diagnostic data handling system are discussed. The capabilities of the present data acquisition system (System 0) are presented. The goals for the next generation acquisition system (System 1), currently under design, are discussed. Facilities on the Octopus system for data handling are reviewed. Finally, we discuss what has been learned about diagnostics and computer based data handling during the past year

  6. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  7. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  8. Nuclear threats and emergency preparedness in Finland; Ydinuhkat ja varautuminen

    Energy Technology Data Exchange (ETDEWEB)

    Mustonen, R; Aaltonen, H; Laaksonen, J; Lahtinen, J; Rantavaara, A; Reponen, H; Rytoemaa, T; Suomela, M; Toivonen, H; Varjoranta, T

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.).

  9. Environmental Protection: a shifting focus

    NARCIS (Netherlands)

    Dr. ir. Jan Venselaar

    2004-01-01

    The last two decades have seen a fundamental change in the way chemistry handles environmental issues. A shift in focus has occurred from 'end-of-pipe' to prevention and process integration. Presently an even more fundamental change is brought about by the need for sustainable development. It is

  10. Intracerebral beta-endorphin, met-enkephalin and morphine: kindling of seizures and handling-induced potentiation of epileptiform effects.

    Science.gov (United States)

    Cain, D P; Corcoran, M E

    1984-06-18

    The effects of repeated infusion of small, initially subconvulsive amounts of beta-endorphin, met-enkephalin or morphine sulfate into the amygdala and hippocampus were investigated. beta-endorphin and met-enkephalin evoked epileptiform spiking when infused into the posterior amygdala or ventral hippocampus. Morphine evoked epileptiform spiking when infused into the anterior amygdala. Naloxone blocked or terminated the spiking. Repetition of the infusions led to the gradual development of bilateral generalized convulsions by beta-endorphin and met-enkephalin and to the development of tolerance to morphine. An unexpected observation was that handling, immobilization or conspecific threat potentiated the epileptiform effects of beta-endorphin and morphine in many cases. These results suggest that endogenous opiate mechanisms might play a role in convulsive seizures and that stressful stimuli can exacerbate opiate seizures.

  11. Automation of 3D micro object handling process

    DEFF Research Database (Denmark)

    Gegeckaite, Asta; Hansen, Hans Nørgaard

    2007-01-01

    Most of the micro objects in industrial production are handled with manual labour or in semiautomatic stations. Manual labour usually makes handling and assembly operations highly flexible, but slow, relatively imprecise and expensive. Handling of 3D micro objects poses special challenges due to ...

  12. Management of radioactive waste in nuclear power: handling of irradiated graphite from water-cooled graphite reactors

    International Nuclear Information System (INIS)

    Anfimov, S.S.

    2001-01-01

    In this paper an radioactive waste processing of graphite from graphite moderated nuclear reactors at its decommissioning is discussed. Methods of processing of irradiated graphite are presented. It can be concluded that advanced methods for graphite radioactive waste handling are available nowadays. Implementation of these methods will allow to enhance environmental safety of nuclear power that will benefit its progress in the future

  13. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  14. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  15. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  16. Scheduling of outbound luggage handling at airports

    DEFF Research Database (Denmark)

    Barth, Torben C.; Pisinger, David

    2012-01-01

    This article considers the outbound luggage handling problem at airports. The problem is to assign handling facilities to outbound flights and decide about the handling start time. This dynamic, near real-time assignment problem is part of the daily airport operations. Quality, efficiency......). Another solution method is a decomposition approach. The problem is divided into different subproblems and solved in iterative steps. The different solution approaches are tested on real world data from Frankfurt Airport....

  17. Sequence trajectory generation for garment handling systems

    OpenAIRE

    Liu, Honghai; Lin, Hua

    2008-01-01

    This paper presents a novel generic approach to the planning strategy of garment handling systems. An assumption is proposed to separate the components of such systems into a component for intelligent gripper techniques and a component for handling planning strategies. Researchers can concentrate on one of the two components first, then merge the two problems together. An algorithm is addressed to generate the trajectory position and a clothes handling sequence of clothes partitions, which ar...

  18. Enhanced wood fuel handling: market and design studies

    Energy Technology Data Exchange (ETDEWEB)

    Landen, R.; Rippengal, R.; Redman, A.N.

    1997-09-01

    This report examines the potential for the manufacture and sale of novel wood fuel handling systems as a means of addressing users' concerns regarding current capital costs and potential high labour costs of non-automated systems. The report considers fuel handling technology that is basically appropriate for wood-fired heating systems of between c.100kW and c.1MW maximum continuous rating. This report details work done by the project collaborators in order to: (1) assess the current status of wood fuel handling technology; (2) evaluate the market appetite for improved wood fuel handling technology; (3) derive capital costs which are acceptable to customers; (4) review design options; and (5) select one or more design options worthy of further development. The current status of wood fuel handling technology is determined, and some basic modelling to give guidance on acceptable capital costs of 100-1000kW wood fuel handling systems is undertaken. (author)

  19. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  20. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  1. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  2. Development of remote handling technology for nuclear fuel cycle facilities in Japan

    International Nuclear Information System (INIS)

    Maekawa, Hiromichi; Sakai, Akira; Miura, Noriaki; Kozaka, Tetsuo; Hamada, Takashi

    2015-01-01

    Remote handling technology has been systematically developed for nuclear fuel cycle facilities in Japan since 1970s, primarily in parallel with the development of reprocessing and HLLW (High Level Liquid Waste) vitrification process. In case of reprocessing and vitrification process to handle highly radioactive and hazardous materials, the most of components are installed in the radiation shielded hot cells and operators are not allowed to enter the work area in the cells for operation and maintenance. Therefore, a completely remote handling system is adopted for the cells to reduce radiation doses of operators and increase the availability of the facility. The hot cells are generally designed considering the scale of components (laboratory, demonstration, or full-scale), the function of the systems (chemical process, material handling, dismantling, decontamination, or chemical analysis), and the environmental conditions (radiation dose rate, airborne concentration, surface contamination, or fume/mist/dust). Throughout our domestic development work for remote handling technology, the concept of the large scale integrated cell has been adopted rather than a number of small scale separated cells, for the reasons to reduce the total installation space and the number of remote handling equipment required for the each cell as much as possible. In our domestic remote maintenance design, several new concepts have been developed, tested, and demonstrated in the Tokai Virtrification Facility (TVF) and the Rokkasho HLLW Vitrification and Storage Facility (K-facility). Layout in the hot cells, the performance of remote handling equipment, and the structure of the in-cell components are important factors for remote maintenance design. In case of TVF (hot tests started in 1995), piping and vessels are prefabricated in the rack modules and installed in two lines on both sides of the cell. These modules are designed to be remotely replaced in the whole rack. Two overhead cranes

  3. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  4. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  5. Remote handling for an ISIS target change

    International Nuclear Information System (INIS)

    Broome, T.A.; Holding, M.

    1989-01-01

    During 1987 two ISIS targets were changed. This document describes the main features of the remote handling aspects of the work. All the work has to be carried out using remote handling techniques. The radiation level measured on the surface of the reflector when the second target had been removed was about 800 mGy/h demonstrating that hands on operations on any part of the target reflector moderator assembly is not practical. The target changes were the first large scale operations in the Target Station Remote Handling Cell and a great deal was learned about both equipment and working practices. Some general principles emerged which are applicable to other active handling tasks on facilities like ISIS and these are discussed below. 8 figs

  6. Fuzzy ABC: modeling the uncertainty in environmental cost allocation

    OpenAIRE

    Borba, José Alonso; Murcia, Fernando Dal Ri; Maior, Cesar Duarte Souto

    2007-01-01

    In many cases, preventing pollution and environmental destruction is cheaper than remedying these damages. In this sense, environmental cost allocation enables a better visualization and analysis of a product's profitability. However, the environmental allocation process involves estimated information and assumes linearity between activity consumption and product that is not real in many cases. In order to handle this not-linearity, this research presents a methodology based on fuzzy logic co...

  7. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  8. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  9. Materials Handling. Module SH-01. Safety and Health.

    Science.gov (United States)

    Center for Occupational Research and Development, Inc., Waco, TX.

    This student module on materials handling is one of 50 modules concerned with job safety and health. It presents the procedures for safe materials handling. Discussed are manual handling methods (lifting and carrying by hand) and mechanical lifting (lifting by powered trucks, cranes or conveyors). Following the introduction, 15 objectives (each…

  10. Incorporating Handling Qualities Analysis into Rotorcraft Conceptual Design

    Science.gov (United States)

    Lawrence, Ben

    2014-01-01

    This paper describes the initial development of a framework to incorporate handling qualities analyses into a rotorcraft conceptual design process. In particular, the paper describes how rotorcraft conceptual design level data can be used to generate flight dynamics models for handling qualities analyses. Also, methods are described that couple a basic stability augmentation system to the rotorcraft flight dynamics model to extend analysis to beyond that of the bare airframe. A methodology for calculating the handling qualities characteristics of the flight dynamics models and for comparing the results to ADS-33E criteria is described. Preliminary results from the application of the handling qualities analysis for variations in key rotorcraft design parameters of main rotor radius, blade chord, hub stiffness and flap moment of inertia are shown. Varying relationships, with counteracting trends for different handling qualities criteria and different flight speeds are exhibited, with the action of the control system playing a complex part in the outcomes. Overall, the paper demonstrates how a broad array of technical issues across flight dynamics stability and control, simulation and modeling, control law design and handling qualities testing and evaluation had to be confronted to implement even a moderately comprehensive handling qualities analysis of relatively low fidelity models. A key outstanding issue is to how to 'close the loop' with an overall design process, and options for the exploration of how to feedback handling qualities results to a conceptual design process are proposed for future work.

  11. Enclosure for handling high activity materials abstract

    International Nuclear Information System (INIS)

    Jimeno de Osso, F.; Dominguez Rodriguez, G.; Cruz Castillo, F. de la; Rodriguez Esteban, A.

    1977-01-01

    One of the most important problems that are met at the laboratories producing and handling radioisotopes is that of designing, building and operating enclosures suitable for the safe handling of active substances. With that purpose in mind, an enclosure has been designed and built for handling moderately high activities under a shielding made of 150 mm thick lead. A description is given of those aspects that may be of interest to people working in this field. (author) [es

  12. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  13. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  14. Site environmental report for 1991

    International Nuclear Information System (INIS)

    Cassady, C.K.; Gordon, K.W.; Holland, R.C.

    1992-01-01

    This report describes the results of the Environmental Protection Program conducted at Sandia National Laboratories, Livermore, in calendar year 1991. This program routinely monitors radioactive and chemical materials at the Sandia site and in the surrounding area. The Environmental Protection Department of SNL, Livermore, prepared this report in accordance with the requirements of Department of Energy Orders 5484.1 and 5400.1. It documents, evaluates, and interprets effluent and environmental monitoring data. These data are used in part to determine Sandia's compliance with environmental laws and regulations. Much of the off-site monitoring data presented in this report has been collected by Lawrence Livermore National Laboratory (LLNL), which provides off-site environmental monitoring for both facilities. The Environmental Monitoring Program at SNL, Livermore, augments LLNL's program by performing on-site and perimeter monitoring, and by monitoring airborne and liquid effluents. Based on comparison to appropriate safety standards and background measurements, operations at SNL, Livermore, in 1991 posed no significant threat to the public or the environment

  15. Site environmental report for 1990

    International Nuclear Information System (INIS)

    Brekke, D.D.

    1991-01-01

    This report describes the results of the Environmental Monitoring Program conducted at Sandia National Laboratories, Livermore, in calendar year 1990. This program routinely monitors radioactive and chemical materials at the Sandia site and in the surrounding area. The Environmental Protection Division of SNL, Livermore, prepared this report in accordance with the requirements of Department of Energy Orders 5484.1 and 5400.1. It documents, evaluates, and interprets effluent and environmental monitoring data. These data are used to determine Sandia's compliance with environmental laws and regulations. Much of the off-site monitoring data presented in this report has been collected by Lawrence Livermore National Laboratory (LLNL), which provides off-site environmental monitoring for both facilities. The Environmental Monitoring Program at SNL, Livermore, augments LLNL's program by performing on-site and perimeter monitoring, and by monitoring airborne and liquid effluents. Based on comparison to appropriate safety standards and background measurements, operations at SNL, Livermore, in 1990 posed no significant threat to Laboratory employees, the public, or the environment

  16. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  17. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  18. Environmental report for 1989

    International Nuclear Information System (INIS)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Brown, M.G.; Gallegos, G.M.

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance efforts for 1989. To enable evaluation of the effect of LLNL operations on the local environment, measurements were made at both the Livermore site and nearby Site 300 of direct radiation and a variety of radionuclides and chemical pollutants in ambient air, soil, sewage effluent, surface water, groundwater, vegetation, and foodstuff. Evaluations were made of LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment. The monitoring data demonstrate that LLNL was in compliance with environmental laws and regulations concerning emission and discharge of materials to the environment. In addition, the monitoring data demonstrate that the environmental impacts of LLNL are minimal and pose no threat to the public or the environment. 98 refs., 40 figs., 77 tabs

  19. Environmental report for 1989

    Energy Technology Data Exchange (ETDEWEB)

    Sims, J.M.; Surano, K.A.; Lamson, K.C.; Brown, M.G.; Gallegos, G.M. (eds.)

    1990-01-01

    This report documents the results of the Environmental Monitoring Program at the Lawrence Livermore National Laboratory (LLNL) and presents summary information about environmental compliance efforts for 1989. To enable evaluation of the effect of LLNL operations on the local environment, measurements were made at both the Livermore site and nearby Site 300 of direct radiation and a variety of radionuclides and chemical pollutants in ambient air, soil, sewage effluent, surface water, groundwater, vegetation, and foodstuff. Evaluations were made of LLNL's compliance with all applicable guides, standards, and limits for radiological and nonradiological emissions to the environment. The monitoring data demonstrate that LLNL was in compliance with environmental laws and regulations concerning emission and discharge of materials to the environment. In addition, the monitoring data demonstrate that the environmental impacts of LLNL are minimal and pose no threat to the public or the environment. 98 refs., 40 figs., 77 tabs.

  20. Development of tritium-handling technique

    International Nuclear Information System (INIS)

    Ohmura, Hiroshi; Hosaka, Akio; Okamoto, Takahumi

    1988-01-01

    The overview of developing activities for tritium-handling techniques in IHI are presented. To establish a fusion power plant, tritium handling is one of the key technologies. Recently in JAERI, conceptual design of FER (Fusion Experimental Reactor) has been carried out, and the FER system requires a processing system for a large amount of tritium. IHI concentrate on investigation of fuel gas purification, isotope separation and storage systems under contract with Toshiba Corporation. Design results of the systems and each components are reviewed. IHI has been developing fundamental handling techniques which are the ZrNi bed for hydrogen isotope storage and isotope separation by laser. The ZrNi bed with a tritium storage capacity of 1000 Ci has been constructed and recovery capability of the hydrogen isotope until 10 -4 Torr {0.013 Pa} was confirmed. In laser isotope separation, the optimum laser wave length has been determined. (author)

  1. Handling of waste in ports

    International Nuclear Information System (INIS)

    Olson, P.H.

    1994-01-01

    The regulations governing the handling of port-generated waste are often national and/or local legislation, whereas the handling of ship-generated waste is governed by the MARPOL Convention in most parts of the world. The handling of waste consists of two main phases -collection and treatment. Waste has to be collected in every port and on board every ship, whereas generally only some wastes are treated and to a certain degree in ports and on board ships. This paper considers the different kinds of waste generated in both ports and on board ships, where and how it is generated, how it could be collected and treated. The two sources are treated together to show how some ship-generated waste may be treated in port installations primarily constructed for the treatment of the port-generated waste, making integrated use of the available treatment facilities. (author)

  2. Magnetic resonance imaging of meniscal bucket-handle tears

    International Nuclear Information System (INIS)

    Dfouni, N.; Garcia, J.; Kindynis, Ph.; Bosson, D.

    1997-01-01

    To define MR signs of meniscal bucket-handle tears and evaluate the diagnostic efficiency of this technique. Retrospective study of 30 patients with a meniscal bucket-handle tear and 30 with a different type of tear, all proven by arthroscopy. The following MR signs of a bucket-handle tear were evaluated: 'separate meniscal fragment, 'double posterior cruciate ligament', 'snake sign' and 'double anterior horn'. A correct diagnosis of a bucket-handle tear was only made in 18/30 of patients. Several of the MR signs were seen in the same patient in 17 cases. A double posterior cruciate ligament was present only in cases of medial meniscus tears. The 12 menisci without these signs, and therefore not diagnosed as bucket-handle tears, were all classified as meniscal tears on the basis of signal extending to the meniscal surface. Nine of these were not displaced into the inter-condylar notch at arthroscopy. The interobserver agreement was excellent: kappa 0.88. The diagnosis of a bucket-handle meniscal tear, if it is displaced, can be made when one or more of the four MR evaluated signs are present. Other forms of meniscal tears are only exceptionally diagnosed as bucket-handle tears. (authors)

  3. Body temperature responses to handling stress in wintering Black-capped Chickadees (Poecile atricapillus L.).

    Science.gov (United States)

    Lewden, Agnès; Nord, Andreas; Petit, Magali; Vézina, François

    2017-10-01

    Body temperature variation in response to acute stress is typically characterized by peripheral vasoconstriction and a concomitant increase in core body temperature (stress-induced hyperthermia). It is poorly understood how this response differs between species and within individuals of the same species, and how it is affected by the environment. We therefore investigated stress-induced body temperature changes in a non-model species, the Black-capped Chickadee, in two environmental conditions: outdoors in low ambient temperature (mean: -6.6°C), and indoors, in milder ambient temperature close to thermoneutrality (mean: 18.7°C). Our results show that the change in body temperature in response to the same handling stressor differs in these conditions. In cold environments, we noted a significant decrease in core body temperature (-2.9°C), whereas the response in mild indoor conditions was weak and non-significant (-0.6°C). Heat loss in outdoor birds was exacerbated when birds were handled for longer time. This may highlight the role of behavioral thermoregulation and heat substitution from activity to body temperature maintenance in harsh condition. Importantly, our work also indicates that changes in the physical properties of the bird during handling (conductive cooling from cold hands, decreased insulation from compression of plumage and prevention of ptiloerection) may have large consequences for thermoregulation. This might explain why females, the smaller sex, lost more heat than males in the experiment. Because physiological and physical changes during handling may carry over to affect predation risk and maintenance of energy balance during short winter days, we advice caution when designing experimental protocols entailing prolonged handling of small birds in cold conditions. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  5. Systems for harvesting and handling cotton plant residue

    Energy Technology Data Exchange (ETDEWEB)

    Coates, W. [Univ. of Arizona, Tucson, AZ (United States)

    1993-12-31

    In the warmer regions of the United States, cotton plant residue must be buried to prevent it from serving as an overwintering site for insect pests such as the pink bollworm. Most of the field operations used to bury the residue are high energy consumers and tend to degrade soil structure, thereby increasing the potential for erosion. The residue is of little value as a soil amendment and consequently is considered a negative value biomass. A commercial system to harvest cotton plant residue would be of both economic and environmental benefit to cotton producers. Research has been underway at the University of Arizona since the spring of 1991 to develop a commercially viable system for harvesting cotton plant residue. Equipment durability, degree of densification, energy required, cleanliness of the harvested material, and ease of product handling and transport are some of the performance variables which have been measured. Two systems have proven superior. In both, the plants are pulled from the ground using an implement developed specifically for the purpose. In one system, the stalks are baled using a large round baler, while in the other the stalks are chopped with a forage harvester, and then made into packages using a cotton module maker. Field capacities, energy requirements, package density and durability, and ease of handling with commercially available equipment have been measured for both systems. Selection of an optimum system for a specific operation depends upon end use of the product, and upon equipment availability.

  6. Social and Environmental Reporting and Auditing in Indonesia: Maintaining Organizational Legitimacy?

    OpenAIRE

    Basalamah, Anies S.; Jermias, Johnny

    2005-01-01

    The purpose of this study is to examine social and environmental reporting and auditing practices by companies in Indonesia. Consistent with our prediction, we found that social and environmental reporting and auditing are undertaken by management for strategic reasons, rather than on the basis of any perceived responsibilities. The results indicate that reporting and auditing social and environmental activities increases following threats to the company’s legitimacy and ongoing survival. The...

  7. Environmental radiation data, 9

    International Nuclear Information System (INIS)

    Nagaoka, Toshi; Sakamoto, Ryuichi; Saito, Kimiaki; Tsutsumi, Masahiro; Moriuchi, Shigeru

    1993-06-01

    The Environmental Physics Laboratory has conducted a large number of background radiation surveys in these years, aiming at the analysis of characteristics and behaviour of environmental radiation, the development of measurement techniques and instruments of environmental radiation, and the evaluation of environmental radiation dose. As the environmental radiation data obtained by these surveys are useful for broad purposes as actual survey data, it is desirable to arrange these data systematically and to open them to the other scientist. For that, it is necessary to make the recording media and the FORMAT of these data available for usual computers. In the light of this circumstance, these data were rearranged and recompiled systematically to meet the demand. This report mentions about the data obtained by the background radiation surveys in and around Tokyo performed during 1991 - 1993 using portable instruments, as well as the information necessary for the data handling. (author)

  8. Environmental policy challenge crime in Republic Serbia and its impact on environmental safety

    Directory of Open Access Journals (Sweden)

    Jović Vojislav

    2014-01-01

    Full Text Available Environmental law and ecological security representing nearly two related fields that have a scientific discipline in our legal security framework introduced in the first decade of this century. Despite this fact, the legal norms that regulate the protection and safety of the environment have been studied in the framework of other disciplines, and their etymology suggests that environmental regulations have existed in the ninth century, first as a prohibitive provision 'is prohibited'. It is known that environmental law to a certain extent based on criminal law norms and the norms of a protective object with the environment - Ekos. The fact of regulation of a large number of offenses in this field indicates the significance of the criminal policy which is in the field of environmental law and environmental security provides criminal protection. In this paper, in addition to general introductory remarks on environmental law, environmental safety and environmental tort, consider the area of combating environmental crime, the share of primary and secondary subjects of criminal procedural and international cooperation, particularly in combating transnational environmental crime. In the end, considering the environmental impact of crime on ecological security, clarifying the possible forms of threats and extent of the reaction.

  9. How to Handle Impasses in Bargaining.

    Science.gov (United States)

    Durrant, Robert E.

    Guidelines in an outline format are presented to school board members and administrators on how to handle impasses in bargaining. The following two rules are given: there sometimes may be strikes, but there always will be settlements; and on the way to settlements, there always will be impasses. Suggestions for handling impasses are listed under…

  10. Environmental engineering. 2. ed.

    International Nuclear Information System (INIS)

    Foerstner, U.

    1991-01-01

    This introductory textbook has been written in response to the demand for information on environmentally sound techniques and methods. On the basis of the knowledge taught in traditional engineering sciences, and referring to it, the author explains the specific problems encountered in the various environmental sectors, and reviews and discusses the technical solutions available or possible. In this process, there is, of course, opportunity or reason enough to refer to ecologic, economic, ethical or legal aspects, too. The book takes pollutants in a very general sense, their origin (sources), dispersion or transport, and their effects on the environment, as a red thread leading to the relevant technical equipment or engineering methods for problem solution in the various environmental sectors. An extensive and detailed bibliography points to literature for further reading. This second edition under review focusses on environmental problems in the eastern states of the Federal Republic: an account of the situation there refers to 'water' (catchment area of the Elbe river), 'soil' (long-standing pollution due to the mining industry in Thueringen and Sachsen), and 'air' (dispersion of pollutants, radon in uranium mines). The chapter 'Pollutants' now contains references to the handling of noxious chemical in accordance with the Ordinance on transport and handling of dangerous goods, explains the (mis)-development in the chlorine industry, shows the different dispersion processes of organic chemicals, etc. The chapters 'waste' and 'recycling' now part more emphasis on showing the significance of short- or medium-termed measures for prevention or rentilization of waste. (orig./HSCH) With 116 figs [de

  11. Environmental engineering. 3. ed.

    International Nuclear Information System (INIS)

    Foerstner, U.

    1992-01-01

    This introductory textbook has been written in response to the demand for information on environmentally sound techniques and methods. On the basis of the knowledge taught in traditional engineering sciences, and referring to it, the author explains the specific problems encountered in the various environmental sectors, and reviews and discusses the technical solutions available or possible. In this process, there is, of course, opportunity or reason enough to refer to ecologic, economic, ethical or legal aspects, too. The book takes pollutants in a very general sense, their origin (sources), dispersion or transport, and their effects on the environment, as a red thread leading to the relevant technical equipment or engineering methods for problem solution in the various environmental sectors. An extensive and detailed bibliography points to literature for further reading. This third edition under review focusses on environmental problems in the eastern states of the Federal Republic: an account of the situation there refers to 'water' (catchment area of the Elbe river), 'soil' (long-standing pollution due to the mining industry in Thueringen and Sachsen), and 'air' (dispersion of pollutants, radon in uranium mines). The chapter 'Pollutants' now contains references to the handling of noxious chemical in accordance with the Ordinance on transport and handling of dangerous goods, explains the (mis)-development in the chlorine industry, shows the different dispersion processes of organic chemicals, etc. The chapters 'waste' and 'recycling' now part more emphasis on showing the significance of short- or medium-termed measures for prevention or rentilization of waste. (orig.) With 116 figs [de

  12. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  13. Mental health of recently resettled refugees from the Middle East in Sweden: the impact of pre-resettlement trauma, resettlement stress and capacity to handle stress.

    Science.gov (United States)

    Lindencrona, Fredrik; Ekblad, Solvig; Hauff, Edvard

    2008-02-01

    The pathways to symptoms of common mental disorder and post-traumatic stress symptoms among refugees during resettlement need to be better specified. We aim to identify models of these different mental health outcomes among refugees during resettlement, taking pre-migration, migration and post-migration stress conditions, a person's capacity to handle such stress and socio-demographic variables into consideration. A new questionnaire developed to better cover resettlement stress, as well as pre-resettlement trauma exposures and different measures of a person's capacity to handle stress, was administered to 124 Middle Eastern refugees that had been granted permanent residency in Sweden only a few months before responding. We found four dimensions of resettlement stress: social and economic strain, alienation, discrimination and status loss and violence and threats in Sweden, that account for 62% of the total variance in resettlement stress. Social and economic strain and alienation are important for explaining symptoms of common mental disorder. In the model of core post-traumatic stress symptoms, pre-resettlement trauma exposure seems to have the strongest impact. A person's capacity to handle stress plays significant, direct and mediating roles in both models. The impact of resettlement stressors in the context of the whole migration process for different mental health outcomes is discussed.

  14. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  15. WASTE HANDLING BUILDING FIRE PROTECTION SYSTEM DESCRIPTION DOCUMENT

    Energy Technology Data Exchange (ETDEWEB)

    J. D. Bigbee

    2000-06-21

    The Waste Handling Building Fire Protection System provides the capability to detect, control, and extinguish fires and/or mitigate explosions throughout the Waste Handling Building (WHB). Fire protection includes appropriate water-based and non-water-based suppression, as appropriate, and includes the distribution and delivery systems for the fire suppression agents. The Waste Handling Building Fire Protection System includes fire or explosion detection panel(s) controlling various detectors, system actuation, annunciators, equipment controls, and signal outputs. The system interfaces with the Waste Handling Building System for mounting of fire protection equipment and components, location of fire suppression equipment, suppression agent runoff, and locating fire rated barriers. The system interfaces with the Waste Handling Building System for adequate drainage and removal capabilities of liquid runoff resulting from fire protection discharges. The system interfaces with the Waste Handling Building Electrical Distribution System for power to operate, and with the Site Fire Protection System for fire protection water supply to automatic sprinklers, standpipes, and hose stations. The system interfaces with the Site Fire Protection System for fire signal transmission outside the WHB as needed to respond to a fire emergency, and with the Waste Handling Building Ventilation System to detect smoke and fire in specific areas, to protect building high-efficiency particulate air (HEPA) filters, and to control portions of the Waste Handling Building Ventilation System for smoke management and manual override capability. The system interfaces with the Monitored Geologic Repository (MGR) Operations Monitoring and Control System for annunciation, and condition status.

  16. WASTE HANDLING BUILDING FIRE PROTECTION SYSTEM DESCRIPTION DOCUMENT

    International Nuclear Information System (INIS)

    J. D. Bigbee

    2000-01-01

    The Waste Handling Building Fire Protection System provides the capability to detect, control, and extinguish fires and/or mitigate explosions throughout the Waste Handling Building (WHB). Fire protection includes appropriate water-based and non-water-based suppression, as appropriate, and includes the distribution and delivery systems for the fire suppression agents. The Waste Handling Building Fire Protection System includes fire or explosion detection panel(s) controlling various detectors, system actuation, annunciators, equipment controls, and signal outputs. The system interfaces with the Waste Handling Building System for mounting of fire protection equipment and components, location of fire suppression equipment, suppression agent runoff, and locating fire rated barriers. The system interfaces with the Waste Handling Building System for adequate drainage and removal capabilities of liquid runoff resulting from fire protection discharges. The system interfaces with the Waste Handling Building Electrical Distribution System for power to operate, and with the Site Fire Protection System for fire protection water supply to automatic sprinklers, standpipes, and hose stations. The system interfaces with the Site Fire Protection System for fire signal transmission outside the WHB as needed to respond to a fire emergency, and with the Waste Handling Building Ventilation System to detect smoke and fire in specific areas, to protect building high-efficiency particulate air (HEPA) filters, and to control portions of the Waste Handling Building Ventilation System for smoke management and manual override capability. The system interfaces with the Monitored Geologic Repository (MGR) Operations Monitoring and Control System for annunciation, and condition status

  17. Quinone-induced protein handling changes: Implications for major protein handling systems in quinone-mediated toxicity

    International Nuclear Information System (INIS)

    Xiong, Rui; Siegel, David; Ross, David

    2014-01-01

    Para-quinones such as 1,4-Benzoquinone (BQ) and menadione (MD) and ortho-quinones including the oxidation products of catecholamines, are derived from xenobiotics as well as endogenous molecules. The effects of quinones on major protein handling systems in cells; the 20/26S proteasome, the ER stress response, autophagy, chaperone proteins and aggresome formation, have not been investigated in a systematic manner. Both BQ and aminochrome (AC) inhibited proteasomal activity and activated the ER stress response and autophagy in rat dopaminergic N27 cells. AC also induced aggresome formation while MD had little effect on any protein handling systems in N27 cells. The effect of NQO1 on quinone induced protein handling changes and toxicity was examined using N27 cells stably transfected with NQO1 to generate an isogenic NQO1-overexpressing line. NQO1 protected against BQ–induced apoptosis but led to a potentiation of AC- and MD-induced apoptosis. Modulation of quinone-induced apoptosis in N27 and NQO1-overexpressing cells correlated only with changes in the ER stress response and not with changes in other protein handling systems. These data suggested that NQO1 modulated the ER stress response to potentiate toxicity of AC and MD, but protected against BQ toxicity. We further demonstrated that NQO1 mediated reduction to unstable hydroquinones and subsequent redox cycling was important for the activation of the ER stress response and toxicity for both AC and MD. In summary, our data demonstrate that quinone-specific changes in protein handling are evident in N27 cells and the induction of the ER stress response is associated with quinone-mediated toxicity. - Highlights: • Unstable hydroquinones contributed to quinone-induced ER stress and toxicity

  18. Quinone-induced protein handling changes: Implications for major protein handling systems in quinone-mediated toxicity

    Energy Technology Data Exchange (ETDEWEB)

    Xiong, Rui; Siegel, David; Ross, David, E-mail: david.ross@ucdenver.edu

    2014-10-15

    Para-quinones such as 1,4-Benzoquinone (BQ) and menadione (MD) and ortho-quinones including the oxidation products of catecholamines, are derived from xenobiotics as well as endogenous molecules. The effects of quinones on major protein handling systems in cells; the 20/26S proteasome, the ER stress response, autophagy, chaperone proteins and aggresome formation, have not been investigated in a systematic manner. Both BQ and aminochrome (AC) inhibited proteasomal activity and activated the ER stress response and autophagy in rat dopaminergic N27 cells. AC also induced aggresome formation while MD had little effect on any protein handling systems in N27 cells. The effect of NQO1 on quinone induced protein handling changes and toxicity was examined using N27 cells stably transfected with NQO1 to generate an isogenic NQO1-overexpressing line. NQO1 protected against BQ–induced apoptosis but led to a potentiation of AC- and MD-induced apoptosis. Modulation of quinone-induced apoptosis in N27 and NQO1-overexpressing cells correlated only with changes in the ER stress response and not with changes in other protein handling systems. These data suggested that NQO1 modulated the ER stress response to potentiate toxicity of AC and MD, but protected against BQ toxicity. We further demonstrated that NQO1 mediated reduction to unstable hydroquinones and subsequent redox cycling was important for the activation of the ER stress response and toxicity for both AC and MD. In summary, our data demonstrate that quinone-specific changes in protein handling are evident in N27 cells and the induction of the ER stress response is associated with quinone-mediated toxicity. - Highlights: • Unstable hydroquinones contributed to quinone-induced ER stress and toxicity.

  19. Handling Kids in Crisis with Care

    Science.gov (United States)

    Bushinski, Cari

    2018-01-01

    The Handle with Care program helps schools help students who experience trauma. While at the scene of an event like a domestic violence call, drug raid, or car accident, law enforcement personnel determine the names and school of any children present. They notify that child's school to "handle ___ with care" the next day, and the school…

  20. Integrating medical and environmental sociology with environmental health: crossing boundaries and building connections through advocacy.

    Science.gov (United States)

    Brown, Phil

    2013-06-01

    This article reviews the personal and professional processes of developing an interdisciplinary approach to understanding the complex issues of environmental health in their community, political-economic, social science, and scientific contexts. This interdisciplinary approach includes a synthesis of research, policy work, and advocacy. To examine multiple forms of interdisciplinarity, I examine pathways of integrating medical and environmental sociology via three challenges to the boundaries of traditional research: (1) crossing the boundaries of medical and environmental sociology, (2) linking social science and environmental health science, and (3) crossing the boundary of research and advocacy. These boundary crossings are discussed in light of conceptual and theoretical developments of popular epidemiology, contested illnesses, and health social movements. This interdisciplinary work offers a more comprehensive sociological lens for understanding complex problems and a practical ability to join with scientists, activists, and officials to meet public health needs for amelioration and prevention of environmental health threats.

  1. Computer handling of Savannah River Plant environmental monitoring data

    International Nuclear Information System (INIS)

    Zeigler, C.C.

    1975-12-01

    At the Savannah River Plant, computer programs are used to calculate, store, and retrieve radioactive and nonradioactive environmental monitoring data. Objectives are to provide daily, monthly, and annual summaries of all routine monitoring data; to calculate and tabulate releases according to radioisotopic species or nonradioactive pollutant, source point, and mode of entry to the environment (atmosphere, stream, or earthen seepage basins). The computer programs use a compatible numeric coding system for the data, and printouts are in the form required for internal and external reports. Data input and program maintenance are accomplished with punched cards, paper or magnetic tapes, and when applicable, with computer terminals. Additional aids for data evaluation provided by the programs are statistical counting errors, maximum and minimum values, standard deviations of averages, and other statistical analyses

  2. Survey of tritiated oil sources and handling practices

    International Nuclear Information System (INIS)

    Miller, J.M.

    1994-08-01

    Tritium interactions with oil sources (primarily associated with pumps) in tritium-handling facilities can lead to the incorporation of tritium in the oil and the production of tritiated hydrocarbons. This results in a source of radiological hazard and the need for special handling considerations during maintenance, decontamination, decommissioning and waste packaging and storage. The results of a general survey of tritiated-oil sources and their associated characteristics, handling practices, analysis techniques and waste treatment/storage methods are summarized here. Information was obtained from various tritium-handling laboratories, fusion devices, and CANDU plants. 38 refs., 1 fig

  3. Effects of handling on fear reactions in young Icelandic horses

    DEFF Research Database (Denmark)

    Marsbøll, Anna Feldberg; Christensen, Janne Winther

    2015-01-01

    To investigate the effect of a short-term standardised handling procedure on reactions of young horses in 2 types of fear tests (including and excluding human handling). Study design An experimental study with 3-year-old Icelandic horses (n = 24). Methods Handled horses (n = 12) were trained according...... to a standardised handling procedure whereas controls (n = 12) remained untrained. Behavioural and heart rate responses in a novel object test and 2 handling fear tests (HFTs) were measured. The HFTs were conducted with both an unknown (HFT-unknown) and a known handler (HFT-known). Results There was no effect...... correlated significantly between tests. Conclusions Previous handling may affect the behavioural fear response of horses when handled by their usual handler, whereas this effect did not apply to an unknown handler. Heart rates appeared unaffected by handling and may be a more reliable indicator...

  4. Knowledge and Attitudes towards Handling Eggs in the Home: An Unexplored Food Safety Issue?

    Directory of Open Access Journals (Sweden)

    Harriet Whiley

    2017-01-01

    Full Text Available Foodborne illness is a global public health issue, with food handling in the home identified as an underestimated source. In Australia, there has been a significant increase in the incidence of salmonellosis with the majority of outbreaks linked to eggs. This study investigated Australian eggs consumer attitudes, behaviours and risk perceptions associated with the handling of raw eggs in the home. It was identified that 67% of participants chose free range eggs, 11% kept poultry, 7% did not have any preference, 7% cage eggs, 4% barn eggs, 2% organic eggs and 1% pasteurized eggs. The majority of participants (91% reported they stored eggs in the fridge. It was identified that there is an underestimation of “risky behaviour” associated with the consumption of raw eggs in the home, as 84% of participants indicated that they did not consume raw eggs, but subsequently 86% indicated that they had eaten mixture/batter containing raw eggs. Participants’ responses relating to food safety were also examined in relation to their profession and gender. Safer food handling practices were identified by Environmental Health Officers (EHO and Food handlers compared to all other professions (p < 0.05. However, the gender of participants did not significantly affect (p > 0.05 their responses.

  5. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  6. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  7. Report of the remote-handled transuranic waste mock retrieval demonstration

    International Nuclear Information System (INIS)

    1987-05-01

    This report documents the results of the mock, onsite retrieval demonstration that was conducted on May 19 and 20, 1987, for representatives of the New Mexico Environmental Evaluation Group (EEG). Demonstration of the retrievability of remote-handled transuranic (RH TRU) waste is part of a milestone included in the Agreement for Consultation and Cooperation between the state of New Mexico and the United States Department of Energy. Retrieval equipment design documents and a retrievability demonstration plan for RH TRU waste were previously transmitted to the EEG. This report documents the results of the demonstration by evaluating the demonstration against the acceptance criteria that were established in the Demonstration Plan. 1 fig., 2 tabs

  8. Handling wood shavings

    Energy Technology Data Exchange (ETDEWEB)

    1974-09-18

    Details of bulk handling equipment suitable for collection and compressing wood waste from commercial joinery works are discussed. The Redler Bin Discharger ensures free flow of chips from storage silo discharge prior to compression into briquettes for use as fuel or processing into chipboard.

  9. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  10. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  11. Swine flu. Mexico's handling of A/H1N1 in comparative perspective.

    Science.gov (United States)

    Ear, Sophal

    2012-01-01

    Emerging infectious diseases (EIDs) pose international security threats because of their potential to inflict harm upon humans, crops, livestock, health infrastructure, and economies. Despite the scale of this threat, there are inherent limitations in preventing and controlling EIDs, including the scope of current disease surveillance efforts. All of this leads to the following questions in the context of Mexico's recent swine flu experience: What were the cultural, political, and economic challenges to Influenza A/H1N1 virus response in Mexico? By way of comparison, what can we learn from the U.S. experience in 1976 with A/New Jersey/76 (Hsw1N1), later referred to as H1N1? This article explores the comparative political economy of Mexico's handling of influenza virus A/H1N1 outbreak in 2009. Research provides notable observations-based on the strengths and weaknesses of each country's response--that can be used as a starting point of discussion for the design of effective EIDs surveillance programs in developing and middle-income countries. In the U.S., the speed and efficiency of the 1976 U.S. mobilization against H1N1 was laudable. Although the U.S. response to the outbreak is seldom praised, the unity of the scientific and political communities demonstrated the national ability to respond to the situation. Mexico's strongest characteristics were its transparency, as well as the cooperation the country exhibited with other nations, particularly the U.S. and Canada. While Mexico showed savvy in its effective management of public and media relations, as the article details, political, economic, and cultural problems persisted.

  12. Handling of bulk solids theory and practice

    CERN Document Server

    Shamlou, P A

    1990-01-01

    Handling of Bulk Solids provides a comprehensive discussion of the field of solids flow and handling in the process industries. Presentation of the subject follows classical lines of separate discussions for each topic, so each chapter is self-contained and can be read on its own. Topics discussed include bulk solids flow and handling properties; pressure profiles in bulk solids storage vessels; the design of storage silos for reliable discharge of bulk materials; gravity flow of particulate materials from storage vessels; pneumatic transportation of bulk solids; and the hazards of solid-mater

  13. Torus sector handling system

    International Nuclear Information System (INIS)

    Grisham, D.L.

    1981-01-01

    A remote handling system is proposed for moving a torus sector of the accelerator from under the cryostat to a point where it can be handled by a crane and for the reverse process for a new sector. Equipment recommendations are presented, as well as possible alignment schemes. Some general comments about future remote-handling methods and the present capabilities of existing systems will also be included. The specific task to be addressed is the removal and replacement of a 425 to 450 ton torus sector. This requires a horizontal movement of approx. 10 m from a normal operating position to a point where its further transport can be accomplished by more conventional means (crane or floor transporter). The same horizontal movement is required for reinstallation, but a positional tolerance of 2 cm is required to allow reasonable fit-up for the vacuum seal from the radial frames to the torus sector. Since the sectors are not only heavy but rather tall and narrow, the transport system must provide a safe, stable, and repeatable method fo sector movement. This limited study indicates that the LAMPF-based method of transporting torus sectors offers a proven method of moving heavy items. In addition, the present state of the art in remote equipment is adequate for FED maintenance

  14. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  15. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  16. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  17. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  18. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  19. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  20. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  1. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  2. Environmental Durability Issues for Solar Power Systems in Low Earth Orbit

    Science.gov (United States)

    Degroh, Kim K.; Banks, Bruce A.; Smith, Daniela C.

    1994-01-01

    Space solar power systems for use in the low Earth orbit (LEO) environment experience a variety of harsh environmental conditions. Materials used for solar power generation in LEO need to be durable to environmental threats such as atomic oxygen, ultraviolet (UV) radiation, thermal cycling, and micrometeoroid and debris impact. Another threat to LEO solar power performance is due to contamination from other spacecraft components. This paper gives an overview of these LEO environmental issues as they relate to space solar power system materials. Issues addressed include atomic oxygen erosion of organic materials, atomic oxygen undercutting of protective coatings, UV darkening of ceramics, UV embrittlement of Teflon, effects of thermal cycling on organic composites, and contamination due to silicone and organic materials. Specific examples of samples from the Long Duration Exposure Facility (LDEF) and materials returned from the first servicing mission of the Hubble Space Telescope (HST) are presented. Issues concerning ground laboratory facilities which simulate the LEO environment are discussed along with ground-to-space correlation issues.

  3. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  4. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  5. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  6. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  7. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  8. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  9. Getting to grips with remote handling and robotics

    Energy Technology Data Exchange (ETDEWEB)

    Mosey, D [Ontario Hydro, Toronto (Canada)

    1984-12-01

    A report on the Canadian Nuclear Society Conference on robotics and remote handling in the nuclear industry, September 1984. Remote handling in reactor operations, particularly in the Candu reactors is discussed, and the costs and benefits of use of remote handling equipment are considered. Steam generator inspection and repair is an area in which practical application of robotic technology has made a major advance.

  10. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  11. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  12. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  13. Handling knowledge on osteoporosis - a qualitative study

    DEFF Research Database (Denmark)

    Nielsen, Dorthe; Huniche, Lotte; Brixen, Kim

    2013-01-01

    Scand J Caring Sci; 2012 Handling knowledge on osteoporosis - a qualitative study The aim of this qualitative study was to increase understanding of the importance of osteoporosis information and knowledge for patients' ways of handling osteoporosis in their everyday lives. Interviews were...

  14. Redefining NHS complaint handling--the real challenge.

    Science.gov (United States)

    Seelos, L; Adamson, C

    1994-01-01

    More and more organizations find that a constructive and open dialogue with their customers can be an effective strategy for building long-term customer relations. In this context, it has been recognized that effective complaint-contact handling can make a significant contribution to organizations' attempts to maximize customer satisfaction and loyalty. Within the NHS, an intellectual awareness exists that effective complaint/contact handling can contribute to making services more efficient and cost-effective by developing customer-oriented improvement initiatives. Recent efforts have focused on redefining NHS complaint-handling procedures to make them more user-friendly and effective for both NHS employees and customers. Discusses the challenges associated with opening up the NHS to customer feedback. Highlights potential weaknesses in the current approach and argues that the real challenge is for NHS managers to facilitate a culture change that moves the NHS away from a long-established defensive complaint handling practice.

  15. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  16. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  17. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  18. Contested discourses, knowledge, and socio-environmental conflict in Ecuador

    NARCIS (Netherlands)

    Buchanan, K.S.

    2013-01-01

    This paper explores how multiple types of knowledge – epistemic, technical, and anecdotal – are combined and used discursively within the claim-making process of a long-running socio-environmental conflict concerning copper extraction and its threat to biodiversity conservation in Ecuador's Intag

  19. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  20. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  1. Trends and applications of integrated automated ultra-trace sample handling and analysis (T9)

    International Nuclear Information System (INIS)

    Kingston, H.M.S.; Ye Han; Stewart, L.; Link, D.

    2002-01-01

    Full text: Automated analysis, sub-ppt detection limits, and the trend toward speciated analysis (rather than just elemental analysis) force the innovation of sophisticated and integrated sample preparation and analysis techniques. Traditionally, the ability to handle samples at ppt and sub-ppt levels has been limited to clean laboratories and special sample handling techniques and equipment. The world of sample handling has passed a threshold where older or 'old fashioned' traditional techniques no longer provide the ability to see the sample due to the influence of the analytical blank and the fragile nature of the analyte. When samples require decomposition, extraction, separation and manipulation, application of newer more sophisticated sample handling systems are emerging that enable ultra-trace analysis and species manipulation. In addition, new instrumentation has emerged which integrate sample preparation and analysis to enable on-line near real-time analysis. Examples of those newer sample-handling methods will be discussed and current examples provided as alternatives to traditional sample handling. Two new techniques applying ultra-trace microwave energy enhanced sample handling have been developed that permit sample separation and refinement while performing species manipulation during decomposition. A demonstration, that applies to semiconductor materials, will be presented. Next, a new approach to the old problem of sample evaporation without losses will be demonstrated that is capable of retaining all elements and species tested. Both of those methods require microwave energy manipulation in specialized systems and are not accessible through convection, conduction, or other traditional energy applications. A new automated integrated method for handling samples for ultra-trace analysis has been developed. An on-line near real-time measurement system will be described that enables many new automated sample handling and measurement capabilities. This

  2. MHSS: a material handling system simulator

    Energy Technology Data Exchange (ETDEWEB)

    Pomernacki, L.; Hollstien, R.B.

    1976-04-07

    A Material Handling System Simulator (MHSS) program is described that provides specialized functional blocks for modeling and simulation of nuclear material handling systems. Models of nuclear fuel fabrication plants may be built using functional blocks that simulate material receiving, storage, transport, inventory, processing, and shipping operations as well as the control and reporting tasks of operators or on-line computers. Blocks are also provided that allow the user to observe and gather statistical information on the dynamic behavior of simulated plants over single or replicated runs. Although it is currently being developed for the nuclear materials handling application, MHSS can be adapted to other industries in which material accountability is important. In this paper, emphasis is on the simulation methodology of the MHSS program with application to the nuclear material safeguards problem. (auth)

  3. Development of Safe Food Handling Guidelines for Korean Consumers.

    Science.gov (United States)

    Kang, Hee-Jin; Lee, Min-Woo; Hwang, In-Kyeong; Kim, Jeong-Weon

    2015-08-01

    The purpose of this study was to develop guidelines for Korean consumers with regard to safe food handling practices at home by identifying current food handling issues. Korean consumers' behaviors regarding their safe food handling were identified via survey questionnaires that included items on individual hygiene practices, prepreparation steps when cooking, the cooking process, and the storage of leftover foods. The subjects were 417 Korean parents with elementary school children living in Seoul and Gyeonggi Province in the central area of Korea. The survey results revealed gaps between the knowledge or practices of Korean consumers and scientific evidence pertaining to safe food handling practices. Based on these findings, a leaflet on safe food handling guidelines was developed in accordance with Korean food culture. These guidelines suggest personal hygiene practices as well as fundamental principles and procedures for safe food handling from the stage of food purchase to that of keeping leftover dishes. A pilot application study with 50 consumers revealed that the guidelines effectively improved Korean consumers' safe food handling practices, suggesting that they can serve as practical educational material suitable for Korean consumers.

  4. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  5. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  6. Disrupted expected value signaling in youth with disruptive behavior disorders to environmental reinforcers.

    Science.gov (United States)

    White, Stuart F; Fowler, Katherine A; Sinclair, Stephen; Schechter, Julia C; Majestic, Catherine M; Pine, Daniel S; Blair, R James

    2014-05-01

    Youth with disruptive behavior disorders (DBD), including conduct disorder (CD) and oppositional defiant disorder (ODD), have difficulties in reinforcement-based decision making, the neural basis of which is poorly understood. Studies examining decision making in youth with DBD have revealed reduced reward responses within the ventromedial prefrontal cortex/orbitofrontal cortex (vmPFC/OFC), increased responses to unexpected punishment within the vmPFC and striatum, and reduced use of expected value information in the anterior insula cortex and dorsal anterior cingulate cortex during the avoidance of suboptimal choices. Previous work has used only monetary reinforcement. The current study examined whether dysfunction in youth with DBD during decision making extended to environmental reinforcers. A total of 30 youth (15 healthy youth and 15 youth with DBD) completed a novel reinforcement-learning paradigm using environmental reinforcers (physical threat images, e.g., striking snake image; contamination threat images, e.g., rotting food; appetitive images, e.g., puppies) while undergoing functional magnetic resonance imaging (fMRI). Behaviorally, healthy youth were significantly more likely to avoid physical threat, but not contamination threat, stimuli than youth with DBD. Imaging results revealed that youth with DBD showed significantly reduced use of expected value information in the bilateral caudate, thalamus, and posterior cingulate cortex during the avoidance of suboptimal responses. The current data suggest that youth with DBD show deficits to environmental reinforcers similar to the deficits seen to monetary reinforcers. Importantly, this deficit was unrelated to callous-unemotional (CU) traits, suggesting that caudate impairment may be a common deficit across youth with DBD. Published by Elsevier Inc.

  7. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  8. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  9. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  10. 7 CFR 959.126 - Handling of culls.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 8 2010-01-01 2010-01-01 false Handling of culls. 959.126 Section 959.126 Agriculture Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements...) Handled for canning or freezing. (b) As a safeguard against culls entering fresh market channels each...

  11. Survey of postharvest handling, preservation and processing ...

    African Journals Online (AJOL)

    Survey of postharvest handling, preservation and processing practices along the camel milk chain in Isiolo district, Kenya. ... Despite the important contribution of camel milk to food security for pastoralists in Kenya, little is known about the postharvest handling, preservation and processing practices. In this study, existing ...

  12. Handling uncertainty through adaptiveness in planning approaches

    NARCIS (Netherlands)

    Zandvoort, M.; Vlist, van der M.J.; Brink, van den A.

    2018-01-01

    Planners and water managers seek to be adaptive to handle uncertainty through the use of planning approaches. In this paper, we study what type of adaptiveness is proposed and how this may be operationalized in planning approaches to adequately handle different uncertainties. We took a

  13. Lead from hunting activities and its potential environmental threat to wildlife in a protected wetland in Yucatan, Mexico.

    Science.gov (United States)

    Arcega-Cabrera, Flor; Noreña-Barroso, Elsa; Oceguera-Vargas, Ismael

    2014-02-01

    This study provides insights into the status of lead in the protected wetland of El Palmar, located on the northwestern littoral of the Yucatan Peninsula. This reserve is ecologically and economically important because it provides feeding and breeding habitats for many species, as well as being an ecotourism destination (especially for bird watching). Although it is a protected area, duck species are heavily hunted within the reserve during the winter. As a result, animals feeding or living in sediments could be exposed to anthropogenic lead. Total lead and its geochemical fractionated forms were measured in sediment cores from six selected sites in "El Palmar" wetland, during pre- and post-hunting seasons, to approximate the potential environmental threat (especially for benthonic living/feeding organisms). Anthropogenic lead concentrations detected in soil cores ranged from below the minimum infaunal community effect level (30.24 μg g(-1)) during the pre-hunting season, to bordering the probable infaunal community effect level (112.18 μg g(-1)) during the post-hunting season, according to SquiiRTs NOAA guidelines. Yet, these results were lower than expected based on the intensity of hunting. Consequently, this article explores the possibility that the lower than expected lead concentration in sediments results from (1) degradation of shot and transformation to soluble or particulate forms; or (2) ingestion of lead shot by benthic and other lacustrine species living in the protected area. Geochemical fractionation of lead demonstrated that in the top 6 cm of the soil column at heavily active hunting sites (EP5 and EP6), lead was associated with the lithogenic fraction (average 45 percent) and with the organic fraction (average 20 percent). Bioavailable lead (sum of lead adsorbed to the carbonates, Fe/Mn oxyhydroxides and organic fractions) in sediments was lower than 50 percent for the heavily active hunting areas and higher for the rest of the sites

  14. PREPD O and VE remote handling system

    International Nuclear Information System (INIS)

    Theil, T.N.

    1985-01-01

    The Process Experimental Pilot Plant (PREPP) at the Idaho National Engineering Laboratory is designed for volume reduction and packaging of transuranic (TRU) waste. The PREPP opening and verification enclosure (O and VE) remote handling system, within that facility, is designed to provide examination of the contents of various TRU waste storage containers. This remote handling system will provide the means of performing a hazardous operation that is currently performed manually. The TeleRobot to be used in this system is a concept that will incorporate and develop man in the loop operation (manual mode), standardized automatic sequencing of end effector tools, increased payload and reach over currently available computer-controlled robots, and remote handling of a hazardous waste operation. The system is designed within limited space constraints and an operation that was originally planned, and is currently being manually performed at other plants. The PREPP O and VE remote handling system design incorporates advancing technology to improve the working environment in the nuclear field

  15. Quality of life threats in recreational and competitive sport

    DEFF Research Database (Denmark)

    Støckel, Jan Toftegaard

    Quality of life threats in recreational and competitive sport Author: ass. Professor Jan Toftegaard Støckel Key words: sport, stress, depression, illness, Previous research has shown that personal issues (nutrition, injury, goals and expectations), coach-athlete issues (coach, coaching style......, selection) and environmental issues (team atmosphere, support structures) are key determinants for stress, depression and illness in elite sports. In a large scale survey among 4,000 Danish athletes from recreational thru to elite sport a regression analysis show an increase in risk of self-reported stress......, depression or illness (SDI) by odds ratio 6,5 in elite sport compared to recreational sport. One in eight athletes reported SDI and highest associations are related to coach behavior. The key question for this abstract is to examine whether men and women are equally vulnerable to SDI at various sport levels...

  16. 30 CFR 75.817 - Cable handling and support systems.

    Science.gov (United States)

    2010-07-01

    ... High-Voltage Longwalls § 75.817 Cable handling and support systems. Longwall mining equipment must be provided with cable-handling and support systems that are constructed, installed and maintained to minimize... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Cable handling and support systems. 75.817...

  17. Cooper-Harper Experience Report for Spacecraft Handling Qualities Applications

    Science.gov (United States)

    Bailey, Randall E.; Jackson, E. Bruce; Bilimoria, Karl D.; Mueller, Eric R.; Frost, Chad R.; Alderete, Thomas S.

    2009-01-01

    A synopsis of experience from the fixed-wing and rotary-wing aircraft communities in handling qualities development and the use of the Cooper-Harper pilot rating scale is presented as background for spacecraft handling qualities research, development, test, and evaluation (RDT&E). In addition, handling qualities experiences and lessons-learned from previous United States (US) spacecraft developments are reviewed. This report is intended to provide a central location for references, best practices, and lessons-learned to guide current and future spacecraft handling qualities RDT&E.

  18. Cellular Manufacturing System with Dynamic Lot Size Material Handling

    Science.gov (United States)

    Khannan, M. S. A.; Maruf, A.; Wangsaputra, R.; Sutrisno, S.; Wibawa, T.

    2016-02-01

    Material Handling take as important role in Cellular Manufacturing System (CMS) design. In several study at CMS design material handling was assumed per pieces or with constant lot size. In real industrial practice, lot size may change during rolling period to cope with demand changes. This study develops CMS Model with Dynamic Lot Size Material Handling. Integer Linear Programming is used to solve the problem. Objective function of this model is minimizing total expected cost consisting machinery depreciation cost, operating costs, inter-cell material handling cost, intra-cell material handling cost, machine relocation costs, setup costs, and production planning cost. This model determines optimum cell formation and optimum lot size. Numerical examples are elaborated in the paper to ilustrate the characterictic of the model.

  19. Chemical Safety Alert: First Responders’ Environmental Liability Due To Mass Decontamination Runoff

    Science.gov (United States)

    CERCLA's good Samaritan provisions protect responders such as the Chemical Weapons Improved Response Team during lifesaving actions. Once imminent threats are addressed, responders should contain contamination and avoid/mitigate environmental consequences.

  20. 49 CFR 520.34 - Comments on environmental statements prepared by other agencies.

    Science.gov (United States)

    2010-10-01

    ... systems, traffic congestion, threats to health, or other consequences adverse to the environmental goals... changes in vehicular or pedestrian access. b. Statement of the “national, State or local significance” of...

  1. Repository waste-handling operations, 1998

    International Nuclear Information System (INIS)

    Cottam, A.E.; Connell, L.

    1986-04-01

    The Civilian Radioactive Waste Management Program Mission Plan and the Generic Requirements for a Mined Geologic Disposal System state that beginning in 1998, commercial spent fuel not exceeding 70,000 metric tons of heavy metal, or a quantity of solidified high-level radioactive waste resulting from the reprocessing of such a quantity of spent fuel, will be shipped to a deep geologic repository for permanent storage. The development of a waste-handling system that can process 3000 metric tons of heavy metal annually will require the adoption of a fully automated approach. The safety and minimum exposure of personnel will be the prime goals of the repository waste handling system. A man-out-of-the-loop approach will be used in all operations including the receipt of spent fuel in shipping casks, the inspection and unloading of the spent fuel into automated hot-cell facilities, the disassembly of spent fuel assemblies, the consolidation of fuel rods, and the packaging of fuel rods into heavy-walled site-specific containers. These containers are designed to contain the radionuclides for up to 1000 years. The ability of a repository to handle more than 6000 pressurized water reactor spent-fuel rods per day on a production basis for approximately a 23-year period will require that a systems approach be adopted that combines space-age technology, robotics, and sophisticated automated computerized equipment. New advanced inspection techniques, maintenance by robots, and safety will be key factors in the design, construction, and licensing of a repository waste-handling facility for 1998

  2. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  3. 340 waste handling complex: Deactivation project management plan

    International Nuclear Information System (INIS)

    Stordeur, R.T.

    1998-01-01

    This document provides an overview of the strategy for deactivating the 340 Waste Handling Complex within Hanford's 300 Area. The plan covers the period from the pending September 30, 1998 cessation of voluntary radioactive liquid waste (RLW) transfers to the 340 Complex, until such time that those portions of the 340 Complex that remain active beyond September 30, 1998, specifically, the Retention Process Sewer (RPS), can also be shut down and deactivated. Specific activities are detailed and divided into two phases. Phase 1 ends in 2001 after the core RLW systems have been deactivated. Phase 2 covers the subsequent interim surveillance of deactivated and stand-by components during the period of continued RPS operation, through the final transfer of the entire 340 Complex to the Environmental Restoration Contractor. One of several possible scenarios was postulated and developed as a budget and schedule planning case

  4. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  5. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  6. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  7. 20 CFR 658.421 - Handling of JS-related complaints.

    Science.gov (United States)

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Handling of JS-related complaints. 658.421... ADMINISTRATIVE PROVISIONS GOVERNING THE JOB SERVICE SYSTEM Job Service Complaint System Federal Js Complaint System § 658.421 Handling of JS-related complaints. (a) No JS-related complaint shall be handled at the...

  8. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  9. Fuel handling grapple for nuclear reactor plants

    International Nuclear Information System (INIS)

    Rousar, D.L.

    1992-01-01

    This patent describes a fuel handling system for nuclear reactor plants. It comprises: a reactor vessel having an openable top and removable cover and containing therein, submerged in water substantially filling the reactor vessel, a fuel core including a multiplicity of fuel bundles formed of groups of sealed tube elements enclosing fissionable fuel assembled into units, the fuel handling system consisting essentially of the combination of: a fuel bundle handling platform movable over the open top of the reactor vessel; a fuel bundle handling mast extendable downward from the platform with a lower end projecting into the open top reactor vessel to the fuel core submerged in water; a grapple head mounted on the lower end of the mast provided with grapple means comprising complementary hooks which pivot inward toward each other to securely grasp a bail handle of a nuclear reactor fuel bundle and pivot backward away from each other to release a bail handle; the grapple means having a hollow cylindrical support shaft fixed within the grapple head with hollow cylindrical sleeves rotatably mounted and fixed in longitudinal axial position on the support shaft and each sleeve having complementary hooks secured thereto whereby each hook pivots with the rotation of the sleeve secured thereto; and the hollow cylindrical support shaft being provided with complementary orifices on opposite sides of its hollow cylindrical and intermediate to the sleeves mounted thereon whereby the orifices on both sides of the hollow cylindrical support shaft are vertically aligned providing a direct in-line optical viewing path downward there-through and a remote operator positioned above the grapple means can observe from overhead the area immediately below the grapple hooks

  10. Ethics Guidelines in Environmental Epidemiology: Their Development and Challenges We Face.

    Science.gov (United States)

    Kramer, Shira; Soskolne, Colin L

    2017-06-01

    This review integrates historical developments and key events in bringing ethics into epidemiology in general and into environmental epidemiology in particular. The goal is to provide context for and discern among the various approaches and motivations that drive the need for ethical conduct in support of the public interest. The need for ethics guidelines in epidemiology is different from developments in other biomedical-related fields by virtue of its focus on populations rather than on individuals. The need for ethics guidelines in environmental epidemiology as a subspecialty of epidemiology stems from the larger scale of its mission than that of epidemiology per se. Ethics guidelines in the field of environmental epidemiology have been established. They articulate not only the profession's core values and mission, but more specifically, they address the environmental epidemiologist's obligations to the participants in research, to colleagues, and to employers. They are the product of consensus, scholarship, and diligent stewardship over several decades. The next challenge is ensuring their value and impact. The forces that support professional and institutional success, and the power of special interests, are the major threats to achieving the goals of ethical conduct and research for the public good. In environmental epidemiology, these threats have global implications.

  11. West African Research and Training Hub on Environmental and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    The initial research focuses on documenting and reducing health threats associated with processing electronic waste (e-waste), small-scale gold mining, and air pollution impacts from the informal transport sector. All three economic activities produce significant levels of environmental contamination and pose elevated ...

  12. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  13. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  14. Site environmental report for calendar year 1994, Yucca Mountain Site, Nye County, Nevada

    International Nuclear Information System (INIS)

    1995-06-01

    The Yucca Mountain Site Characterization office has established an environmental program to ensure that facilities are operated in order to protect, maintain, and restore environmental quality, minimize potential threats to the environment and the public, and comply with environmental policies and US DOE orders. The status of the environmental program has been summarized in this annual report to characterize performance, confirm compliance with environmental requirements, and highlight significant programs and efforts during CY 1994. Monitoring, archaeology, groundwater, ecosystems, tortoise conservation, waste minimization, etc., are covered

  15. Site environmental report for calendar year 1994, Yucca Mountain Site, Nye County, Nevada.

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-06-01

    The Yucca Mountain Site Characterization office has established an environmental program to ensure that facilities are operated in order to protect, maintain, and restore environmental quality, minimize potential threats to the environment and the public, and comply with environmental policies and US DOE orders. The status of the environmental program has been summarized in this annual report to characterize performance, confirm compliance with environmental requirements, and highlight significant programs and efforts during CY 1994. Monitoring, archaeology, groundwater, ecosystems, tortoise conservation, waste minimization, etc., are covered.

  16. Proceedings of the International conference on radioecology and environmental radioactivity

    International Nuclear Information System (INIS)

    2008-01-01

    The conference contains 404 presentations on: 1) Emergency preparedness and rehabilitation with emphasis on radiation and radioactivity determination and monitoring, protection and contamination and pollution. 2) TNORM/NORM including radon with focus on radioactivity in the environmental and isotope evaluation. 3) Radioecology and speciation including arctic radioecology, focusing on accidents, radiation and radioactivity effects, nuclear waste disposal, handling, impacts, safety and risks, pollution and its sources, accumulation of isotopes and various medical aspects. 4) Risk assessment with emphasis on the environmental and ecological aspects, modeling, recommendations and international cooperation and discussion of the effects of climatic changes. 5) Radiation in society. 6) Environmental protection with focus on radionuclide studies, radiation effects and protection measures, isotope accumulation effects, nuclide distribution, migration and pollution and effects and handling of nuclear accidents. The global aspects of the topics are evident and there are discussions on non-ionizing and ionizing radiation effect, various simulation problems and public and general health aspects (tk)

  17. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  18. Microplastics as an emerging threat to terrestrial ecosystems.

    Science.gov (United States)

    de Souza Machado, Anderson Abel; Kloas, Werner; Zarfl, Christiane; Hempel, Stefan; Rillig, Matthias C

    2018-04-01

    Microplastics (plastics plastic litter or from direct environmental emission. Their potential impacts in terrestrial ecosystems remain largely unexplored despite numerous reported effects on marine organisms. Most plastics arriving in the oceans were produced, used, and often disposed on land. Hence, it is within terrestrial systems that microplastics might first interact with biota eliciting ecologically relevant impacts. This article introduces the pervasive microplastic contamination as a potential agent of global change in terrestrial systems, highlights the physical and chemical nature of the respective observed effects, and discusses the broad toxicity of nanoplastics derived from plastic breakdown. Making relevant links to the fate of microplastics in aquatic continental systems, we here present new insights into the mechanisms of impacts on terrestrial geochemistry, the biophysical environment, and ecotoxicology. Broad changes in continental environments are possible even in particle-rich habitats such as soils. Furthermore, there is a growing body of evidence indicating that microplastics interact with terrestrial organisms that mediate essential ecosystem services and functions, such as soil dwelling invertebrates, terrestrial fungi, and plant-pollinators. Therefore, research is needed to clarify the terrestrial fate and effects of microplastics. We suggest that due to the widespread presence, environmental persistence, and various interactions with continental biota, microplastic pollution might represent an emerging global change threat to terrestrial ecosystems. © 2017 John Wiley & Sons Ltd.

  19. Money handling influences BMI: a survey of cashiers

    OpenAIRE

    Shraddha Karve; Ketaki Shurpali; Neelesh Dahanukar; Maithili Jog; Milind Watve

    2008-01-01

    Money is a recent phenomenon in the evolutionary history of man and therefore no separate brain centre to handle money is likely to have evolved. The brain areas activated by food reward and money reward are extensively overlapping. In an experimental set-up, hunger was demonstrated to influence money related decisions and money related thoughts to influence hunger. This suggests that the brain areas evolved for handling food related emotions are exapted to handle money and therefore there co...

  20. Advanced handling-systems with enhanced performance flexibility

    International Nuclear Information System (INIS)

    1986-04-01

    This report describes the results of a project related to future applications and requirements for advanced handling systems. This report consists of six chapters. Following the description of the aims the tools for setting up the requirements for the handling systems including the experience during the data acquisition process is described. Furthermore some information is given about the current state of the art of robotics and manipulators. Of paramount importance are the descriptions of applications and related concepts in the following chapters leading to specific categories of advanced handling units. The paper closes with the description of the first concepts for realization. (orig./HP) [de

  1. How the NWC handles software as product

    Energy Technology Data Exchange (ETDEWEB)

    Vinson, D.

    1997-11-01

    This tutorial provides a hands-on view of how the Nuclear Weapons Complex project should be handling (or planning to handle) software as a product in response to Engineering Procedure 401099. The SQAS has published the document SQAS96-002, Guidelines for NWC Processes for Handling Software Product, that will be the basis for the tutorial. The primary scope of the tutorial is on software products that result from weapons and weapons-related projects, although the information presented is applicable to many software projects. Processes that involve the exchange, review, or evaluation of software product between or among NWC sites, DOE, and external customers will be described.

  2. Conceptual design of CFETR divertor remote handling compatible structure

    International Nuclear Information System (INIS)

    Dai, Huaichu; Yao, Damao; Cao, Lei; Zhou, Zibo; Li, Lei

    2016-01-01

    Highlights: • Conceptual design for the CFETR divertor have been proposed, especially the divertor remote handling compatible structure. • The degrees of freedom of the divertor are analyzed in order to validate the design the divertor supports structure. • Besides the ITER-like scheme, a new scheme for the divertor remote handling compatible supports is proposed, that is the rack and pinion mechanism. • The installation/removel process is verified through simulation in Delmia in order to check design quality for remote handling requirements. - Abstract: Divertor is one of key components of tokamak fusion reactor. The CFETR is China Fusion Engineering Test Reactor. Its divertor will expose to tritium environment and neutron radiation. Materials of the divertor will be radioactived, and cannot be handled by personnel directly. To develop structure which compatible with robots handle for installation, maintenance and removing is required. This paper introduces a conceptual design of CFETR divertor module which compatible with remote handling end-effectors. The divertor module is confined by inner and outer support. The inner support is only confined divertor module radial, toroidal and vertical moving freedom degrees, but not confined rotating freedom degrees. The outer support is the structure that can confine rotating freedom degrees and should also be compatible with remote handling end-effectors.

  3. Conceptual design of CFETR divertor remote handling compatible structure

    Energy Technology Data Exchange (ETDEWEB)

    Dai, Huaichu, E-mail: yaodm@ipp.ac.cn [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China); University of Science and Technology of China, Hefei (China); Yao, Damao; Cao, Lei; Zhou, Zibo; Li, Lei [Institute of Plasma Physics, Chinese Academy of Sciences, Hefei 230031 (China)

    2016-11-15

    Highlights: • Conceptual design for the CFETR divertor have been proposed, especially the divertor remote handling compatible structure. • The degrees of freedom of the divertor are analyzed in order to validate the design the divertor supports structure. • Besides the ITER-like scheme, a new scheme for the divertor remote handling compatible supports is proposed, that is the rack and pinion mechanism. • The installation/removel process is verified through simulation in Delmia in order to check design quality for remote handling requirements. - Abstract: Divertor is one of key components of tokamak fusion reactor. The CFETR is China Fusion Engineering Test Reactor. Its divertor will expose to tritium environment and neutron radiation. Materials of the divertor will be radioactived, and cannot be handled by personnel directly. To develop structure which compatible with robots handle for installation, maintenance and removing is required. This paper introduces a conceptual design of CFETR divertor module which compatible with remote handling end-effectors. The divertor module is confined by inner and outer support. The inner support is only confined divertor module radial, toroidal and vertical moving freedom degrees, but not confined rotating freedom degrees. The outer support is the structure that can confine rotating freedom degrees and should also be compatible with remote handling end-effectors.

  4. The environmental imperative for renewable energy

    International Nuclear Information System (INIS)

    Serchuk, Adam

    2000-01-01

    This article assesses the report by the Renewable Energy Policy Project entitled 'The Environmental Imperative: A Driving Force in the Development and Deployment of Renewable Energy Technologies', and focuses on the environmental impacts of the generation of electricity including air pollution, climate change, land and water pollution, the threat to wildlife, and the risk of radiation from commercial nuclear power plants. A table is presented illustrating the air pollution, climate change, land use and degradation, water use and quality, wildlife and radiation effects from the use of coal, oil, natural gas, biomass, wind, photovoltaic, geothermal, hydroelectric and nuclear power

  5. Children's Environmental Health: Beyond National Boundaries.

    Science.gov (United States)

    Miller, Mark D; Marty, Melanie A; Landrigan, Philip J

    2016-02-01

    Children are especially vulnerable to environmental pollution, a major cause of disease, death, and disability in countries at every level of development. This article reviews threats to children, including air and water pollution, toxic industrial chemicals, pesticides, heavy metals, and hazardous wastes. Global climate change is expected to exacerbate many of these issues. Examples of innovative nongovernmental organizations and governmental programs that address the impacts of environmental hazards on children are included. International travel, adoption, migration, and movement of goods and pollutants worldwide make these conditions concerns for all pediatricians. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. 21 CFR 58.107 - Test and control article handling.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Test and control article handling. 58.107 Section... GOOD LABORATORY PRACTICE FOR NONCLINICAL LABORATORY STUDIES Test and Control Articles § 58.107 Test and control article handling. Procedures shall be established for a system for the handling of the test and...

  7. 9 CFR 2.131 - Handling of animals.

    Science.gov (United States)

    2010-01-01

    ... 9 Animals and Animal Products 1 2010-01-01 2010-01-01 false Handling of animals. 2.131 Section 2.131 Animals and Animal Products ANIMAL AND PLANT HEALTH INSPECTION SERVICE, DEPARTMENT OF AGRICULTURE ANIMAL WELFARE REGULATIONS Miscellaneous § 2.131 Handling of animals. (a) All licensees who maintain wild...

  8. The precautionary principle in international environmental law and international jurisprudence

    OpenAIRE

    Tubić, Bojan

    2014-01-01

    This paper analysis international regulation of the precautionary principle as one of environmental principles. This principle envisages that when there are threats of serious and irreparable harm, as a consequence of certain economic activity, the lack of scientific evidence and full certainty cannot be used as a reason for postponing efficient measures for preventing environmental harm. From economic point of view, the application of precautionary principle is problematic, because it create...

  9. ITER L 6 equatorial maintenance duct remote handling study

    International Nuclear Information System (INIS)

    Millard, J.

    1996-09-01

    The status and conclusions of a preliminary study of equatorial maintenance duct remote handling is reported. Due to issues with the original duct design a significant portion of the study had to be refocused on equatorial duct layout studies. The study gives an overview of some of the options for design of these ducts and the impact of the design on the equipment to work in the duct. To develop a remote handling concept for creating access through the ducts the following design tasks should be performed: define the operations sequences for equatorial maintenance duct opening and closing; review the remote handling requirements for equatorial maintenance duct opening and closing; design concept for door and pipe handling equipment and to propose preliminary procedures for material handling outsides the duct. 35 figs

  10. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    Science.gov (United States)

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  11. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  12. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  13. Ergonomic design and evaluation of the handle for an endoscopic dissector.

    Science.gov (United States)

    Shimomura, Yoshihiro; Minowa, Keita; Kawahira, Hiroshi; Katsuura, Tetsuo

    2016-05-01

    The purpose of this study was to design an endoscopic dissector handle and objectively assess its usability. The handles were designed with increased contact area between the fingers and thumb and the eye rings, and the eye rings were modified to have a more perpendicular insertion angle to the finger midline. Four different handle models were compared, including a conventional product. Subjects performed dissection, exclusion, grasping, precision manipulation and precision handling tasks. Electromyography and subjective evaluations were measured. Compared to conventional handles, the designated handle reduced the muscle load in the extensor and flexor muscles of the forearm and increased subjective stability. The activity of the first dorsal interosseous muscle was sometimes influenced by the shape of the other parts. The ergonomically designed endoscopic dissector handle used in this study achieved high usability. Medical instrument designs based on ergonomic concepts should be assessed with objective indices. Practitioner Summary: The endoscopic dissector handles were designed with increased contact area and more suitable insertion angle between the fingers and thumb and the eye rings. Compared to conventional handles, the designated handle reduced the muscle load in the extensor and flexor muscles of the forearm and increased subjective stability.

  14. Avoiding climate change uncertainties in Strategic Environmental Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Larsen, Sanne Vammen, E-mail: sannevl@plan.aau.dk [The Danish Centre for Environmental Assessment, Aalborg University-Copenhagen, A.C. Meyers Vænge 15, 2450 København SV (Denmark); Kørnøv, Lone, E-mail: lonek@plan.aau.dk [The Danish Centre for Environmental Assessment, Aalborg University, Skibbrogade 5, 1. Sal, 9000 Aalborg (Denmark); Driscoll, Patrick, E-mail: patrick@plan.aau.dk [The Danish Centre for Environmental Assessment, Aalborg University-Copenhagen, A.C. Meyers Vænge 15, 2450 København SV (Denmark)

    2013-11-15

    This article is concerned with how Strategic Environmental Assessment (SEA) practice handles climate change uncertainties within the Danish planning system. First, a hypothetical model is set up for how uncertainty is handled and not handled in decision-making. The model incorporates the strategies ‘reduction’ and ‘resilience’, ‘denying’, ‘ignoring’ and ‘postponing’. Second, 151 Danish SEAs are analysed with a focus on the extent to which climate change uncertainties are acknowledged and presented, and the empirical findings are discussed in relation to the model. The findings indicate that despite incentives to do so, climate change uncertainties were systematically avoided or downplayed in all but 5 of the 151 SEAs that were reviewed. Finally, two possible explanatory mechanisms are proposed to explain this: conflict avoidance and a need to quantify uncertainty.

  15. Avoiding climate change uncertainties in Strategic Environmental Assessment

    International Nuclear Information System (INIS)

    Larsen, Sanne Vammen; Kørnøv, Lone; Driscoll, Patrick

    2013-01-01

    This article is concerned with how Strategic Environmental Assessment (SEA) practice handles climate change uncertainties within the Danish planning system. First, a hypothetical model is set up for how uncertainty is handled and not handled in decision-making. The model incorporates the strategies ‘reduction’ and ‘resilience’, ‘denying’, ‘ignoring’ and ‘postponing’. Second, 151 Danish SEAs are analysed with a focus on the extent to which climate change uncertainties are acknowledged and presented, and the empirical findings are discussed in relation to the model. The findings indicate that despite incentives to do so, climate change uncertainties were systematically avoided or downplayed in all but 5 of the 151 SEAs that were reviewed. Finally, two possible explanatory mechanisms are proposed to explain this: conflict avoidance and a need to quantify uncertainty

  16. The space between us: stereotype threat and distance in interracial contexts.

    Science.gov (United States)

    Goff, Phillip Atiba; Steele, Claude M; Davies, Paul G

    2008-01-01

    Four studies investigate the role that stereotype threat plays in producing racial distancing behavior in an anticipated conversation paradigm. It was hypothesized that the threat of appearing racist may have the ironic effect of causing Whites to distance themselves from Black conversation partners. In Study 1, participants distanced themselves more from Black partners under conditions of threat, and this distance correlated with the activation of a "White racist" stereotype. In Study 2, it was demonstrated that Whites' interracial distancing behavior was not predicted by explicit or implicit prejudice. Study 3 provides evidence that conceiving of interracial interactions as opportunities to learn may attenuate the negative consequences of threat for Whites. Study 4 found that Whites have conscious access to their experience of stereotype threat and that this awareness may mediate the relationship between threat and distance. These results are discussed within a broader discourse of racial distancing and the possibility that certain identity threats may be as important as prejudice in determining the outcomes of interracial interactions. Copyright 2008 APA, all rights reserved.

  17. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  18. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  19. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  20. Single-molecule mechanics of protein-labelled DNA handles

    Directory of Open Access Journals (Sweden)

    Vivek S. Jadhav

    2016-01-01

    Full Text Available DNA handles are often used as spacers and linkers in single-molecule experiments to isolate and tether RNAs, proteins, enzymes and ribozymes, amongst other biomolecules, between surface-modified beads for nanomechanical investigations. Custom DNA handles with varying lengths and chemical end-modifications are readily and reliably synthesized en masse, enabling force spectroscopic measurements with well-defined and long-lasting mechanical characteristics under physiological conditions over a large range of applied forces. Although these chemically tagged DNA handles are widely used, their further individual modification with protein receptors is less common and would allow for additional flexibility in grabbing biomolecules for mechanical measurements. In-depth information on reliable protocols for the synthesis of these DNA–protein hybrids and on their mechanical characteristics under varying physiological conditions are lacking in literature. Here, optical tweezers are used to investigate different protein-labelled DNA handles in a microfluidic environment under different physiological conditions. Digoxigenin (DIG-dsDNA-biotin handles of varying sizes (1000, 3034 and 4056 bp were conjugated with streptavidin or neutravidin proteins. The DIG-modified ends of these hybrids were bound to surface-modified polystyrene (anti-DIG beads. Using different physiological buffers, optical force measurements showed consistent mechanical characteristics with long dissociation times. These protein-modified DNA hybrids were also interconnected in situ with other tethered biotinylated DNA molecules. Electron-multiplying CCD (EMCCD imaging control experiments revealed that quantum dot–streptavidin conjugates at the end of DNA handles remain freely accessible. The experiments presented here demonstrate that handles produced with our protein–DNA labelling procedure are excellent candidates for grasping single molecules exposing tags suitable for molecular