WorldWideScience

Sample records for identifying potential threats

  1. Identifying at-risk employees: A behavioral model for predicting potential insider threats

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.

    2010-09-01

    A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations. We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.

  2. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  3. Screening-level exposure-based prioritization to identify potential POPs, vPvBs and planetary boundary threats among Arctic contaminants

    Directory of Open Access Journals (Sweden)

    Efstathios Reppas-Chrysovitsinos

    2017-06-01

    Full Text Available A report that reviews Arctic contaminants that are not currently regulated as persistent organic pollutants (POPs under international treaties was recently published by the Arctic Monitoring and Assessment Programme (AMAP. We evaluated 464 individual chemicals mentioned in the AMAP report according to hazard profiles for POPs, very persistent and very bioaccumulative (vPvB chemicals, and two novel and distinct hazard profiles we derived from the planetary boundary threat framework. The two planetary boundary threat profiles assign high priority to chemicals that will be mobile and poorly reversible environmental contaminants. Utilizing persistence as a proxy for poor reversibility, we defined two exposure-based hazard profiles; airborne persistent contaminants (APCs and waterborne persistent contaminants (WPCs that are potential planetary boundary threats. We used in silico estimates of physicochemical properties and multimedia models to calculate hazard metrics for persistence, bioaccumulation and long-range transport potential, then we synthesized this information into four exposure-based hazard scores of the potential of each AMAP chemical to fit each of the POP, vPvB, APC and WPC exposure-based hazard profiles. As an alternative to adopting a “bright line” score that represented cause for concern, we scored the AMAP chemicals by benchmarking against a reference set of 148 known and relatively well-studied contaminants and expressed their exposure-based hazard scores as percentile ranks against the scores of the reference set chemicals. Our results show that scores in the four exposure-based hazard profiles provide complementary information about the potential environmental exposure-based hazards of the AMAP chemicals. Our POP, vPvB, APC and WPC exposure-based hazard scores identify high priority chemicals for further study from among the AMAP contaminants.

  4. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  5. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  6. Identifying the Species Threat Hotspots from Global Supply Chains

    OpenAIRE

    Moran, Daniel; Kanemoto, Keiichiro

    2016-01-01

    Identifying species threat hotspots has been a successful approach for setting conservation priorities. One major challenge in conservation is that in many hotspots export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprin...

  7. Identifying species threat hotspots from global supply chains.

    Science.gov (United States)

    Moran, Daniel; Kanemoto, Keiichiro

    2017-01-04

    Identifying hotspots of species threat has been a successful approach for setting conservation priorities. One important challenge in conservation is that, in many hotspots, export industries continue to drive overexploitation. Conservation measures must consider not just the point of impact, but also the consumer demand that ultimately drives resource use. To understand which species threat hotspots are driven by which consumers, we have developed a new approach to link a set of biodiversity footprint accounts to the hotspots of threatened species on the IUCN Red List of Threatened Species. The result is a map connecting consumption to spatially explicit hotspots driven by production on a global scale. Locating biodiversity threat hotspots driven by consumption of goods and services can help to connect conservationists, consumers, companies and governments in order to better target conservation actions.

  8. Incinerators, Hazardous Waste, To identify and locate abandoned oil production facilities and apparatus which pose a potential threat for creating an oil spill through either natural or accidental causes., Published in 1998, 1:24000 (1in=2000ft) scale, Louisiana State University (LSU).

    Data.gov (United States)

    NSGIC Education | GIS Inventory — Incinerators, Hazardous Waste dataset current as of 1998. To identify and locate abandoned oil production facilities and apparatus which pose a potential threat for...

  9. THREAT helps to identify epistaxis patients requiring blood transfusions

    Science.gov (United States)

    2013-01-01

    Objective To analyze the characteristics of patients who needed a blood transfusion due to epistaxis-caused anemia and to define potential risk factors. Design Retrospective cohort study. Setting A total cohort of 591 epistaxis patients, prospectively included between March 2007 and April 2008 at the ENT department of the University Hospital of Zurich, was evaluated concerning the need for blood transfusions. Methods The clinical charts and medical histories of these patients were evaluated. Main outcome measures Common parameters that increase the risk for severe anemia due to epistaxis. Results Twenty-two patients required blood transfusions due to their medical condition. 22.7% suffered from traumatic nosebleeds. Another 27.3% had a known medical condition with an increased bleeding tendency. These proportions were significantly higher than in the group of patients without need of blood transfusion. The odds ratio for receiving a blood transfusion was 14.0 in patients with hematologic disorders, 4.3 in traumatic epistaxis and 7.7 in posterior bleeders. The transfusion-dependent epistaxis patients suffered significantly more often from severe posterior nosebleeds with the need for a surgical therapeutic approach. Conclusions Patients with severe nosebleeds either from the posterior part of the nose or with known hematologic disorders or traumatic epistaxis should be closely monitored by blood parameter analyses to evaluate the indication for hemotransfusion. The acronym THREAT (Trauma, Hematologic disorder, and REAr origin of bleeding → Transfusion) helps to remember and identify the factors associated with an increased risk of receiving blood transfusion. PMID:23663751

  10. Potential future land use threats to California's protected areas

    Science.gov (United States)

    Wilson, Tamara Sue; Sleeter, Benjamin Michael; Davis, Adam Wilkinson

    2015-01-01

    Increasing pressures from land use coupled with future changes in climate will present unique challenges for California’s protected areas. We assessed the potential for future land use conversion on land surrounding existing protected areas in California’s twelve ecoregions, utilizing annual, spatially explicit (250 m) scenario projections of land use for 2006–2100 based on the Intergovernmental Panel on Climate Change Special Report on Emission Scenarios to examine future changes in development, agriculture, and logging. We calculated a conversion threat index (CTI) for each unprotected pixel, combining land use conversion potential with proximity to protected area boundaries, in order to identify ecoregions and protected areas at greatest potential risk of proximal land conversion. Our results indicate that California’s Coast Range ecoregion had the highest CTI with competition for extractive logging placing the greatest demand on land in close proximity to existing protected areas. For more permanent land use conversions into agriculture and developed uses, our CTI results indicate that protected areas in the Central California Valley and Oak Woodlands are most vulnerable. Overall, the Eastern Cascades, Central California Valley, and Oak Woodlands ecoregions had the lowest areal percent of protected lands and highest conversion threat values. With limited resources and time, rapid, landscape-level analysis of potential land use threats can help quickly identify areas with higher conversion probability of future land use and potential changes to both habitat and potential ecosystem reserves. Given the broad range of future uncertainties, LULC projections are a useful tool allowing land managers to visualize alternative landscape futures, improve planning, and optimize management practices.

  11. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  12. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  13. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  14. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  15. Data fusion and machine learning to identify threat vectors for the Zika virus and classify vulnerability

    Science.gov (United States)

    Gentle, J. N., Jr.; Kahn, A.; Pierce, S. A.; Wang, S.; Wade, C.; Moran, S.

    2016-12-01

    With the continued spread of the zika virus in the United States in both Florida and Virginia, increased public awareness, prevention and targeted prediction is necessary to effectively mitigate further infection and propagation of the virus throughout the human population. The goal of this project is to utilize publicly accessible data and HPC resources coupled with machine learning algorithms to identify potential threat vectors for the spread of the zika virus in Texas, the United States and globally by correlating available zika case data collected from incident reports in medical databases (e.g., CDC, Florida Department of Health) with known bodies of water in various earth science databases (e.g., USGS NAQWA Data, NASA ASTER Data, TWDB Data) and by using known mosquito population centers as a proxy for trends in population distribution (e.g., WHO, European CDC, Texas Data) while correlating historical trends in the spread of other mosquito borne diseases (e.g., chikungunya, malaria, dengue, yellow fever, west nile, etc.). The resulting analysis should refine the identification of the specific threat vectors for the spread of the virus which will correspondingly increase the effectiveness of the limited resources allocated towards combating the disease through better strategic implementation of defense measures. The minimal outcome of this research is a better understanding of the factors involved in the spread of the zika virus, with the greater potential to save additional lives through more effective resource utilization and public outreach.

  16. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    Science.gov (United States)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-12-01

    Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Among the major (well-known) threats with high impact are nutrient input (particularly of phosphorus), habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture) or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international

  17. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  18. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  19. Nuclear industry powering up to tackle potential threats from cyberspace

    International Nuclear Information System (INIS)

    Shepherd, John

    2015-01-01

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  20. Nuclear industry powering up to tackle potential threats from cyberspace

    Energy Technology Data Exchange (ETDEWEB)

    Shepherd, John [nuclear 24, Brighton (United Kingdom)

    2015-06-15

    In June 2015, the International Atomic Energy Agency (IAEA), in cooperation with international agencies including the crime-fighting organisation Interpol, will host a major conference on the protection of computer systems and networks that support operations at the world's nuclear facilities. According to the IAEA, the use of computers and other digital electronic equipment in physical protection systems at nuclear facilities, as well as in facility safety systems, instrumentation, information processing and communication, ''continues to grow and presents an ever more likely target for cyber-attack''. The international nuclear industry is right to take heed of ever-evolving security threats, deal with them accordingly, and be as open and transparent as security allows about what is being done, which will reassure the general public. However, the potential menace of cyberspace should not be allowed to become such a distraction that it gives those who are ideologically opposed to nuclear another stick with which to beat the industry.

  1. Tetanus: A Potential Public Health Threat in Times of Disaster.

    Science.gov (United States)

    Finkelstein, Paige; Teisch, Laura; Allen, Casey J; Ruiz, Gabriel

    2017-06-01

    for trauma and critical patients to become familiar with the protocols for treatment and immunization of patients that have tetanus-prone wounds, as well as recognize the potential for outbreaks in the settings of major natural disasters. Finkelstein P , Teisch L , Allen CJ , Ruiz G . Tetanus: a potential public health threat in times of disaster. Prehosp Disaster Med. 2017;32(3):339-342.

  2. Potential Threats of Information Disclosure in Social Media: a Systematic Literature Review

    Directory of Open Access Journals (Sweden)

    Budi Yulianto

    2016-09-01

    Full Text Available Along with the growth of social media, a variety of potential threats to users is also increasing. These kinds of threats often occur because the users accidentally or unknowingly disclose their information or identity on social media. Threats resulted from the disclosure of information are needed to be known so that the users can understand the risks that arise and take precautions. This research was aimed to summarize the potential threats arising from the information disclosure in social media. The research method used was a systematic literature review to explore and summarize the literatures that discuss the specific topic. The research results show that the potential threats are mostly social threats and identity theft. 

  3. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  4. Software Development Initiatives to Identify and Mitigate Security Threats - Two Systematic Mapping Studies

    Directory of Open Access Journals (Sweden)

    Paulina Silva

    2016-12-01

    Full Text Available Software Security and development experts have addressed the problem of building secure software systems. There are several processes and initiatives to achieve secure software systems. However, most of these lack empirical evidence of its application and impact in building secure software systems. Two systematic mapping studies (SM have been conducted to cover the existent initiatives for identification and mitigation of security threats. The SMs created were executed in two steps, first in 2015 July, and complemented through a backward snowballing in 2016 July. Integrated results of these two SM studies show a total of 30 relevant sources were identified; 17 different initiatives covering threats identification and 14 covering the mitigation of threats were found. All the initiatives were associated to at least one activity of the Software Development Lifecycle (SDLC; while 6 showed signs of being applied in industrial settings, only 3 initiatives presented experimental evidence of its results through controlled experiments, some of the other selected studies presented case studies or proposals.

  5. Yellow Fever Remains a Potential Threat to Public Health.

    Science.gov (United States)

    Vasconcelos, Pedro F C; Monath, Thomas P

    2016-08-01

    Yellow fever (YF) remains a serious public health threat in endemic countries. The recent re-emergence in Africa, initiating in Angola and spreading to Democratic Republic of Congo and Uganda, with imported cases in China and Kenya is of concern. There is such a shortage of YF vaccine in the world that the World Health Organization has proposed the use of reduced doses (1/5) during emergencies. In this short communication, we discuss these and other problems including the risk of spread of YF to areas free of YF for decades or never before affected by this arbovirus disease.

  6. Nuclear proliferation and the potential threat of nuclear terrorism

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2005-01-01

    The Director General of the International Atomic Energy Agency emphasises that security strategies can no longer be effective based solely on the concept of national boundaries. The article describes the security problems which have grown along with the development of 'internationalism' and the author defines the need for cooperation, assistance, regional and international networks to combat the threat quoting the IAEA's nuclear security plan as an example of how this may be achieved. In stressing the urgency Dr ElBaradei concludes: 'May it not ultimately be said of our civilisation that we created the inventions that led to our own demise'. (author)

  7. Nuclear proliferation and the potential threat of nuclear terrorism

    Energy Technology Data Exchange (ETDEWEB)

    ElBaradei, M. [International Atomic Energy Agency, Vienna (Austria)

    2005-01-15

    The Director General of the International Atomic Energy Agency emphasises that security strategies can no longer be effective based solely on the concept of national boundaries. The article describes the security problems which have grown along with the development of 'internationalism' and the author defines the need for cooperation, assistance, regional and international networks to combat the threat quoting the IAEA's nuclear security plan as an example of how this may be achieved. In stressing the urgency Dr ElBaradei concludes: 'May it not ultimately be said of our civilisation that we created the inventions that led to our own demise'. (author)

  8. Identify and analyze the opportunities and threats of social networks for shahid Beheshti University students

    Directory of Open Access Journals (Sweden)

    R. Tavalaee

    2017-09-01

    Full Text Available Due to the growth of information and communication technology in societies Especially among students, the use of these technologies has become as part of regular working people. Social networks as one of the most important and widely in cyberspace which is Used by many people in various fields. application of social network by students as young and educated population is important.In this regard, this study aimed to investigate and identify the opportunities and threats for shahid Beheshti University students in social network. This study aims to develop a practical and descriptive methodology. Information obtained from the questionnaires using SPSS statistical analysis software in two parts: descriptive and inferential statistics were analyzed.The results indicate that five variables related to social networking opportunities, including e-learning, leisure, organized social groups, the possibility of dialogue and culture, as well as five variables related to social networking threats, including transfer value unethical, abusive, spreading false information, internet & Communications destructive addiction, has a significant positive effect on students.

  9. The potential distribution of cassava mealybug (Phenacoccus manihoti, a threat to food security for the poor.

    Directory of Open Access Journals (Sweden)

    Tania Yonow

    Full Text Available The cassava mealybug is a clear and present threat to the food security and livelihoods of some of the world's most impoverished citizens. Niche models, such as CLIMEX, are useful tools to indicate where and when such threats may extend, and can assist with planning for biosecurity and the management of pest invasions. They can also contribute to bioeconomic analyses that underpin the allocation of resources to alleviate poverty. Because species can invade and establish in areas with climates that are different from those that are found in their native range, it is essential to define robust range-limiting mechanisms in niche models. To avoid spurious results when applied to novel climates, it is necessary to employ cross-validation techniques spanning different knowledge domains (e.g., distribution data, experimental results, phenological observations. We build upon and update a CLIMEX niche model by Parsa et al. (PloS ONE 7: e47675, correcting inconsistent parameters and re-fitting it based on a careful examination of geographical distribution data and relevant literature. Further, we consider the role of irrigation, the known distribution of cassava production and a targeted review of satellite imagery to refine, validate and interpret our model and results. In so doing, we bring new insights into the potential spread of this invasive insect, enabling us to identify potential bio-security threats and biological control opportunities. The fit of the revised model is improved, particularly in relation to the wet and dry limits to establishment, and the parameter values are biologically plausible and accord with published scientific literature.

  10. A freshwater biodiversity hotspot under pressure – assessing threats and identifying conservation needs for ancient Lake Ohrid

    Directory of Open Access Journals (Sweden)

    G. Kostoski

    2010-12-01

    Full Text Available Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact.

    Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes.

    Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1 assess threats to Lake Ohrids' (endemic biodiversity, (2 summarize existing conservation activities and strategies, and (3 outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1 watershed impacts, (2 agriculture and forestry, (3 tourism and population growth, (4 non-indigenous species, (5 habitat alteration or loss, (6 unsustainable exploitation of fisheries, and (7 global climate change.

    Among the major (well-known threats with high impact are nutrient input (particularly of phosphorus, habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species

  11. The global nephrology workforce: emerging threats and potential solutions!

    Science.gov (United States)

    Sharif, Muhammad U; Elsayed, Mohamed E; Stack, Austin G

    2016-02-01

    Amidst the rising tide of chronic kidney disease (CKD) burden, the global nephrology workforce has failed to expand in order to meet the growing healthcare needs of this vulnerable patient population. In truth, this shortage of nephrologists is seen in many parts of the world, including North America, Europe, Australia, New Zealand, Asia and the African continent. Moreover, expert groups on workforce planning as well as national and international professional organizations predict further reductions in the nephrology workforce over the next decade, with potentially serious implications. Although the full impact of this has not been clearly articulated, what is clear is that the delivery of care to patients with CKD may be threatened in many parts of the world unless effective country-specific workforce strategies are put in place and implemented. Multiple factors are responsible for this apparent shortage in the nephrology workforce and the underpinning reasons may vary across health systems and countries. Potential contributors include the increasing burden of CKD, aging workforce, declining interest in nephrology among trainees, lack of exposure to nephrology among students and residents, rising cost of medical education and specialist training, increasing cultural and ethnic disparities between patients and care providers, increasing reliance on foreign medical graduates, inflexible work schedules, erosion of nephrology practice scope by other specialists, inadequate training, reduced focus on scholarship and research funds, increased demand to meet quality of care standards and the development of new care delivery models. It is apparent from this list that the solution is not simple and that a comprehensive evaluation is required. Consequently, there is an urgent need for all countries to develop a policy framework for the provision of kidney disease services within their health systems, a framework that is based on accurate projections of disease burden, a

  12. Preliminary Evaluation of Moniliformin as a Potential Threat for Teleosts

    Directory of Open Access Journals (Sweden)

    Rui Goncalves

    2018-01-01

    Full Text Available Aquaculture feed manufacturers and producers increasingly recognize the importance of mycotoxins, which contaminate plant-based meals used in compound aquafeeds, and their potential to negatively impact production. Though data on the worldwide occurrence of legislated mycotoxins e.g., trichothecenes and zearalenone (ZEN are well documented, relatively little information is available regarding other mycotoxins also produced by Fusarium, notably moniliformin (MON. Given that MON is known to affect the survival, growth, skeletal formation and bone mineralization in terrestrial species, its widespread occurrence on maize and maize by-products typically used in aquaculture makes it relevant to study these parameters in teleost fish. In the present work we have tested the effect of MON exposure on survival, bone development and mineralization using zebrafish (Danio rerio as a model species and fish derived osteo-chondroprogenitor cell line for in vitro studies. Moniliformin exposure did not decrease bone mineralization in zebrafish larvae or extracellular matrix mineralization in the mineralogenic cell line VSa13. Here, the minimal in vitro cytotoxicity concentration was found to be 1000 µg L−1 MON. Incidence of deformities was also not altered by MON at the concentration tested (450 µg L−1 although larval growth was affected, as shown by a decrease in the standard length of exposed specimens at 20 days post fertilization. Survival decreased significantly in larvae exposed to MON concentrations higher than 900 μg L−1. Influence of MON on survival and growth might be relevant for aquaculture industry. As MON is a water-soluble mycotoxin, its leaching from feed is highly probable, so MON assimilation into the surrounding aqueous environment should also be considered. Tested levels in fish larvae are within the reported occurrence levels of MON in commercial feed and plant meals.

  13. Detecting Insider Threats Using Ben-ware: Beneficial Intelligent Software for Identifying Anomalous Human Behaviour

    OpenAIRE

    McGough, Andrew Stephen; Arief, Budi; Gamble, Carl; Wall, David; Brennan, John; Fitzgerald, John; van Moorsel, Aad; Alwis, Sujeewa; Theodoropoulos, Georgios; Ruck-Keene, Ed

    2015-01-01

    The insider threat problem is a significant and ever present issue faced by any organisation. While security mechanisms can be put in place to reduce the chances of external agents gaining access to a system, either to steal assets or alter records, the issue is more complex in tackling insider threat. If an employee already has legitimate access rights to a system, it is much more difficult to prevent them from carrying out inappropriate acts, as it is hard to determine whether the acts are ...

  14. Invasive Lionfish (Pterois volitans): A Potential Human Health Threat for Ciguatera Fish Poisoning in Tropical Waters

    Science.gov (United States)

    Robertson, Alison; Garcia, Ana C.; Flores Quintana, Harold A.; Smith, Tyler B.; Castillo, Bernard F.; Reale-Munroe, Kynoch; Gulli, Joseph A.; Olsen, David A.; Hooe-Rollman, Jennifer I.; Jester, Edward L. E.; Klimek, Brian J.; Plakas, Steven M.

    2013-01-01

    Invasive Indo-Pacific lionfish (Pterois volitans) have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP). More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas. PMID:24378919

  15. Invasive lionfish (Pterois volitans): a potential human health threat for ciguatera fish poisoning in tropical waters.

    Science.gov (United States)

    Robertson, Alison; Garcia, Ana C; Quintana, Harold A Flores; Smith, Tyler B; Castillo, Bernard F; Reale-Munroe, Kynoch; Gulli, Joseph A; Olsen, David A; Hooe-Rollman, Jennifer I; Jester, Edward L E; Klimek, Brian J; Plakas, Steven M

    2013-12-27

    Invasive Indo-Pacific lionfish (Pterois volitans) have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP). More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas.

  16. Invasive Lionfish (Pterois volitans: A Potential Human Health Threat for Ciguatera Fish Poisoning in Tropical Waters

    Directory of Open Access Journals (Sweden)

    Alison Robertson

    2013-12-01

    Full Text Available Invasive Indo-Pacific lionfish (Pterois volitans have rapidly expanded in the Western Atlantic over the past decade and have had a significant negative impact on reef fish biodiversity, habitat, and community structure, with lionfish out-competing native predators for resources. In an effort to reduce this population explosion, lionfish have been promoted for human consumption in the greater Caribbean region. This study examined whether the geographical expansion of the lionfish into a known ciguatera-endemic region can pose a human health threat for ciguatera fish poisoning (CFP. More than 180 lionfish were collected from waters surrounding the US Virgin Islands throughout 2010 and 2011. Ciguatoxin testing included an in vitro neuroblastoma cytotoxicity assay for composite toxicity assessment of sodium-channel toxins combined with confirmatory liquid chromatography tandem mass spectrometry. A 12% prevalence rate of ciguatoxic lionfish exceeding the FDA guidance level of 0.1 µg/kg C-CTX-1 equivalents was identified in fish from the U.S. Virgin Islands, highlighting a potential consumption risk in this region. This study presents the first evidence that the invasive lionfish, pose a direct human health risk for CFP and highlights the need for awareness and research on this food safety hazard in known endemic areas.

  17. Identifying Potential Child Abuse through Oral Examination

    Directory of Open Access Journals (Sweden)

    Jillian N. Printz

    2017-01-01

    Full Text Available Limited reports of oropharyngeal trauma exist in the literature even though this type of injury is extremely common in pediatric populations. There are no widely agreed upon diagnostic and management tools for such injuries in abuse cases, emphasizing the importance of reporting rare cases of orofacial trauma. This case report of a soft palate laceration demonstrates an instance of initially unrecognized potential child abuse. We aim to clarify understanding of such injuries. Furthermore, the report highlights the need for recognition of oral signs of child abuse in order to promote early detection, reporting, and appropriate management.

  18. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    Science.gov (United States)

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  19. Identifying potential surface water sampling sites for emerging chemical pollutants in Gauteng Province, South Africa

    OpenAIRE

    Petersen, F; Dabrowski, JM; Forbes, PBC

    2017-01-01

    Emerging chemical pollutants (ECPs) are defined as new chemicals which do not have a regulatory status, but which may have an adverse effect on human health and the environment. The occurrence and concentrations of ECPs in South African water bodies are largely unknown, so monitoring is required in order to determine the potential threat that these ECPs may pose. Relevant surface water sampling sites in the Gauteng Province of South Africa were identified utilising a geographic information sy...

  20. A Biological Security Motivation System for Potential Threats: Are There Implications for Policy-Making?

    Directory of Open Access Journals (Sweden)

    Erik Z Woody

    2013-09-01

    Full Text Available Research indicates that there is a specially adapted, hard-wired brain circuit, the security motivation system, which evolved to manage potential threats, such as the possibility of contamination or predation. The existence of this system may have important implications for policy-making related to security. The system is sensitive to partial, uncertain cues of potential danger, detection of which activates a persistent, potent motivational state of wariness or anxiety. This state motivates behaviours to probe the potential danger, such as checking, and to correct for it, such as washing. Engagement in these behaviours serves as the terminating feedback for the activation of the system. Because security motivation theory makes predictions about what kinds of stimuli activate security motivation and what conditions terminate it, the theory may have applications both in understanding how policy-makers can best influence others, such as the public, and also in understanding the behavior of policy-makers themselves.

  1. Identifying serotonergic mechanisms underlying the corticolimbic response to threat in humans

    DEFF Research Database (Denmark)

    Fisher, Patrick M; Hariri, Ahmad R

    2013-01-01

    . Integrating these methodological approaches offers novel opportunities to identify mechanisms through which serotonin signalling contributes to differences in brain function and behaviour, which in turn can illuminate factors that confer risk for illness and inform the development of more effective treatment...

  2. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  3. Protecting facilities against terrorism and sabotage. Is Jamaica prepared to deal with this potential threat?

    International Nuclear Information System (INIS)

    Powell, E.D.

    2001-01-01

    courts of the land. Our airports, oil refinery and some utility facilities are located in close proximity to the sea. This is very accessible to attack from the sea. Our other essential facilities are not as easily accessed as they are located inland and may be more difficult to access. All these facilities have security protection, but none is equipped to deal with any level of terrorism. No security equipment currently being used has the capability to combat, detect and or prevent any terrorist attacks or acts of sabotage. The nation needs to expand resources to set up units to focus on this potential threat. This unit should focus on analysis of threats from: terrorism; the proliferation of weapons of mass destruction; vulnerabilities attended on increasing economic and societal dependence on information technologies. There is a wide variety of novel attacks available to the terrorist today; it would be advised that the unit, through constant training and workshops, be aware of as many of these attack methods as possible. There should be collaboration between several entities to analyze and plan for the potential threats. The army and police forces will have to be complemented by scientists who have expert knowledge on this subject area. Experts could be drawn from: i. Information and communications centers; ii. Banking and finance entities; iii. Utility entities; iv. Environment protection agencies; v. Land, air and sea transportation agencies; vi. Fire services; vii. Law enforcement agencies; viii. Defense (army and police); ix. Health services; x. Oil and gas refineries; xi. Disaster preparedness program. This group would examine issues such as: How to reduce the vulnerabilities of their institutions to terrorist attacks (threat/vulnerability management); How to respond to terrorist acts? Guideline or rules to follow when faced with the problem of terrorism (crisis management); How to deal with the aftermath of terrorist attacks, including providing essential aids

  4. The effect of panic disorder versus anxiety sensitivity on event-related potentials during anticipation of threat.

    Science.gov (United States)

    Stevens, Elizabeth S; Weinberg, Anna; Nelson, Brady D; Meissel, Emily E E; Shankman, Stewart A

    2018-03-01

    Attention-related abnormalities are key components of the abnormal defensive responding observed in panic disorder (PD). Although behavioral studies have found aberrant attentional biases towards threat in PD, psychophysiological studies have been mixed. Predictability of threat, an important feature of threat processing, may have contributed to these mixed findings. Additionally, anxiety sensitivity, a dimensional trait associated with PD, may yield stronger associations with cognitive processes than categorical diagnoses of PD. In this study, 171 participants with PD and/or depression and healthy controls completed a task that differentiated anticipation of predictable vs. unpredictable shocks, while startle eyeblink and event-related potentials (ERPs [N100, P300]) were recorded. In all participants, relative to the control condition, probe N100 was enhanced to both predictable and unpredictable threat, whereas P300 suppression was unique to predictable threat. Probe N100, but not P300, was associated with startle eyeblink during both threatening conditions, and was strongest for unpredictable threat. PD was not associated with ERPs, but anxiety sensitivity (physical concerns) was positively associated with probe N100 (indicating reduced responding) in the unpredictable condition independent of PD diagnosis. Vulnerability to panic-related psychopathology may be characterized by aberrant early processing of threat, which may be especially evident during anticipation of unpredictable threats. Copyright © 2017 Elsevier Ltd. All rights reserved.

  5. Assessing Potential of VIIRS Data for Contribution to a Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, Joseph P.

    2007-01-01

    This viewgraph presentation reviews the contributions by the Rapid Prototyping Capability (RPC) towards using Visible Infrared Imager / Radiometer Suite (VIIRS) data in assessing the damage to forests. The Healthy Forest Restoration Act of 2003 mandates development of national Early Warning System (EWS) for forest threat monitoring and mitigation. NASA Stennis is working with the US Forest Service to develop needed components of this EWS. The use of MODIS data for monitoring forest disturbance at broad regional scales is a componet of this program. This RPC experiment was initiated to assess potential of the MODIS follow-on, VIIRS, for monitoring forest disturbance at broad scales and thereby contributing to the EWS. This presentation reviews the potential use of the VIIRS to examine the damage to forests caused by gyspy moths in the West Virginia and Virginia area.

  6. Potential threats on pottery as local wisdom in Sitiwinangun Cirebon district

    Science.gov (United States)

    Putri, D. P.

    2018-05-01

    This study is aimed to find out the type of threats of pottery as a local wisdom of Sitiwinangun Village. The study used qualitative approach which included observation, interviews, direct involvement and literature study as technique to collect the data. The data was analyzed by descriptive exploratory analysis. The finding results showed that the production of Sitiwinangun pottery, in the technique and motifs, were still produced according to the ancestors. Pottery has a closed-relationship to agrarian culture of Sitiwinangun's society. In cultivating season, the soil was used not only used to cultivate rice and palawija (crops planted as second crop in dry season) but it was also used to dig a layer of soil as the raw material of pottery. There were some potential threats on Sitiwinangun Pottery such as a reduction in raw material because of the land-settlement, slow regeneration, and consumers' preferred on household appliance made of plastic. Nevertheless, it never decreases the spirit of Sitiwinangun society to maintain the pottery as their local wisdom. They keep on their principle that the nature gives the value on their life and the value is an ancestral heritage that must be maintained in modern era in order to preserve the environment. Furthermore, the most important is that pottery is not only made as the functional object for human activity but it is made as the local knowledge of Sitiwinagun that very allows to be learnt intact and sustainable.

  7. Backcasting the decline of a vulnerable Great Plains reproductive ecotype: identifying threats and conservation priorities

    Science.gov (United States)

    Worthington, Thomas A.; Brewer, Shannon K.; Grabowski, Timothy B.; Mueller, Julia

    2014-01-01

    Conservation efforts for threatened or endangered species are challenging because the multi-scale factors that relate to their decline or inhibit their recovery are often unknown. To further exacerbate matters, the perceptions associated with the mechanisms of species decline are often viewed myopically rather than across the entire species range. We used over 80 years of fish presence data collected from the Great Plains and associated ecoregions of the United States, to investigate the relative influence of changing environmental factors on the historic and current truncated distributions of the Arkansas River shiner Notropis girardi. Arkansas River shiner represent a threatened reproductive ecotype considered especially well adapted to the harsh environmental extremes of the Great Plains. Historic (n = 163 records) and current (n = 47 records) species distribution models were constructed using a vector-based approach in MaxEnt by splitting the available data at a time when Arkansas River shiner dramatically declined. Discharge and stream order were significant predictors in both models; however, the shape of the relationship between the predictors and species presence varied between time periods. Drift distance (river fragment length available for ichthyoplankton downstream drift before meeting a barrier) was a more important predictor in the current model and indicated river segments 375–780 km had the highest probability of species presence. Performance for the historic and current models was high (area under the curve; AUC > 0.95); however, forecasting and backcasting to alternative time periods suggested less predictive power. Our results identify fragments that could be considered refuges for endemic plains fish species and we highlight significant environmental factors (e.g., discharge) that could be manipulated to aid recovery.

  8. 49 CFR 192.917 - How does an operator identify potential threats to pipeline integrity and use the threat...

    Science.gov (United States)

    2010-10-01

    ... Transportation Other Regulations Relating to Transportation (Continued) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192...

  9. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  10. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    International Nuclear Information System (INIS)

    Heineke, J.M.

    1978-01-01

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed

  11. State Anxiety Carried Over From Prior Threat Increases Late Positive Potential Amplitude During an Instructed Emotion Regulation Task

    Science.gov (United States)

    Pedersen, Walker S.; Larson, Christine L.

    2018-01-01

    Emotion regulation has important consequences for emotional and mental health (Saxena, Dubey & Pandey, 2011) and is dependent on executive function (Eisenberg, Smith & Spinrad, 2011). Because state anxiety disrupts executive function (Robinson, Vytal, Cornwell & Grillon, 2013), we tested whether state anxiety disrupts emotion regulation by having participants complete an instructed emotion regulation task, while under threat of unpredictable shock and while safe from shock. We used the late positive potential (LPP) component of the event related potential to measure emotion regulation success. We predicted that LPP responses to negatively valenced images would be modulated by participants’ attempts to increase and decrease their emotions when safe from shock, but not while under threat of shock. Our manipulation check revealed an order effect such that for participants who completed the threat of shock condition first self-reported state anxiety carried over into the subsequent safe condition. Additionally, we found that although instructions to regulate affected participants’ ratings of how unpleasant the images made them feel, instructions to regulate had no effect on LPP amplitude regardless of threat condition. Instead we found that participants who received the threat condition prior to safe had greater LPP responses to all images in the safe condition. We posit that the carryover of anxiety resulted in misattribution of arousal and potentiation of neural responses to the images in the safe condition. Thus, our results imply that physiological arousal and cognition combine to influence the basic neural response to emotional stimuli. PMID:27055095

  12. Defense Acquisitions: Antiarmor Munitions Master Plan Does Not Identify Potential Excesses or Support Planned Procurements

    National Research Council Canada - National Science Library

    2000-01-01

    .... According to the report, the plan should identify the projected armored threat and the projected quantity of all antiarmor weapons, whether fielded or in development, with the purpose of identifying...

  13. Using empirical models of species colonization under multiple threatening processes to identify complementary threat-mitigation strategies.

    Science.gov (United States)

    Tulloch, Ayesha I T; Mortelliti, Alessio; Kay, Geoffrey M; Florance, Daniel; Lindenmayer, David

    2016-08-01

    Approaches to prioritize conservation actions are gaining popularity. However, limited empirical evidence exists on which species might benefit most from threat mitigation and on what combination of threats, if mitigated simultaneously, would result in the best outcomes for biodiversity. We devised a way to prioritize threat mitigation at a regional scale with empirical evidence based on predicted changes to population dynamics-information that is lacking in most threat-management prioritization frameworks that rely on expert elicitation. We used dynamic occupancy models to investigate the effects of multiple threats (tree cover, grazing, and presence of an hyperaggressive competitor, the Noisy Miner (Manorina melanocephala) on bird-population dynamics in an endangered woodland community in southeastern Australia. The 3 threatening processes had different effects on different species. We used predicted patch-colonization probabilities to estimate the benefit to each species of removing one or more threats. We then determined the complementary set of threat-mitigation strategies that maximized colonization of all species while ensuring that redundant actions with little benefit were avoided. The single action that resulted in the highest colonization was increasing tree cover, which increased patch colonization by 5% and 11% on average across all species and for declining species, respectively. Combining Noisy Miner control with increasing tree cover increased species colonization by 10% and 19% on average for all species and for declining species respectively, and was a higher priority than changing grazing regimes. Guidance for prioritizing threat mitigation is critical in the face of cumulative threatening processes. By incorporating population dynamics in prioritization of threat management, our approach helps ensure funding is not wasted on ineffective management programs that target the wrong threats or species. © 2016 Society for Conservation Biology.

  14. Potential and real ecological threat of heavy metals in contaminated soils

    Science.gov (United States)

    Motuzova, Galina; Barsova, Natalia; Makarichev, Ivan; Karpova, Elena

    2013-04-01

    Introduction. Microelements or heavy metals (HM) occur in nature and are required for living organisms at low concentrations. High content of HM in soils characterize their potential danger for ecosystem. Their real ecological threat is presented by the mobility of HM in soils. The aim of this work was to characterize the potential and real danger of HM on the basis of HM mobility in soils and their influence of the most important soils properties. Materials and methods. Two types of materials are presented in this paper. The first ones are presented by the summarized information about the content of Cu, Zn, Mn and their mobile species in the soils of Russia and are included into the National Atlas of Russian soils (2011). The second part is presented by the results of laboratory experiments with some samples of Podzols, Podzoluvisol and Chernozem. The following parameters have been determined: a) the main chemical properties of soils; b) the water extracts from soils were investigated by the potentiometric titration with HM salts; c) the properties of the samples of humic acids (HA, extracted by 1n. NaOH) and HA-Cu complexes were determined: molecular-masses distribution (MMD), infrared spectra (IRS), hydrophobility, 1? NMR spectra Results and discussions. The major part of HM in soils of natural landscapes is firmly bound to several minerals. Their threat for living organisms is largely dependent on a relatively higher mobility of HM in soils. The main factors affecting the mobility of HM include soil reaction and sorption processes. In soils of natural landscapes the share of mobile HM compounds is estimated as some per cents from their total content. Having used the data about microelements in soils, their availability to living organisms, 14 natural biogeochemical provinces have been distinguished at the territory of the European part of the former USSR. It permitted to show the adverse impact rendered by microelements at low or high concentrations on living

  15. Effects of Aging Stereotype Threat on Working Self-Concepts: An Event-Related Potentials Approach

    Directory of Open Access Journals (Sweden)

    Baoshan Zhang

    2017-07-01

    Full Text Available Although the influence of stereotype threat (ST on working self-concepts has been highlighted in recent years, its neural underpinnings are unclear. Notably, the aging ST, which largely influences older adults’ cognitive ability, mental and physical health, did not receive much attention. In order to investigate these issues, electroencephalogram (EEG data were obtained from older adults during a modified Stroop task using neutral words, positive and negative self-concept words in aging ST vs. neutral control conditions. Results showed longer reaction times (RTs for identifying colors of words under the aging ST compared to the neutral condition. More importantly, the negative self-concept elicited more positive late P300 amplitudes and enhanced theta band activities compared to the positive self-concept or neutral words under the aging ST condition, whereas no difference was found between these self-concepts and neutral words in the control condition. Furthermore, the aging ST induced smaller theta band synchronization and enhanced alpha band synchronization compared to the control condition. Moreover, we also observed valence differences in self-concepts where the negative self-concept words reduced early P150/N170 complex relative to neutral words. These findings suggest that priming ST could activate negative self-concepts as current working self-concept, and that this influence occurred during a late neural time course.

  16. Effects of Aging Stereotype Threat on Working Self-Concepts: An Event-Related Potentials Approach

    Science.gov (United States)

    Zhang, Baoshan; Lin, Yao; Gao, Qianyun; Zawisza, Magdalena; Kang, Qian; Chen, Xuhai

    2017-01-01

    Although the influence of stereotype threat (ST) on working self-concepts has been highlighted in recent years, its neural underpinnings are unclear. Notably, the aging ST, which largely influences older adults’ cognitive ability, mental and physical health, did not receive much attention. In order to investigate these issues, electroencephalogram (EEG) data were obtained from older adults during a modified Stroop task using neutral words, positive and negative self-concept words in aging ST vs. neutral control conditions. Results showed longer reaction times (RTs) for identifying colors of words under the aging ST compared to the neutral condition. More importantly, the negative self-concept elicited more positive late P300 amplitudes and enhanced theta band activities compared to the positive self-concept or neutral words under the aging ST condition, whereas no difference was found between these self-concepts and neutral words in the control condition. Furthermore, the aging ST induced smaller theta band synchronization and enhanced alpha band synchronization compared to the control condition. Moreover, we also observed valence differences in self-concepts where the negative self-concept words reduced early P150/N170 complex relative to neutral words. These findings suggest that priming ST could activate negative self-concepts as current working self-concept, and that this influence occurred during a late neural time course. PMID:28747885

  17. Modelling intelligence-led policing to identify its potential

    NARCIS (Netherlands)

    Hengst-Bruggeling, M. den; Graaf, H.A.L.M. de; Scheepstal, P.G.M. van

    2014-01-01

    lntelligence-led policing is a concept of policing that has been applied throughout the world. Despite some encouraging reports, the effect of intelligence-led policing is largely unknown. This paper presents a method with which it is possible to identify intelligence-led policing's potential to

  18. Historical evolution of human anthrax from occupational disease to potentially global threat as bioweapon.

    Science.gov (United States)

    D'Amelio, Enrico; Gentile, Bernardina; Lista, Florigio; D'Amelio, Raffaele

    2015-12-01

    Anthrax is caused by Bacillus anthracis, which can naturally infect livestock, wildlife and occupationally exposed humans. However, for its resistance due to spore formation, ease of dissemination, persistence in the environment and high virulence, B. anthracis has been considered the most serious bioterrorism agent for a long time. During the last century anthrax evolved from limited natural disease to potentially global threat if used as bioweapon. Several factors may mitigate the consequences of an anthrax attack, including 1. the capability to promptly recognize and manage the illness and its public health consequences; 2. the limitation of secondary contamination risk through an appropriate decontamination; and 3. the evolution of genotyping methods (for microbes characterization at high resolution level) that can influence the course and/or focus of investigations, impacting the response of the government to an attack. A PubMed search has been done using the key words “bioterrorism anthrax”. Over one thousand papers have been screened and the most significant examined to present a comprehensive literature review in order to discuss the current knowledge and strategies in preparedness for a possible deliberate release of B. anthracis spores and to indicate the most current and complete documents in which to deepen. The comprehensive analysis of the two most relevant unnatural anthrax release events, Sverdlovsk in the former Soviet Union (1979) and the contaminated letters in the USA (2001), shows that inhalational anthrax may easily and cheaply be spread resulting in serious consequences. The damage caused by an anthrax attack can be limited if public health organization, first responders, researchers and investigators will be able to promptly manage anthrax cases and use new technologies for decontamination methods and in forensic microbiology.

  19. A GIS methodology to identify potential corn stover collection locations

    Energy Technology Data Exchange (ETDEWEB)

    Haddad, Monica A. [Department of Community and Regional Planning, 583 College of Design, Iowa State University, Ames, IA 50011-3095 (United States); Anderson, Paul F. [Department of Landscape Architecture, 481 College of Design, Iowa State University, Ames, IA 50011 (United States); Department of Agronomy, 481 College of Design, Iowa State University, Ames, IA 50011 (United States)

    2008-12-15

    In this study, we use geographic information systems technology to identify potential locations in a Midwestern region for collection and storage of corn stover for use as biomass feedstock. Spatial location models are developed to identify potential collection sites along an existing railroad. Site suitability analysis is developed based on two main models: agronomic productivity potential and environmental costs. The analysis includes the following steps: (1) elaboration of site selection criteria; (2) identification of the study region and service area based on transportation network analysis; (3) reclassification of input spatial layers based on common scales; (4) overlaying the reclassified spatial layers with equal weights to generate the two main models; and (5) overlaying the main models using different weights. A pluralistic approach is adopted, presenting three different scenarios as alternatives for the potential locations. Our results suggest that there is a significant subset of potential sites that meet site selection criteria. Additional studies are needed to evaluate potential sites through field visits, assess economic and social costs, and estimate the proportion of corn producers willing to sell and transport corn stover to collection facilities. (author)

  20. Identifying potential kidney donors using social networking web sites.

    Science.gov (United States)

    Chang, Alexander; Anderson, Emily E; Turner, Hang T; Shoham, David; Hou, Susan H; Grams, Morgan

    2013-01-01

    Social networking sites like Facebook may be a powerful tool for increasing rates of live kidney donation. They allow for wide dissemination of information and discussion and could lessen anxiety associated with a face-to-face request for donation. However, sparse data exist on the use of social media for this purpose. We searched Facebook, the most popular social networking site, for publicly available English-language pages seeking kidney donors for a specific individual, abstracting information on the potential recipient, characteristics of the page itself, and whether potential donors were tested. In the 91 pages meeting inclusion criteria, the mean age of potential recipients was 37 (range: 2-69); 88% were US residents. Other posted information included the individual's photograph (76%), blood type (64%), cause of kidney disease (43%), and location (71%). Thirty-two percent of pages reported having potential donors tested, and 10% reported receiving a live-donor kidney transplant. Those reporting donor testing shared more potential recipient characteristics, provided more information about transplantation, and had higher page traffic. Facebook is already being used to identify potential kidney donors. Future studies should focus on how to safely, ethically, and effectively use social networking sites to inform potential donors and potentially expand live kidney donation. © 2013 John Wiley & Sons A/S.

  1. Defensive motivation and attention in anticipation of different types of predictable and unpredictable threat: A startle and event-related potential investigation.

    Science.gov (United States)

    Nelson, Brady D; Hajcak, Greg

    2017-08-01

    Predictability is an important characteristic of threat that impacts defensive motivation and attentional engagement. Supporting research has primarily focused on actual threat (e.g., shocks), and it is unclear whether the predictability of less intense threat (e.g., unpleasant pictures) similarly affects motivation and attention. The present study utilized a within-subject design and examined defensive motivation (startle reflex and self-reported anxiety) and attention (probe N100 and P300) in anticipation of shocks and unpleasant pictures during a no, predictable, and unpredictable threat task. This study also examined the impact of predictability on the P300 to shocks and late positive potential (LPP) to unpleasant pictures. The startle reflex and self-reported anxiety were increased in anticipation of both types of threat relative to no threat. Furthermore, startle potentiation in anticipation of unpredictable threat was greater for shocks compared to unpleasant pictures, but there was no difference for predictable threat. The probe N100 was enhanced in anticipation of unpredictable threat relative to predictable threat and no threat, and the probe P300 was suppressed in anticipation of predictable and unpredictable threat relative to no threat. These effects did not differ between the shock and unpleasant picture trials. Finally, the P300 and early LPP component were increased in response to unpredictable relative to predictable shocks and unpleasant pictures, respectively. The present study suggests that the unpredictability of unpleasant pictures increases defensive motivation, but to a lesser degree relative to actual threat. Moreover, unpredictability enhances attentional engagement in anticipation of, and in reaction to, both types of threat. © 2017 Society for Psychophysiological Research.

  2. Identifying product development crises: The potential of adaptive heuristics

    DEFF Research Database (Denmark)

    Münzberger, C.; Stingl, Verena; Oehmen, Josef

    2017-01-01

    This paper introduces adaptive heuristics as a tool to identify crises in design projects and highlights potential applications of these heuristics as decision support tool for crisis identification. Crises may emerge slowly or suddenly, and often have ambiguous signals. Thus the identification...... for the application of heuristics in design sciences. To achieve this, the paper compares crises to 'business as usual', and presents sixteen indicators for emerging crises. These indicators are potential cues for adaptive heuristics. Specifically three adaptive heuristics, One-single-cue, Fast-and-Frugal-Trees...

  3. Antibody Arrays Identify Potential Diagnostic Markers of Hepatocellular Carcinoma

    Directory of Open Access Journals (Sweden)

    Brian J. Peter

    2008-01-01

    Full Text Available Hepatocellular carcinoma (HCC is the third leading cause of cancer deaths worldwide. Effective treatment of HCC patients is hampered by the lack of sensitive and specific diagnostic markers of HCC. Alpha-fetoprotein (AFP, the currently used HCC marker, misses 30%–50% of HCC patients, who therefore remain undiagnosed and untreated. In order to identify novel diagnostic markers that can be used individually or in combination with AFP, we used an antibody array platform to detect the levels of candidate proteins in the plasma of HCC patients (n = 48 and patients with chronic hepatitis B or C viral infections (n = 19 (both of which are the major risk factors of HCC. We identified 7 proteins that significantly differentiate HCC patients from hepatitis patients (p < 0.05 (AFP, CTNNB, CSF1, SELL, IGFBP6, IL6R, and VCAM1.Importantly, we also identified 8 proteins that significantly differentiate HCC patients with ‘normal’ levels of AFP (<20 ng/ml from hepatitis patients (p < 0.05 (IL1RN, IFNG, CDKN1A, RETN, CXCL14, CTNNB, FGF2, and SELL. These markers are potentially important complementary markers to AFP. Using an independent immunoassay method in an independent group of 23 HCC patients and 22 hepatitis patients, we validated that plasma levels of CTNNB were significantly higher in the HCC group (p = 0.020. In conclusion, we used an antibody array platform to identify potential circulating diagnostic markers of HCC, some of which may be valuable when used in combination with AFP. The clinical utility of these newly identified HCC diagnostic markers needs to be systematically evaluated.

  4. Climate change and nesting behaviour in vertebrates: a review of the ecological threats and potential for adaptive responses.

    Science.gov (United States)

    Mainwaring, Mark C; Barber, Iain; Deeming, Denis C; Pike, David A; Roznik, Elizabeth A; Hartley, Ian R

    2017-11-01

    Nest building is a taxonomically widespread and diverse trait that allows animals to alter local environments to create optimal conditions for offspring development. However, there is growing evidence that climate change is adversely affecting nest-building in animals directly, for example via sea-level rises that flood nests, reduced availability of building materials, and suboptimal sex allocation in species exhibiting temperature-dependent sex determination. Climate change is also affecting nesting species indirectly, via range shifts into suboptimal nesting areas, reduced quality of nest-building environments, and changes in interactions with nest predators and parasites. The ability of animals to adapt to sustained and rapid environmental change is crucial for the long-term persistence of many species. Many animals are known to be capable of adjusting nesting behaviour adaptively across environmental gradients and in line with seasonal changes, and this existing plasticity potentially facilitates adaptation to anthropogenic climate change. However, whilst alterations in nesting phenology, site selection and design may facilitate short-term adaptations, the ability of nest-building animals to adapt over longer timescales is likely to be influenced by the heritable basis of such behaviour. We urgently need to understand how the behaviour and ecology of nest-building in animals is affected by climate change, and particularly how altered patterns of nesting behaviour affect individual fitness and population persistence. We begin our review by summarising how predictable variation in environmental conditions influences nest-building animals, before highlighting the ecological threats facing nest-building animals experiencing anthropogenic climate change and examining the potential for changes in nest location and/or design to provide adaptive short- and long-term responses to changing environmental conditions. We end by identifying areas that we believe warrant the

  5. Microbiological air pollution of production room of the meat processing plant as a potential threat to the workers

    Directory of Open Access Journals (Sweden)

    Barbara Breza-Boruta

    2015-12-01

    Full Text Available Introduction. Production rooms of the meat plants are the specific environment that require constant monitoring of microbiological air purity. Bioaerosols pose a threat to the safety of produced food and a considerable risk to health of exposed workers. The aim of this study was to estimate the air microbiological pollution in production rooms of the meat processing plant and exposure of the workers to biological aerosol. Material and methods. Air samples were collected at 3 stands in production rooms during winter, with the compaction method using the impactor MAS-100. The total number of bacteria and moulds, Staphylococci and bacteria of the family Enterobacteriaceae were determined in the studied bioaerosol. The concentration of microorganisms was presented in the form of colony forming units in 1m3 of air. Results. The highest concentration of mesophylic bacteria was found at stand 1 – at the freezing tunnel; whereas the highest contamination with staphylococci and fungal aerosol was found in the room where several workers were employed at packing frozen food. Among determined fungi predominated moulds of the genera: Penicillium, Alternaria and Cladosporium. Also species of potentially pathogenic fungi which produce toxins and have allergizing properties were detected in the studied bioaerosol. Bacteria of the family Enterobacteriaceae, which also may cause many infavourable health effects in exposed people, occurred at all stands. Conclusion. The concentration level and microbial composition in the inhaled air make valuable information for determination of occupational risk and a potential threat to workers of their workstations. Potentially pathogenic microorganisms present in the studied air (staphylococci, bacteria of the family Enterobacteriaceae and some moulds according to the Directive 2000/54/EC l belong to the 2nd group of risk and threat of harmful biological agents. Identification of biological threats makes it easier for the

  6. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  7. Newer Approaches to Identify Potential Untoward Effects in Functional Foods.

    Science.gov (United States)

    Marone, Palma Ann; Birkenbach, Victoria L; Hayes, A Wallace

    2016-01-01

    Globalization has greatly accelerated the numbers and variety of food and beverage products available worldwide. The exchange among greater numbers of countries, manufacturers, and products in the United States and worldwide has necessitated enhanced quality measures for nutritional products for larger populations increasingly reliant on functionality. These functional foods, those that provide benefit beyond basic nutrition, are increasingly being used for their potential to alleviate food insufficiency while enhancing quality and longevity of life. In the United States alone, a steady import increase of greater than 15% per year or 24 million shipments, over 70% products of which are food related, is regulated under the Food and Drug Administration (FDA). This unparalleled growth has resulted in the need for faster, cheaper, and better safety and efficacy screening methods in the form of harmonized guidelines and recommendations for product standardization. In an effort to meet this need, the in vitro toxicology testing market has similarly grown with an anticipatory 15% increase between 2010 and 2015 of US$1.3 to US$2.7 billion. Although traditionally occupying a small fraction of the market behind pharmaceuticals and cosmetic/household products, the scope of functional food testing, including additives/supplements, ingredients, residues, contact/processing, and contaminants, is potentially expansive. Similarly, as functional food testing has progressed, so has the need to identify potential adverse factors that threaten the safety and quality of these products. © The Author(s) 2015.

  8. Evaluation of laser-induced breakdown spectroscopy analysis potential for addressing radiological threats from a distance

    International Nuclear Information System (INIS)

    Gaona, I.; Serrano, J.; Moros, J.; Laserna, J.J.

    2014-01-01

    Although radioactive materials are nowadays valuable tools in nearly all fields of modern science and technology, the dangers stemming from the uncontrolled use of ionizing radiation are more than evident. Since preparedness is a key issue to face the risks of a radiation dispersal event, development of rapid and efficient monitoring technologies to control the contamination caused by radioactive materials is of crucial interest. Laser-induced breakdown spectroscopy (LIBS) exhibits appealing features for this application. This research focuses on the assessment of LIBS potential for the in-situ fingerprinting and identification of radioactive material surrogates from a safe distance. LIBS selectivity and sensitivity to detect a variety of radioactive surrogates, namely 59 Co, 88 Sr, 130 Ba, 133 Cs, 193 Ir and 238 U, on the surface of common urban materials at a distance of 30 m have been evaluated. The performance of the technique for nuclear forensics has been also studied on different model scenarios. Findings have revealed the difficulties to detect and to identify the analytes depending on the surface being interrogated. However, as demonstrated, LIBS shows potential enough for prompt and accurate gathering of essential evidence at a number of sites after the release, either accidental or intentional, of radioactive material. The capability of standoff analysis confers to LIBS unique advantages in terms of fast and safe inspection of forensic scenarios. The identity of the radioactive surrogates is easily assigned from a distance and the sensitivity to their detection is in the range of a few hundreds of ng per square centimeter. - Highlights: • Distant identification of radioactive surrogates on urban surfaces has been proved. • LIBS sensitivity to distant detection of radioactive surrogates has been checked. • Influences of the atmosphere on emission signals have been ascertained. • Usage of standoff LIBS for identifying forensic evidences has been

  9. Evaluation of laser-induced breakdown spectroscopy analysis potential for addressing radiological threats from a distance

    Energy Technology Data Exchange (ETDEWEB)

    Gaona, I.; Serrano, J.; Moros, J.; Laserna, J.J., E-mail: laserna@uma.es

    2014-06-01

    Although radioactive materials are nowadays valuable tools in nearly all fields of modern science and technology, the dangers stemming from the uncontrolled use of ionizing radiation are more than evident. Since preparedness is a key issue to face the risks of a radiation dispersal event, development of rapid and efficient monitoring technologies to control the contamination caused by radioactive materials is of crucial interest. Laser-induced breakdown spectroscopy (LIBS) exhibits appealing features for this application. This research focuses on the assessment of LIBS potential for the in-situ fingerprinting and identification of radioactive material surrogates from a safe distance. LIBS selectivity and sensitivity to detect a variety of radioactive surrogates, namely {sup 59}Co, {sup 88}Sr, {sup 130}Ba, {sup 133}Cs, {sup 193}Ir and {sup 238}U, on the surface of common urban materials at a distance of 30 m have been evaluated. The performance of the technique for nuclear forensics has been also studied on different model scenarios. Findings have revealed the difficulties to detect and to identify the analytes depending on the surface being interrogated. However, as demonstrated, LIBS shows potential enough for prompt and accurate gathering of essential evidence at a number of sites after the release, either accidental or intentional, of radioactive material. The capability of standoff analysis confers to LIBS unique advantages in terms of fast and safe inspection of forensic scenarios. The identity of the radioactive surrogates is easily assigned from a distance and the sensitivity to their detection is in the range of a few hundreds of ng per square centimeter. - Highlights: • Distant identification of radioactive surrogates on urban surfaces has been proved. • LIBS sensitivity to distant detection of radioactive surrogates has been checked. • Influences of the atmosphere on emission signals have been ascertained. • Usage of standoff LIBS for identifying

  10. Mitigating Latent Threats Identified through an Embedded In Situ Simulation Program and Their Comparison to Patient Safety Incidents: A Retrospective Review

    Directory of Open Access Journals (Sweden)

    Philip Knight

    2018-02-01

    Full Text Available ObjectiveTo assess the impact of service improvements implemented because of latent threats (LTs detected during in situ simulation.DesignRetrospective review from April 2008 to April 2015.SettingPaediatric Intensive Care Unit in a specialist tertiary hospital.InterventionService improvements from LTs detection during in situ simulation. Action plans from patient safety incidents (PSIs.Main outcome measuresThe quantity, category, and subsequent service improvements for LTs. The quantity, category, and subsequent action plans for PSIs. Similarities between PSIs and LTs before and after service improvements.Results201 Simulated inter-professional team training courses with 1,144 inter-professional participants. 44 LTs were identified (1 LT per 4.6 courses. Incident severity varied: 18 (41% with the potential to cause harm, 20 (46% that would have caused minimal harm, and 6 (13% that would have caused significant temporary harm. Category analysis revealed the majority of LTs were resources (36% and education and training (27%. The remainder consisted of equipment (11%, organizational and strategic (7%, work and environment (7%, medication (7%, and systems and protocols (5%. 43 service improvements were developed: 24 (55% resources/equipment; 9 (21% educational; 6 (14% organizational changes; 2 (5% staff communications; and 2 (5% guidelines. Four (9% service improvements were adopted trust wide. 32 (73% LTs did not recur after service improvements. 24 (1% of 1,946 PSIs were similar to LTs: 7 resource incidents, 7 catastrophic blood loss, 4 hyperkalaemia arrests, 3 emergency buzzer failures, and 3 difficulties contacting staff. 34 LTs (77% were never recorded as PSIs.ConclusionAn in situ simulation program can identify important LTs which traditional reporting systems miss. Subsequent improvements in workplace systems and resources can improve efficiency and remove error traps.

  11. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  12. Potential of DNA sequences to identify zoanthids (Cnidaria: Zoantharia).

    Science.gov (United States)

    Sinniger, Frederic; Reimer, James D; Pawlowski, Jan

    2008-12-01

    The order Zoantharia is known for its chaotic taxonomy and difficult morphological identification. One method that potentially could help for examining such troublesome taxa is DNA barcoding, which identifies species using standard molecular markers. The mitochondrial cytochrome oxidase subunit I (COI) has been utilized to great success in groups such as birds and insects; however, its applicability in many other groups is controversial. Recently, some studies have suggested that barcoding is not applicable to anthozoans. Here, we examine the use of COI and mitochondrial 16S ribosomal DNA for zoanthid identification. Despite the absence of a clear barcoding gap, our results show that for most of 54 zoanthid samples, both markers could separate samples to the species, or species group, level, particularly when easily accessible ecological or distributional data were included. Additionally, we have used the short V5 region of mt 16S rDNA to identify eight old (13 to 50 years old) museum samples. We discuss advantages and disadvantages of COI and mt 16S rDNA as barcodes for Zoantharia, and recommend that either one or both of these markers be considered for zoanthid identification in the future.

  13. Potential of VIIRS Data for Regional Monitoring of Gypsy Moth Defoliation: Implications for Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, Joseph P.; Ryan, Robert E.; Smoot, James C.; Prados, Donald; McKellip, Rodney; Sader. Steven A.; Gasser, Jerry; May, George; Hargrove, William

    2007-01-01

    A NASA RPC (Rapid Prototyping Capability) experiment was conducted to assess the potential of VIIRS (Visible/Infrared Imager/Radiometer Suite) data for monitoring non-native gypsy moth (Lymantria dispar) defoliation of forests. This experiment compares defoliation detection products computed from simulated VIIRS and from MODIS (Moderate Resolution Imaging Spectroradiometer) time series products as potential inputs to a forest threat EWS (Early Warning System) being developed for the USFS (USDA Forest Service). Gypsy moth causes extensive defoliation of broadleaved forests in the United States and is specifically identified in the Healthy Forest Restoration Act (HFRA) of 2003. The HFRA mandates development of a national forest threat EWS. This system is being built by the USFS and NASA is aiding integration of needed satellite data products into this system, including MODIS products. This RPC experiment enabled the MODIS follow-on, VIIRS, to be evaluated as a data source for EWS forest monitoring products. The experiment included 1) assessment of MODIS-simulated VIIRS NDVI products, and 2) evaluation of gypsy moth defoliation mapping products from MODIS-simulated VIIRS and from MODIS NDVI time series data. This experiment employed MODIS data collected over the approximately 15 million acre mid-Appalachian Highlands during the annual peak defoliation time frame (approximately June 10 through July 27) during 2000-2006. NASA Stennis Application Research Toolbox software was used to produce MODIS-simulated VIIRS data and NASA Stennis Time Series Product Tool software was employed to process MODIS and MODIS-simulated VIIRS time series data scaled to planetary reflectance. MODIS-simulated VIIRS data was assessed through comparison to Hyperion-simulated VIIRS data using data collected during gypsy moth defoliation. Hyperion-simulated MODIS data showed a high correlation with actual MODIS data (NDVI R2 of 0.877 and RMSE of 0.023). MODIS-simulated VIIRS data for the same

  14. Potential Threats Posed by Tetrodotoxins in UK Waters: Examination of Detection Methodology Used in Their Control

    Directory of Open Access Journals (Sweden)

    Andrew D. Turner

    2015-12-01

    Full Text Available Tetrodotoxin is a neurotoxin responsible for many human fatalities, most commonly following the consumption of pufferfish. Whilst the source of the toxin has not been conclusively proven, it is thought to be associated with various species of marine bacteria. Whilst the toxins are well studied in fish and gastropods, in recent years, there have been a number of reports of tetrodotoxin occurring in bivalve shellfish, including those harvested from the UK and other parts of Europe. This paper reviews evidence concerning the prevalence of tetrodotoxins in the UK together with methodologies currently available for testing. Biological, biomolecular and chemical methods are reviewed, including recommendations for further work. With the recent development of quantitative chromatographic methods for these and other hydrophilic toxins, as well as the commercial availability of rapid testing kits, there are a number of options available to ensure consumers are protected against this threat.

  15. Invasive ornamental fish: a potential threat to aquatic biodiversity in peninsular India

    Directory of Open Access Journals (Sweden)

    J.D.M. Knight

    2010-02-01

    Full Text Available Alien fish find their way into newer habitats and ecosystems opportunistically. Once in a new habitat, these species try to occupy empty niches and compete with native species. An alien species becomes invasive wherever it has a competetive advantage over native species. Ecology of aquatic invasive alien species is rather poorly understood as most attention has been on invertebrates as that which spread through ballast water. Invasive alien species of fish that have taken advantage of the aquarium trade are emerging as the most important threats to fragile aquatic habitats. Regulations to this trade are rather weak and there is a general lack of data on the ecological impact of alien fish species despite the fact that a third of the world’s worst aquatic invasive species are aquarium or ornamental species.

  16. Obtaining subjects' consent to publish identifying personal information: current practices and identifying potential issues.

    Science.gov (United States)

    Yoshida, Akiko; Dowa, Yuri; Murakami, Hiromi; Kosugi, Shinji

    2013-11-25

    In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information. Content analysis was carried out on instructions for authors and consent forms developed by academic journals in four fields (as classified by Journal Citation Reports): medicine general and internal, genetics and heredity, pediatrics, and psychiatry. An online questionnaire survey of editors working for journals that require the submission of consent forms was also conducted. Instructions for authors were reviewed for 491 academic journals (132 for medicine general and internal, 147 for genetics and heredity, 100 for pediatrics, and 112 for psychiatry). Approximately 40% (203: 74 for medicine general and internal, 31 for genetics and heredity, 58 for pediatrics, and 40 for psychiatry) stated that subject consent was necessary. The submission of consent forms was required by 30% (154) of the journals studied, and 10% (50) provided their own consent forms for authors to use. Two journals mentioned that the possible effects of publication on subjects should be considered. Many journal consent forms mentioned the difficulties in ensuring complete anonymity of subjects, but few addressed the study objective, the subjects' right to refuse consent and the withdrawal of consent. The main reason for requiring the submission of consent forms was to confirm that consent had been obtained. Approximately 40% of journals required subject consent to be obtained. However, differences were observed depending on the fields. Specific considerations were not always documented. There is a need to address issues around the study

  17. Obtaining subjects’ consent to publish identifying personal information: current practices and identifying potential issues

    Science.gov (United States)

    2013-01-01

    Background In studies publishing identifying personal information, obtaining consent is regarded as necessary, as it is impossible to ensure complete anonymity. However, current journal practices around specific points to consider when obtaining consent, the contents of consent forms and how consent forms are managed have not yet been fully examined. This study was conducted to identify potential issues surrounding consent to publish identifying personal information. Methods Content analysis was carried out on instructions for authors and consent forms developed by academic journals in four fields (as classified by Journal Citation Reports): medicine general and internal, genetics and heredity, pediatrics, and psychiatry. An online questionnaire survey of editors working for journals that require the submission of consent forms was also conducted. Results Instructions for authors were reviewed for 491 academic journals (132 for medicine general and internal, 147 for genetics and heredity, 100 for pediatrics, and 112 for psychiatry). Approximately 40% (203: 74 for medicine general and internal, 31 for genetics and heredity, 58 for pediatrics, and 40 for psychiatry) stated that subject consent was necessary. The submission of consent forms was required by 30% (154) of the journals studied, and 10% (50) provided their own consent forms for authors to use. Two journals mentioned that the possible effects of publication on subjects should be considered. Many journal consent forms mentioned the difficulties in ensuring complete anonymity of subjects, but few addressed the study objective, the subjects’ right to refuse consent and the withdrawal of consent. The main reason for requiring the submission of consent forms was to confirm that consent had been obtained. Conclusion Approximately 40% of journals required subject consent to be obtained. However, differences were observed depending on the fields. Specific considerations were not always documented. There is a need

  18. Mercury contamination, a potential threat to the globally endangered aquatic warbler Acrocephalus paludicola.

    Science.gov (United States)

    Pacyna, Aneta Dorota; Martínez, Carlos Zumalacárregui; Miguélez, David; Jiguet, Frédéric; Polkowska, Żaneta; Wojczulanis-Jakubas, Katarzyna

    2017-12-01

    Mercury (Hg) contamination is considered a global concern for humans and wildlife, and although the number of studies dealing with that issue continues to increase, some taxonomic groups such as small passerine birds are largely understudied. In this paper, concentration of mercury in the aquatic warbler (Acrocephalus paludicola) feathers, a globally threatened passerine species, was examined. The concentration differences between two ages and sexes were investigated. The comparison of feathers taken on autumn migrants of two age categories act as a comparison of the species' exposure within the two different areas (European breeding or African wintering grounds). The average Hg concentration for all sampled individuals [2.32 μg/g dw (range 0.38-12.76)] is relatively high, compared with values found in other passerine species. An age difference was found, with first-year individuals displaying higher mercury concentrations than adults. This indicates that birds are exposed to mercury pollution during the breeding season, i.e., in the continental floodplains of eastern Europe. The average Hg concentration in feathers grown on the breeding grounds was 3.88 ± 2.59 μg/g dw, closer to the critical value of 5 μg/g dw, which is considered to impair the health of individuals. The findings suggest that mercury pollution may constitute a threat so far neglected for the endangered aquatic warbler.

  19. Beware of the predatory science journal: A potential threat to the integrity of medical research.

    Science.gov (United States)

    Johal, Jaspreet; Ward, Robert; Gielecki, Jerzy; Walocha, Jerzy; Natsis, Kostantinos; Tubbs, R Shane; Loukas, Marios

    2017-09-01

    The issue of predatory journals has become increasingly more prevalent over the past decade, as the open-access model of publishing has gained prominence. Although the open-access model is well intentioned to increase accessibility of biomedical research, it is vulnerable to exploitation by those looking to corrupt medical academia and circumvent ethics and research standards. Predatory journals will achieve publication by either soliciting unsuspecting researchers who have legitimate research but fall victim to these predators or researchers looking to quickly publish their research without a thorough review process. Some features of predatory journals are a quick non-peer-review process, falsely listing or exaggerating the credibility of editorial board members, and either lack of or falsification of institutional affiliations and database listings. These predatory journals are a serious threat to the integrity of medical research, as they will infect the available literature with unsubstantiated articles, and allow low-quality research. A number of steps can be taken to prevent the spread and increase awareness of predatory publishers, and these must be done to maintain the integrity of medical academia. Clin. Anat. 30:767-773, 2017. © 2017Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  20. On the Behaviour, abundance, habitat use and potential threats of the Gangetic Dolphin Platanista gangetica in southern West Bengal, India

    Directory of Open Access Journals (Sweden)

    Mahua Roy Chowdhury

    2016-08-01

    Full Text Available The Ganga River Dolphin Platanista gangetica Roxburgh, 1801 is a globally endangered cetacean found in the River system of Ganga, Brahmaputra and Meghna in Bangladesh and India.  A survey and research were conducted from 2012–2014 to explore the behaviour, abundance, habitat use and potential threats of the Dolphin in the lower, middle and upper stretches of the river Ganga and its tributaries in southern West Bengal.  The study recorded different types of surfacing patterns with respect to their age class as well as on diurnal activity pattern of the individual. The adults and sub-adults were found to have different types of surfacing during different hours of the day.  The morning and afternoon were observed to be feeding hours of the Dolphin.  Multiple potential threats were encountered during the present study such as destructive fishing gears, dumping of solid and municipal waste, industrial effluents, agricultural run-off, construction of water structures, water extraction and reduction of river depth attributed to siltation.  These factors contributed to the present study of the river dolphins in the Ganga, which are localised at certain pockets in good number.  

  1. Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

    Directory of Open Access Journals (Sweden)

    Jungsuk Song

    2017-02-01

    Full Text Available The darknet (i.e., a set of unused IP addresses is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet (‘the darknet traffic’ do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers, operators, etc. to identify whether the source hosts of the darknet traffic are infected by real malware or not. In this paper, we present the overall procedure of the in-depth analysis between the darknet traffic and IDS alerts using real data collected at the Science and Technology Cyber Security Center (S&T CSC in Korea and provide the detailed in-depth analysis results. The ultimate goal of this paper is to provide practical experience, insight and know-how to security experts so that they are able to identify and trace the root cause of the darknet traffic. The experimental results show that correlation analysis between the darknet traffic and IDS alerts is very useful to discover potential attack hosts, especially internal hosts, and to find out what kinds of malware infected them.

  2. Use of multi-criteria decision analysis to identify potentially dangerous glacial lakes.

    Science.gov (United States)

    Kougkoulos, Ioannis; Cook, Simon J; Jomelli, Vincent; Clarke, Leon; Symeonakis, Elias; Dortch, Jason M; Edwards, Laura A; Merad, Myriam

    2018-04-15

    Glacial Lake Outburst Floods (GLOFs) represent a significant threat in deglaciating environments, necessitating the development of GLOF hazard and risk assessment procedures. Here, we outline a Multi-Criteria Decision Analysis (MCDA) approach that can be used to rapidly identify potentially dangerous lakes in regions without existing tailored GLOF risk assessments, where a range of glacial lake types exist, and where field data are sparse or non-existent. Our MCDA model (1) is desk-based and uses freely and widely available data inputs and software, and (2) allows the relative risk posed by a range of glacial lake types to be assessed simultaneously within any region. A review of the factors that influence GLOF risk, combined with the strict rules of criteria selection inherent to MCDA, has allowed us to identify 13 exhaustive, non-redundant, and consistent risk criteria. We use our MCDA model to assess the risk of 16 extant glacial lakes and 6 lakes that have already generated GLOFs, and found that our results agree well with previous studies. For the first time in GLOF risk assessment, we employed sensitivity analyses to test the strength of our model results and assumptions, and to identify lakes that are sensitive to the criteria and risk thresholds used. A key benefit of the MCDA method is that sensitivity analyses are readily undertaken. Overall, these sensitivity analyses lend support to our model, although we suggest that further work is required to determine the relative importance of assessment criteria, and the thresholds that determine the level of risk for each criterion. As a case study, the tested method was then applied to 25 potentially dangerous lakes in the Bolivian Andes, where GLOF risk is poorly understood; 3 lakes are found to pose 'medium' or 'high' risk, and require further detailed investigation. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Orthodontic treatment with fixed appliances and biofilm formation-a potential public health threat?

    NARCIS (Netherlands)

    Ren, Yijin; Jongsma, Marije A.; Mei, Li; van der Mei, Henny C.; Busscher, Henk J.

    OBJECTIVES: Orthodontic treatment is highly popular for restoring functional and facial esthetics in juveniles and adults. As a downside, prevalence of biofilm-related complications is high. Objectives of this review are to (1) identify special features of biofilm formation in orthodontic patients

  4. Cultural landscapes as heritage in Malaysia: Potentials, threats, and current practices

    NARCIS (Netherlands)

    Ahmad, R.

    2013-01-01

    The rural cultural landscape in Malaysia is relatively under-researched. The current heritage practices focus on built heritage as national heritage, which implies the everyday landscapes of the rural areas have been neglected as potential heritage and have received little attention from politicians

  5. A tool for identifying potential Eucalyptus nitens seed orchard sites ...

    African Journals Online (AJOL)

    Shy seed production in orchards of Eucalyptus nitens is a major barrier to the deployment of genetic gain in South African plantations. A machine learning method was used to identify optimal sites for the establishment of E. nitens seed orchards within the plantation forestry landscape of the summer rainfall region of South ...

  6. REDUCING THE THREAT TO CONTROL INVASIVE SIGNAL CRAYFISH REDUCING: THE POTENTIAL USE OF PHEROMONES

    Directory of Open Access Journals (Sweden)

    STEBBING P. D.

    2003-04-01

    Full Text Available The need for an effective method of controlling invasive species of crayfish is of utmost importance given the plight of Europe’s native crayfish species. Many techniques have been applied to the growing problem with little success. Pheromones have been used to control terrestrial insect pests for a number of years with many success stories. The concept of applying pheromone control methods to the aquatic environment is by no means new, but has not been previously developed. This paper discusses the preliminary results from field trials testing traps baited with Pacifastacus leniusculus pheromones, and the potential application of the pheromones in controlling P. leniusculus populations.

  7. Identifying Potential Weapon Systems That Can Be Divested

    Science.gov (United States)

    2016-04-08

    sustainment cost mitigation strategies include reduce supply chain by maximizing multi-role equipment, reduce divestiture obstacles/friction points...question. Extensive search of the internet government websites were used to find government information and open access articles related to the research...they did not use it, and if they use anything thing else to identify these low priority systems. The intent of the survey was not to get into

  8. The European Union Joint Procurement Agreement for cross-border health threats: what is the potential for this new mechanism of health system collaboration?

    Science.gov (United States)

    Azzopardi-Muscat, Natasha; Schroder-Bäck, Peter; Brand, Helmut

    2017-01-01

    The Joint Procurement Agreement (JPA) is an innovative instrument for multi-country procurement of medical countermeasures against cross-border health threats. This paper aims to assess its potential performance. A literature review was conducted to identify key features of successful joint procurement programmes. Documentary analysis and a key informants' interview were carried out to analyse the European Union (EU) JPA. Ownership, equity, transparency, stable central financing, standardisation, flexibility and gradual development were identified as important prerequisites for successful establishment of multi-country joint procurement programmes in the literature while security of supply, favourable prices, reduction of operational costs and administrative burden and creation of professional expert networks were identified as desirable outcomes. The EU JPA appears to fulfil the criteria of ownership, transparency, equity, flexibility and gradual development. Standardisation is only partly fulfilled and central EU level financing is not provided. Security of supply is an important outcome for all EU Member States (MS). Price savings, reduction in administrative burden and creation of professional networks may be particularly attractive for the smaller MS. The JPA has the potential to increase health system collaboration and efficiency at EU level provided that the incentives for sustained commitment of larger MS are sufficiently attractive.

  9. Identifying improvement potentials in cement production with life cycle assessment.

    Science.gov (United States)

    Boesch, Michael Elias; Hellweg, Stefanie

    2010-12-01

    Cement production is an environmentally relevant process responsible for 5% of total anthropogenic carbon dioxide emissions and 7% of industrial fuel use. In this study, life cycle assessment is used to evaluate improvement potentials in the cement production process in Europe and the USA. With a current fuel substitution rate of 18% in Europe and 11% in the USA, both regions have a substantial potential to reduce greenhouse gas emissions and save virgin resources by further increasing the coprocessing of waste fuels. Upgrading production technology would be particularly effective in the USA where many kiln systems with very low energy efficiency are still in operation. Using best available technology and a thermal substitution rate of 50% for fuels, greenhouse gas emissions could be reduced by 9% for Europe and 18% for the USA per tonne of cement. Since clinker production is the dominant pollution producing step in cement production, the substitution of clinker with mineral components such as ground granulated blast furnace slag or fly ash is an efficient measure to reduce the environmental impact. Blended cements exhibit substantially lower environmental footprints than Portland cement, even if the substitutes feature lower grindability and require additional drying and large transport distances. The highest savings in CO(2) emissions and resource consumption are achieved with a combination of measures in clinker production and cement blending.

  10. Leather waste--potential threat to human health, and a new technology of its treatment.

    Science.gov (United States)

    Kolomaznik, K; Adamek, M; Andel, I; Uhlirova, M

    2008-12-30

    In this paper, the authors deal with the problem of processing various types of waste generated by leather industry, with special emphasis to chrome-tanned waste. The agent that makes this waste potentially hazardous is hexavalent chromium. Its compounds can have negative effects on human health and some CrVI salts are considered carcinogens. The authors present the risks of spontaneous oxidization of CrIII to CrVI in the open-air dumps as well as the possible risks of wearing bad quality shoes, in which the chromium content is not controlled. There are several ways of handling primary leather waste, but no satisfactory technology has been developed for the secondary waste (manipulation waste, e.g. leather scraps and used leather products). In this contribution, a new three-step hybrid technology of processing manipulation waste is presented and tested under laboratory, pilot-scale and industrial conditions. The filtrate can be used as a good quality NPK fertilizer. The solid product, titanium-chromium sludge, can serve as an inorganic pigment in glass and ceramic industry. Further, the authors propose selective collection of used leather products (e.g. old shoes), the hydrolysable parts of which can be also processed by the new hybrid technology.

  11. Arsenic and lead in foods: a potential threat to human health in Bangladesh.

    Science.gov (United States)

    Islam, Md Saiful; Ahmed, Md Kawser; Habibullah-Al-Mamun, Md; Islam, Kazi Nazrul; Ibrahim, Md; Masunaga, Shigeki

    2014-01-01

    The non-carcinogenic and carcinogenic risk of arsenic and lead to adults and children via daily dietary intake of food composites in Bangladesh was estimated. The target hazard quotients (THQs), hazard index (HI) and target carcinogenic risk (TR) were calculated to evaluate the non-carcinogenic and carcinogenic health risk from arsenic and lead. Most of the individual food composites contain a considerable amount of arsenic and lead. The highest mean concentrations of arsenic were found in cereals (0.254 mg kg⁻¹ fw) and vegetables (0.250 mg kg⁻¹ fw), and lead in vegetables (0.714 mg kg⁻¹ fw) and fish (0.326 mg kg⁻¹ fw). The results showed the highest THQs of arsenic in cereals and lead in vegetables for both adults and children which exceeded the safe limit (> 1) indicating that cereals and vegetables are the main food items contributing to the potential health risk. The estimated TR from ingesting dietary arsenic and lead from most of the foods exceeded 10⁻⁶, indicating carcinogenic risks for all adult people of the study area.

  12. Industrially contaminated areas in Serbia as a potential public health threat to the exposed population

    Directory of Open Access Journals (Sweden)

    Matić Branislava I.

    2017-01-01

    Full Text Available Mining and mineral processing is still a vital source of income in Serbia, due to mineral abundance in copper, lead, zinc, antimony. Copper mining and metal-processing are located in the east: Bor, Veliki Krivelj, Cerovo, Majdanpek. Abandoned sites from antimony mining and processing and secondary lead smelter are at the western border: Zajača, Krupanj, Stolice. Coal mining and power plants are surrounding Belgrade: Obrenovac (2 power plants, Grabovac (plant ash landfill, Kolubara and Kostolac. Main objective is to focus on potential public health hazards from industrial contamination in Serbia. Key public health issue is presence of As and Cd in ambient air PM10 close to industrially contaminated sites due to the fact that ores have high naturally occurring contents of heavy metals and metalloids. Data originate from Serbian Environmental Protection Agency, Mining and Metallurgy Institute Bor, Belgrade Institute of Public Health, as part of continuous measurement of air quality within State network of automatic stations. Concentration of As in PM10 are extremely above the limit value in Bor and Lazarevac, with Cd values slightly increased in Bor. Serbia lacks the legal framework for continuous and institutionalized follow-up of population groups vulnerable to hazardous environmental exposure, although measured concentration indicate urgent need for such activities.

  13. Potential threat to licensed nuclear activities from insiders (insider study). Technical report

    International Nuclear Information System (INIS)

    Mullen, S.A.; Davidson, J.J.; Jones, H.B. Jr.

    1980-07-01

    The Insider Study was undertaken by NRC staff at the request of the Commission. Its objectives were to: (1) determine the characteristics of potential insider adversaries to licensed nuclear activities; (2) examine security system vulnerabilities to insider adversaries; and (3) assess the effectiveness of techniques used to detect or prevent insider malevolence. The study analyzes insider characteristics as revealed in incidents of theft or sabotage that occurred in the nuclear industry, analogous industries, government agencies, and the military. Adversary characteristics are grouped into four categories: position-related, behavioral, resource and operational. It also analyzes (1) the five security vulnerabilities that most frequently accounted for the success of the insider crimes in the data base; (2) the 11 means by which insider crimes were most often detected; and (3) four major and six lesser methods aimed at preventing insider malevolence. In addition to case history information, the study contains data derived from non-NRC studies and from interviews with over 100 security experts in industry, government (federal and state), and law enforcement

  14. Identifying Initial Condition in Degenerate Parabolic Equation with Singular Potential

    Directory of Open Access Journals (Sweden)

    K. Atifi

    2017-01-01

    Full Text Available A hybrid algorithm and regularization method are proposed, for the first time, to solve the one-dimensional degenerate inverse heat conduction problem to estimate the initial temperature distribution from point measurements. The evolution of the heat is given by a degenerate parabolic equation with singular potential. This problem can be formulated in a least-squares framework, an iterative procedure which minimizes the difference between the given measurements and the value at sensor locations of a reconstructed field. The mathematical model leads to a nonconvex minimization problem. To solve it, we prove the existence of at least one solution of problem and we propose two approaches: the first is based on a Tikhonov regularization, while the second approach is based on a hybrid genetic algorithm (married genetic with descent method type gradient. Some numerical experiments are given.

  15. Potential of isotope analysis (C, Cl) to identify dechlorination mechanisms

    Science.gov (United States)

    Cretnik, Stefan; Thoreson, Kristen; Bernstein, Anat; Ebert, Karin; Buchner, Daniel; Laskov, Christine; Haderlein, Stefan; Shouakar-Stash, Orfan; Kliegman, Sarah; McNeill, Kristopher; Elsner, Martin

    2013-04-01

    Chloroethenes are commonly used in industrial applications, and detected as carcinogenic contaminants in the environment. Their dehalogenation is of environmental importance in remediation processes. However, a detailed understanding frequently accounted problem is the accumulation of toxic degradation products such as cis-dichloroethylene (cis-DCE) at contaminated sites. Several studies have addressed the reductive dehalogenation reactions using biotic and abiotic model systems, but a crucial question in this context has remained open: Do environmental transformations occur by the same mechanism as in their corresponding in vitro model systems? The presented study shows the potential to close this research gap using the latest developments in compound specific chlorine isotope analysis, which make it possible to routinely measure chlorine isotope fractionation of chloroethenes in environmental samples and complex reaction mixtures.1,2 In particular, such chlorine isotope analysis enables the measurement of isotope fractionation for two elements (i.e., C and Cl) in chloroethenes. When isotope values of both elements are plotted against each other, different slopes reflect different underlying mechanisms and are remarkably insensitive towards masking. Our results suggest that different microbial strains (G. lovleyi strain SZ, D. hafniense Y51) and the isolated cofactor cobalamin employ similar mechanisms of reductive dechlorination of TCE. In contrast, evidence for a different mechanism was obtained with cobaloxime cautioning its use as a model for biodegradation. The study shows the potential of the dual isotope approach as a tool to directly compare transformation mechanisms of environmental scenarios, biotic transformations, and their putative chemical lab scale systems. Furthermore, it serves as an essential reference when using the dual isotope approach to assess the fate of chlorinated compounds in the environment.

  16. Domestic dogs in rural area of fragmented Atlantic Forest: potential threats to wild animals

    Directory of Open Access Journals (Sweden)

    Edilberto Martinez

    2013-11-01

    Full Text Available Domestic dogs' skills such as hunting and herding shifted as man migrated from rural areas to developing urban centers and led to a change in human-dog relationship and in the purpose of these animals in the properties. The countryside of Viçosa is characterized by small coffee farms surrounded by borders with fragments from the Brazilian Atlantic Forest. The close proximity of these environments favors the encounter between domestic and wild animals which may lead to dog attacks to wild animals and, consequently, disease transmission. The aim of this study was to understand the role of dogs in the rural environment and assess the possible risks they offer to native fauna. The data were obtained from structured questionnaires answered by dogs' owners from rural Viçosa. Results regarding the socioeconomic status of the owners revealed that the majority belonged to either the middle class or low educational level categories. In addition, it was observed that there is a preference for male dogs due to its guard activity and that most dogs live unconstrained. Even though most dogs are provided with good food management, 58% of them prey on wildlife. However, more than half of the dogs do not consume their prey which can be explained by the inherited ability of artificial selection but 36.5% of them have scavenger diet. Most of the dogs were immunized against rabies, whereas, only 28.8% were immunized against infectious diseases such as leptospirosis, distemper and parvovirus. In conclusion, the management of dogs by rural owners, mainly unrestrained living, and allied to inadequate vaccination coverage suggest that dogs are predators of Viçosa's rural wildlife and potential disseminators of disease.

  17. Heat impact on schoolchildren in Cameroon, Africa: potential health threat from climate change

    Directory of Open Access Journals (Sweden)

    Tord Kjellstrom

    2010-11-01

    Full Text Available Background: Health impacts related to climate change are potentially an increasing problem in Cameroon, especially during hot seasons when there are no means for protective and adaptive actions. Objective: To describe environmental conditions in schools and to evaluate the impact of heat on schoolchildren's health during school days in the Cameroon cities of Yaoundé and Douala. Methods: Schoolchildren (N=285 aged 12–16 years from public secondary schools completed a questionnaire about their background, general symptoms, and hot feelings in a cross-sectional study. In Yaoundé, 50 schoolchildren were individually interviewed during school days about hourly symptoms (fatigue, headache, and feeling very hot and performance. Lascar dataloggers were used to measure indoor classroom temperatures and humidity. Results: There was a significant correlation between daily indoor temperature and the percentages of schoolchildren who felt very hot, had fatigue, and headaches in Yaoundé. A high proportion of schoolchildren felt very hot (48%, had fatigue (76%, and headaches (38% in Yaoundé. Prevalences (% were higher among girls than boys for headaches (58 vs 39, feeling ‘very hot overall’ (37 vs 21, and ‘very hot in head’ (21 vs 18. Up to 62% were absentminded and 45% had slow writing speed. High indoor temperatures of 32.5°C in Yaoundé and 36.6°C in Douala were observed in school. Conclusions: Headache, fatigue, and feeling very hot associated with high indoor air temperature were observed among schoolchildren in the present study. Longitudinal data in schools are needed to confirm these results. School environmental conditions should be improved in order to enhance learning.

  18. An approach for assessing potential sediment-bound contaminant threats near the intake of a drinking water treatment plant.

    Science.gov (United States)

    Chen, Fei; Anderson, William B; Huck, Peter M

    2013-01-01

    To assist in assessing a potential contaminated sediment threat near a drinking water intake in a large lake, a technique known as the fingerprint analysis of leachate contaminants (FALCON), was investigated and enhanced to help draw more statistically significant definitive conclusions. This represents the first application of this approach, originally developed by the USEPA to characterize and track leachate penetration in groundwater and contaminant migration from waste and landfill sites, in a large lake from the point-of-view of source water protection. FALCON provided valuable information regarding contaminated sediment characterization, source attribution, and transport within a surface water context without the need for knowledge of local hydrodynamic conditions, potentially reducing reliance on complicated hydrodynamic analysis. A t-test to evaluate the significance of correlations was shown to further enhance the FALCON procedure. In this study, the sensitivity of FALCON was found to be improved by using concentration data from both conserved organics and heavy metals in combination. Furthermore, data analysis indicated that it may be possible to indirectly assess the success of remediation efforts (and the corresponding need to plan for a treatment upgrade in the event of escalating contaminant concentrations) by examining the temporal change in correlation between the source and intake sediment fingerprints over time. This method has potential for widespread application in situations where conserved contaminants such as heavy metals and higher molecular weight polycyclic aromatic hydrocarbons (PAHs), are being or have previously been deposited in sediment somewhere in, or within range of, an intake protection zone. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  20. Study protocol for a framework analysis using video review to identify latent safety threats: trauma resuscitation using in situ simulation team training (TRUST).

    Science.gov (United States)

    Fan, Mark; Petrosoniak, Andrew; Pinkney, Sonia; Hicks, Christopher; White, Kari; Almeida, Ana Paula Siquiera Silva; Campbell, Douglas; McGowan, Melissa; Gray, Alice; Trbovich, Patricia

    2016-11-07

    Errors in trauma resuscitation are common and have been attributed to breakdowns in the coordination of system elements (eg, tools/technology, physical environment and layout, individual skills/knowledge, team interaction). These breakdowns are triggered by unique circumstances and may go unrecognised by trauma team members or hospital administrators; they can be described as latent safety threats (LSTs). Retrospective approaches to identifying LSTs (ie, after they occur) are likely to be incomplete and prone to bias. To date, prospective studies have not used video review as the primary mechanism to identify any and all LSTs in trauma resuscitation. A series of 12 unannounced in situ simulations (ISS) will be conducted to prospectively identify LSTs at a level 1 Canadian trauma centre (over 800 dedicated trauma team activations annually). 4 scenarios have already been designed as part of this protocol based on 5 recurring themes found in the hospital's mortality and morbidity process. The actual trauma team will be activated to participate in the study. Each simulation will be audio/video recorded from 4 different camera angles and transcribed to conduct a framework analysis. Video reviewers will code the videos deductively based on a priori themes of LSTs identified from the literature, and/or inductively based on the events occurring in the simulation. LSTs will be prioritised to target interventions in future work. Institutional research ethics approval has been acquired (SMH REB #15-046). Results will be published in peer-reviewed journals and presented at relevant conferences. Findings will also be presented to key institutional stakeholders to inform mitigation strategies for improved patient safety. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  1. Opening of Offshore Oil Business in Mexico and Associated Framework to Cope with Potential Maritime Security Threats

    Directory of Open Access Journals (Sweden)

    Adriana Ávila-Zúáiga-Nordfjeld

    2018-03-01

    Full Text Available After 75 years of State oil monopoly, Mexico performed the first business oil round in 2015 involving the private sector. This auction-round offered 14 oil exploration fields located on the continental shelf to private companies. The development and exploitation of these hydrocarbon fields faces significant challenges regarding security. The economic loss for theft of hydrocarbons through illegal connections to pipelines is estimated to 973 million, 125 thousand U.S. dollar, only for the year of 2014. While productive research has been made, it has mainly focused on transportation systems and basically, pipelines. The development and establishment of policies prioritizing maritime security and protection of critical offshore infrastructure against theft of hydrocarbons, drugs organizations and terror attacks needs to be included in the national agenda to improve maritime security and mitigate potential security threats at sea, including damage to the marine environment. This could increase the trust of investors and stakeholders and would contribute to the faster development of new exploration and production fields. While the International Ship and Port Facility Security Code (ISPS Code is the cornerstone for the construction of the port?s security program and establishes the requirements of the Port Facility Security Plan (PFSP, including oil port facilities, it has not been fully implemented in several important Mexican ports. It is concluded that some important ports lack many of the core security processes, procedures and controls that should be included in any PFSP. This article briefly reviews the situation of the oil industry from a security perspective and discusses key elements of maritime security; addressing the necessity of the inclusion of maritime security and protection of critical oil infrastructure offshore in the national agenda that would provide for future research directions in the maritime security domain and contribute to

  2. Evidentiary requirements to identify potentially acceptable sites (PAS) in crystalline rock

    International Nuclear Information System (INIS)

    Comella, P.A.; Smith, B.H.

    1985-01-01

    This report contains information on the evidentiary requirements to identify potentially acceptable sites in crystalline rock for waste disposal. Topics addressed include: chronology, key regulatory assumptions, statutory framework for identifying potentially acceptable sites, application of 10 disqualifiers, consideration of favorable and potentially adverse conditions, a composite favorability analysis, and a proposed outline for PAS identification decision document

  3. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  4. Lead from hunting activities and its potential environmental threat to wildlife in a protected wetland in Yucatan, Mexico.

    Science.gov (United States)

    Arcega-Cabrera, Flor; Noreña-Barroso, Elsa; Oceguera-Vargas, Ismael

    2014-02-01

    This study provides insights into the status of lead in the protected wetland of El Palmar, located on the northwestern littoral of the Yucatan Peninsula. This reserve is ecologically and economically important because it provides feeding and breeding habitats for many species, as well as being an ecotourism destination (especially for bird watching). Although it is a protected area, duck species are heavily hunted within the reserve during the winter. As a result, animals feeding or living in sediments could be exposed to anthropogenic lead. Total lead and its geochemical fractionated forms were measured in sediment cores from six selected sites in "El Palmar" wetland, during pre- and post-hunting seasons, to approximate the potential environmental threat (especially for benthonic living/feeding organisms). Anthropogenic lead concentrations detected in soil cores ranged from below the minimum infaunal community effect level (30.24 μg g(-1)) during the pre-hunting season, to bordering the probable infaunal community effect level (112.18 μg g(-1)) during the post-hunting season, according to SquiiRTs NOAA guidelines. Yet, these results were lower than expected based on the intensity of hunting. Consequently, this article explores the possibility that the lower than expected lead concentration in sediments results from (1) degradation of shot and transformation to soluble or particulate forms; or (2) ingestion of lead shot by benthic and other lacustrine species living in the protected area. Geochemical fractionation of lead demonstrated that in the top 6 cm of the soil column at heavily active hunting sites (EP5 and EP6), lead was associated with the lithogenic fraction (average 45 percent) and with the organic fraction (average 20 percent). Bioavailable lead (sum of lead adsorbed to the carbonates, Fe/Mn oxyhydroxides and organic fractions) in sediments was lower than 50 percent for the heavily active hunting areas and higher for the rest of the sites

  5. Multiple Zoonotic Parasites Identified in Dog Feces Collected in Ponte de Lima, Portugal — A Potential Threat to Human Health

    Science.gov (United States)

    Letra Mateus, Teresa; Castro, António; Niza Ribeiro, João; Vieira-Pinto, Madalena

    2014-01-01

    Dogs play many roles and their presence within people’s houses has increased. In rural settings dog faeces are not removed from the streets, representing an environmental pollution factor. Our aim was to evaluate the occurrence of environmental contamination with zoonotic intestinal parasites of three groups of dogs in Ponte de Lima, Portugal, with a particular emphasis on Echinococcus granulosus. We collected 592 dog faecal samples from the environment, farm and hunting dogs. Qualitative flotation coprological analysis was performed and the frequency in the positive samples ranged between 57.44% and 81.19% in different groups. We isolated up to four different parasites in one sample and detected seven intestinal parasitic species, genera or families overall. Ancylostomatidae was the most prevalent parasite, followed by Trichuris spp., Toxocara spp., Isospora spp., Dipylidium caninum, Taeniidae and Toxascaris leonina. Taeniidae eggs were analyzed with the PCR technique and revealed not to be from Echinococcus. The parasite prevalence and the diversity of zoonotic parasites found were high, which calls for a greater awareness of the problem among the population, especially hunters. Promoting research at the local level is important to plan control strategies. Health education should be developed with regard to farmers and hunters, and a closer collaboration between researchers, practitioners and public health authorities is needed. PMID:25257358

  6. Multiple Zoonotic Parasites Identified in Dog Feces Collected in Ponte de Lima, Portugal—A Potential Threat to Human Health

    Directory of Open Access Journals (Sweden)

    Teresa Letra Mateus

    2014-09-01

    Full Text Available Dogs play many roles and their presence within people’s houses has increased. In rural settings dog faeces are not removed from the streets, representing an environmental pollution factor. Our aim was to evaluate the occurrence of environmental contamination with zoonotic intestinal parasites of three groups of dogs in Ponte de Lima, Portugal, with a particular emphasis on Echinococcus granulosus. We collected 592 dog faecal samples from the environment, farm and hunting dogs. Qualitative flotation coprological analysis was performed and the frequency in the positive samples ranged between 57.44% and 81.19% in different groups. We isolated up to four different parasites in one sample and detected seven intestinal parasitic species, genera or families overall. Ancylostomatidae was the most prevalent parasite, followed by Trichuris spp., Toxocara spp., Isospora spp., Dipylidium caninum, Taeniidae and Toxascaris leonina. Taeniidae eggs were analyzed with the PCR technique and revealed not to be from Echinococcus. The parasite prevalence and the diversity of zoonotic parasites found were high, which calls for a greater awareness of the problem among the population, especially hunters. Promoting research at the local level is important to plan control strategies. Health education should be developed with regard to farmers and hunters, and a closer collaboration between researchers, practitioners and public health authorities is needed.

  7. Population status, distribution and potential threats of the Blue Bull Boselaphus tragocamelus (Mammalia: Cetartiodactyla: Bovidae along the Tinau River of Rupandehi District, Nepal

    Directory of Open Access Journals (Sweden)

    Mohan Aryal

    2016-12-01

    Full Text Available The status and conservation of the Blue Bull Boselaphus tragocamelus is becoming one of the prominent discourses of wildlife research.  The study was carried out along the Tinau River at Rupandehi District in western Nepal to ascertain the population status, distribution and potential threats to the Blue Bull.  The study was conducted along six transect lines in the forest.  A total of 40 Blue Bulls were recorded in different transects.  The average group size was five.  The average population density was 0.228 Blue Bulls per ha and the sex ratio was 1 male: 3 females.  The potential threats of the Blue Bull along the Tinau River were habitat destruction, overgrazing, conflict, flooding and accident.  

  8. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  9. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  10. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  11. Diagnosis of Lynch Syndrome: Genetic Testing Identifies a Potentially Deadly Hereditary Disease

    Science.gov (United States)

    ... of Lynch Syndrome Follow us A Diagnosis of Lynch Syndrome Genetic testing identifies a potentially deadly hereditary disease ... helped Jack learn what was wrong. Jack had Lynch Syndrome—an inherited disorder. Lynch Syndrome increases the risk ...

  12. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.

    Energy Technology Data Exchange (ETDEWEB)

    Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

    2008-03-01

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

  13. Nuclear proliferation and the potential threat of nuclear terrorism. 8 November 2004, Sydney, Australia, Asia-Pacific Nuclear Safeguards and Security Conference

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2004-01-01

    Today, the focus of the world is on nuclear proliferation and the potential threat of nuclear terrorism in Asia and the Pacific, and this address is presenting the perspectives on the challenges IAEA faces, and how the IAEA is working to strengthen nuclear security and the nuclear non-proliferation regime. But one would emphasize at the outset that, while much of our work must begin locally and regionally, we must not forget to think globally, because ultimately the existence of a nuclear threat anywhere is a threat everywhere, and as a global community, we will win or lose this battle together. This presentation, discusses cooperation, assistance, regional and international networks, and the importance of learning from each other. In effect, the focal subject is 'security culture', a mindset that, while providing the impetus for local and regional action, thinks globally and is fully capable of extending across borders. Sixty years ago, on a day in August, the dawn of the Nuclear Age in Asia left nearly a quarter of a million people dead, with two devices considered crude by modern standards. For six decades, we have managed to avoid a repeat of that event, but remain haunted by the prospect. It is my firm belief that we cannot move out from under the shadow of Hiroshima and Nagasaki until we are ready to make that move collectively, and build a system of security that transcends borders, that focuses on the equal value of every human life, and in which nuclear weapons have no place. May it not ultimately be said of our civilization that we created the inventions that led to our own demise

  14. Exome sequencing of a large family identifies potential candidate genes contributing risk to bipolar disorder.

    Science.gov (United States)

    Zhang, Tianxiao; Hou, Liping; Chen, David T; McMahon, Francis J; Wang, Jen-Chyong; Rice, John P

    2018-03-01

    Bipolar disorder is a mental illness with lifetime prevalence of about 1%. Previous genetic studies have identified multiple chromosomal linkage regions and candidate genes that might be associated with bipolar disorder. The present study aimed to identify potential susceptibility variants for bipolar disorder using 6 related case samples from a four-generation family. A combination of exome sequencing and linkage analysis was performed to identify potential susceptibility variants for bipolar disorder. Our study identified a list of five potential candidate genes for bipolar disorder. Among these five genes, GRID1(Glutamate Receptor Delta-1 Subunit), which was previously reported to be associated with several psychiatric disorders and brain related traits, is particularly interesting. Variants with functional significance in this gene were identified from two cousins in our bipolar disorder pedigree. Our findings suggest a potential role for these genes and the related rare variants in the onset and development of bipolar disorder in this one family. Additional research is needed to replicate these findings and evaluate their patho-biological significance. Copyright © 2017 Elsevier B.V. All rights reserved.

  15. Robust global identifiability theory using potentials--Application to compartmental models.

    Science.gov (United States)

    Wongvanich, N; Hann, C E; Sirisena, H R

    2015-04-01

    This paper presents a global practical identifiability theory for analyzing and identifying linear and nonlinear compartmental models. The compartmental system is prolonged onto the potential jet space to formulate a set of input-output equations that are integrals in terms of the measured data, which allows for robust identification of parameters without requiring any simulation of the model differential equations. Two classes of linear and non-linear compartmental models are considered. The theory is first applied to analyze the linear nitrous oxide (N2O) uptake model. The fitting accuracy of the identified models from differential jet space and potential jet space identifiability theories is compared with a realistic noise level of 3% which is derived from sensor noise data in the literature. The potential jet space approach gave a match that was well within the coefficient of variation. The differential jet space formulation was unstable and not suitable for parameter identification. The proposed theory is then applied to a nonlinear immunological model for mastitis in cows. In addition, the model formulation is extended to include an iterative method which allows initial conditions to be accurately identified. With up to 10% noise, the potential jet space theory predicts the normalized population concentration infected with pathogens, to within 9% of the true curve. Copyright © 2015 Elsevier Inc. All rights reserved.

  16. Entry Threat and Entry Deterrence: The Timing of Broadband Rollout

    OpenAIRE

    Mo Xiao; Peter F. Orazem

    2007-01-01

    Past empirical literature provides strong evidence that competition increases when new firms enter a market. However, rarely have economists been able to examine how competition changes with the threat of entry. This paper uses the evolution of the zip code level market structure of facilities-based broadband providers from 1999 to 2004 to investigate how a firm adjusts its entry strategy when facing the threat of additional entrants. We identify the potential entrant into a local market as t...

  17. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  18. Identifying potential risk situations for humans when removing horses from groups

    DEFF Research Database (Denmark)

    Hartmann, Elke; Søndergaard, Eva; Keeling, Linda J.

    2012-01-01

    Removing a horse from its social group may be considered risky, both for the handler and the horse, because other horses can interfere in the catching process. The main aim of this study was to identify where and when these risk situations occur while removing a horse from its group. A potential...

  19. Identifying potentially cost effective chronic care programs for people with COPD

    NARCIS (Netherlands)

    L.M.G. Steuten (Lotte); K.M.M. Lemmens (Karin); A.P. Nieboer (Anna); H.J.M. Vrijhoef (Hubertus)

    2009-01-01

    textabstractObjective: To review published evidence regarding the cost effectiveness of multi-component COPD programs and to illustrate how potentially cost effective programs can be identified. Methods: Systematic search of Medline and Cochrane databases for evaluations of multicomponent disease

  20. Identifying High Academic Potential in Australian Aboriginal Children Using Dynamic Testing

    Science.gov (United States)

    Chaffey, Graham W.; Bailey, Stan B.; Vine, Ken W.

    2015-01-01

    The primary purpose of this study was to determine the effectiveness of dynamic testing as a method for identifying high academic potential in Australian Aboriginal children. The 79 participating Aboriginal children were drawn from Years 3-5 in rural schools in northern New South Wales. The dynamic testing method used in this study involved a…

  1. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  2. A universal meteorological method to identify potential risk of wind erosion on heavy-textured soils

    Directory of Open Access Journals (Sweden)

    Středová Hana

    2015-06-01

    Full Text Available The climate of Central Europe, mainly winter seasons with no snow cover at lower altitudes and a spring drought as well, might cause erosion events on heavy-textured soils. The aim of this paper is to define a universal method to identify the potential risk of wind erosion on heavy-textured soils. The categorization of potential wind erosion risk due to meteorological conditions is based on: (i an evaluation of the number of freeze-thaw episodes forming bare soil surfaces during the cold period of year; and (ii, an evaluation of the number of days with wet soil surfaces during the cold period of year. In the period 2001–2012 (from November to March, episodes with temperature changes from positive to negative and vice versa (thaw-freeze and freeze-thaw cycles and the effects of wet soil surfaces in connection with aggregate disintegration, are identified. The data are spatially interpolated by GIS tools for areas in the Czech Republic with heavy-textured soils. Blending critical categories is used to locate potential risks. The level of risk is divided into six classes. Those areas identified as potentially most vulnerable are the same localities where the highest number of erosive episodes on heavy-textured soils was documented.

  3. Disarming the Threat to Feminist Identification: An Application of Personal Construct Theory to Measurement and Intervention

    Science.gov (United States)

    Moradi, Bonnie; Martin, Annelise; Brewster, Melanie E.

    2012-01-01

    Many individuals endorse feminist values but do not identify as feminist. The present set of studies tests the concept of threat, grounded in G. A. Kelly's personal construct theory of personality, as a potential factor in feminist nonidentification. Study 1 introduces the theoretically grounded "Feminist Threat Index" and evaluates its…

  4. Mapping industrial networks as an approach to identify inter-organisational collaborative potential in new product development

    DEFF Research Database (Denmark)

    Parraguez, Pedro; Maier, Anja

    2012-01-01

    . Consequently, identifying and selecting potential partners to establish collaboration agreements can be a key activity in the new product development process. This paper explores the implications of mapping industrial networks with the purpose of identifying inter-organisational collaborative potential...

  5. The emergence of insecticide resistance in central Mozambique and potential threat to the successful indoor residual spraying malaria control programme

    Directory of Open Access Journals (Sweden)

    Wilding Craig S

    2011-05-01

    Full Text Available Abstract Background Malaria vector control by indoor residual spraying was reinitiated in 2006 with DDT in Zambézia province, Mozambique. In 2007, these efforts were strengthened by the President's Malaria Initiative. This manuscript reports on the monitoring and evaluation of this programme as carried out by the Malaria Decision Support Project. Methods Mosquitoes were captured daily through a series of 114 window exit traps located at 19 sentinel sites, identified to species and analysed for sporozoites. Anopheles mosquitoes were collected resting indoors and tested for insecticide resistance following the standard WHO protocol. Annual cross sectional household parasite surveys were carried out to monitor the impact of the control programme on prevalence of Plasmodium falciparum in children aged 1 to 15 years. Results A total of 3,769 and 2,853 Anopheles gambiae s.l. and Anopheles funestus, respectively, were captured from window exit traps throughout the period. In 2010 resistance to the pyrethroids lambda-cyhalothrin and permethrin and the carbamate, bendiocarb was detected in An. funestus. In 2006, the sporozoite rate in An. gambiae s.s. was 4% and this reduced to 1% over 4 rounds of spraying. The sporozoite rate for An. funestus was also reduced from 2% to 0 by 2008. Of the 437 Anopheles arabiensis identified, none were infectious. Overall prevalence of P. falciparum in the sentinel sites fell from 60% to 32% between October 2006 and October 2008. Conclusion Both An. gambiae s.s. and An. funestus were controlled effectively with the DDT-based IRS programme in Zambézia, reducing disease transmission and burden. However, the discovery of pyrethroid resistance in the province and Mozambique's policy change away from DDT to pyrethroids for IRS threatens the gains made here.

  6. Potential ligand-binding residues in rat olfactory receptors identified by correlated mutation analysis

    Science.gov (United States)

    Singer, M. S.; Oliveira, L.; Vriend, G.; Shepherd, G. M.

    1995-01-01

    A family of G-protein-coupled receptors is believed to mediate the recognition of odor molecules. In order to identify potential ligand-binding residues, we have applied correlated mutation analysis to receptor sequences from the rat. This method identifies pairs of sequence positions where residues remain conserved or mutate in tandem, thereby suggesting structural or functional importance. The analysis supported molecular modeling studies in suggesting several residues in positions that were consistent with ligand-binding function. Two of these positions, dominated by histidine residues, may play important roles in ligand binding and could confer broad specificity to mammalian odor receptors. The presence of positive (overdominant) selection at some of the identified positions provides additional evidence for roles in ligand binding. Higher-order groups of correlated residues were also observed. Each group may interact with an individual ligand determinant, and combinations of these groups may provide a multi-dimensional mechanism for receptor diversity.

  7. Metabolomic screening using ESI-FT MS identifies potential radiation-responsive molecules in mouse urine

    International Nuclear Information System (INIS)

    Iizuka, Daisuke; Yoshioka, Susumu; Kawai, Hidehiko; Izumi, Shunsuke; Suzuki, Fumio; Kamiya, Kenji

    2017-01-01

    The demand for establishment of high-throughput biodosimetric methods is increasing. Our aim in this study was to identify low-molecular-weight urinary radiation-responsive molecules using electrospray ionization Fourier transform mass spectrometry (ESI-FT MS), and our final goal was to develop a sensitive biodosimetry technique that can be applied in the early triage of a radiation emergency medical system. We identified nine metabolites by statistical comparison of mouse urine before and 8 h after irradiation. Time-course analysis showed that, of these metabolites, thymidine and either thymine or imidazoleacetic acid were significantly increased dose-dependently 8 h after radiation exposure; these molecules have already been reported as potential radiation biomarkers. Phenyl glucuronide was significantly decreased 8 h after radiation exposure, irrespective of the dose. Histamine and 1-methylhistamine were newly identified by MS/MS and showed significant, dose-dependent increases 72 h after irradiation. Quantification of 1-methylhistamine by enzyme-linked immunosorbent assay (ELISA) analysis also showed a significant increase 72 h after 4 Gy irradiation. These results suggest that urinary metabolomics screening using ESI-FT MS can be a powerful tool for identifying promising radiation-responsive molecules, and that urinary 1-methylhistamine is a potential radiation-responsive molecule for acute, high-dose exposure.

  8. Spontaneous swallowing frequency has potential to identify dysphagia in acute stroke.

    Science.gov (United States)

    Crary, Michael A; Carnaby, Giselle D; Sia, Isaac; Khanna, Anna; Waters, Michael F

    2013-12-01

    Spontaneous swallowing frequency has been described as an index of dysphagia in various health conditions. This study evaluated the potential of spontaneous swallow frequency analysis as a screening protocol for dysphagia in acute stroke. In a cohort of 63 acute stroke cases, swallow frequency rates (swallows per minute [SPM]) were compared with stroke and swallow severity indices, age, time from stroke to assessment, and consciousness level. Mean differences in SPM were compared between patients with versus without clinically significant dysphagia. Receiver operating characteristic curve analysis was used to identify the optimal threshold in SPM, which was compared with a validated clinical dysphagia examination for identification of dysphagia cases. Time series analysis was used to identify the minimally adequate time period to complete spontaneous swallow frequency analysis. SPM correlated significantly with stroke and swallow severity indices but not with age, time from stroke onset, or consciousness level. Patients with dysphagia demonstrated significantly lower SPM rates. SPM differed by dysphagia severity. Receiver operating characteristic curve analysis yielded a threshold of SPM≤0.40 that identified dysphagia (per the criterion referent) with 0.96 sensitivity, 0.68 specificity, and 0.96 negative predictive value. Time series analysis indicated that a 5- to 10-minute sampling window was sufficient to calculate spontaneous swallow frequency to identify dysphagia cases in acute stroke. Spontaneous swallowing frequency presents high potential to screen for dysphagia in acute stroke without the need for trained, available personnel.

  9. Spontaneous Swallowing Frequency [Has Potential to] Identify Dysphagia in Acute Stroke

    Science.gov (United States)

    Carnaby, Giselle D; Sia, Isaac; Khanna, Anna; Waters, Michael

    2014-01-01

    Background and Purpose Spontaneous swallowing frequency has been described as an index of dysphagia in various health conditions. This study evaluated the potential of spontaneous swallow frequency analysis as a screening protocol for dysphagia in acute stroke. Methods In a cohort of 63 acute stroke cases swallow frequency rates (swallows per minute: SPM) were compared to stroke and swallow severity indices, age, time from stroke to assessment, and consciousness level. Mean differences in SPM were compared between patients with vs. without clinically significant dysphagia. ROC analysis was used to identify the optimal threshold in SPM which was compared to a validated clinical dysphagia examination for identification of dysphagia cases. Time series analysis was employed to identify the minimally adequate time period to complete spontaneous swallow frequency analysis. Results SPM correlated significantly with stroke and swallow severity indices but not with age, time from stroke onset, or consciousness level. Patients with dysphagia demonstrated significantly lower SPM rates. SPM differed by dysphagia severity. ROC analysis yielded a threshold of SPM ≤ 0.40 which identified dysphagia (per the criterion referent) with 0.96 sensitivity, 0.68 specificity, and 0.96 negative predictive value. Time series analysis indicated that a 5 to 10 minute sampling window was sufficient to calculate spontaneous swallow frequency to identify dysphagia cases in acute stroke. Conclusions Spontaneous swallowing frequency presents high potential to screen for dysphagia in acute stroke without the need for trained, available personnel. PMID:24149008

  10. Characterization of potential mineralization in Afghanistan: four permissive areas identified using imaging spectroscopy data

    Science.gov (United States)

    King, Trude V.V.; Berger, Byron R.; Johnson, Michaela R.

    2014-01-01

    As part of the U.S. Geological Survey and Department of Defense Task Force for Business and Stability Operations natural resources revitalization activities in Afghanistan, four permissive areas for mineralization, Bamyan 1, Farah 1, Ghazni 1, and Ghazni 2, have been identified using imaging spectroscopy data. To support economic development, the areas of potential mineralization were selected on the occurrence of selected mineral assemblages mapped using the HyMap™ data (kaolinite, jarosite, hydrated silica, chlorite, epidote, iron-bearing carbonate, buddingtonite, dickite, and alunite) that may be indicative of past mineralization processes in areas with limited or no previous mineral resource studies. Approximately 30 sites were initially determined to be candidates for areas of potential mineralization. Additional criteria and material used to refine the selection and prioritization process included existing geologic maps, Landsat Thematic Mapper data, and published literature. The HyMapTM data were interpreted in the context of the regional geologic and tectonic setting and used the presence of alteration mineral assemblages to identify areas with the potential for undiscovered mineral resources. Further field-sampling, mapping, and supporting geochemical analyses are necessary to fully substantiate and verify the specific deposit types in the four areas of potential mineralization.

  11. A new approach to horizon-scanning: identifying potentially invasive alien species and their introduction pathways

    NARCIS (Netherlands)

    Matthews, Jonathan; Beringen, Ruud; Creemers, Raymond; Hollander, Hans; van Kessel, Nils; van Kleef, Hein; de Koppel, Sander van; Lemaire, Adrienne J. J.; Ode, Baudewijn; Verbrugge, Laura N. H.; Hendriks, A. Jan; Schipper, Aafke M.; van der Velde, Gerard; Leuven, Rob S. E. W.

    Invasive alien species (IAS) are considered an important threat to global biodiversity due to major ecological impacts. In 2014, the European Union (EU) introduced a regulation (EU) No 1143/2014 on the prevention and management of the introduction and spread of IAS. The first risk prioritized list

  12. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  13. Gene expression profile identifies potential biomarkers for human intervertebral disc degeneration.

    Science.gov (United States)

    Guo, Wei; Zhang, Bin; Li, Yan; Duan, Hui-Quan; Sun, Chao; Xu, Yun-Qiang; Feng, Shi-Qing

    2017-12-01

    The present study aimed to reveal the potential genes associated with the pathogenesis of intervertebral disc degeneration (IDD) by analyzing microarray data using bioinformatics. Gene expression profiles of two regions of the intervertebral disc were compared between patients with IDD and controls. GSE70362 containing two groups of gene expression profiles, 16 nucleus pulposus (NP) samples from patients with IDD and 8 from controls, and 16 annulus fibrosus (AF) samples from patients with IDD and 8 from controls, was downloaded from the Gene Expression Omnibus database. A total of 93 and 114 differentially expressed genes (DEGs) were identified in NP and AF samples, respectively, using a limma software package for the R programming environment. Gene Ontology (GO) function enrichment analysis was performed to identify the associated biological functions of DEGs in IDD, which indicated that the DEGs may be involved in various processes, including cell adhesion, biological adhesion and extracellular matrix organization. Pathway enrichment analysis using the Kyoto Encyclopedia of Genes and Genomes (KEGG) demonstrated that the identified DEGs were potentially involved in focal adhesion and the p53 signaling pathway. Further analysis revealed that there were 35 common DEGs observed between the two regions (NP and AF), which may be further regulated by 6 clusters of microRNAs (miRNAs) retrieved with WebGestalt. The genes in the DEG‑miRNA regulatory network were annotated using GO function and KEGG pathway enrichment analysis, among which extracellular matrix organization was the most significant disrupted biological process and focal adhesion was the most significant dysregulated pathway. In addition, the result of protein‑protein interaction network modules demonstrated the involvement of inflammatory cytokine interferon signaling in IDD. These findings may not only advance the understanding of the pathogenesis of IDD, but also identify novel potential

  14. What's the risk? Identifying potential human pathogens within grey-headed flying foxes faeces.

    Directory of Open Access Journals (Sweden)

    Rebekah Henry

    Full Text Available Pteropus poliocephalus (grey-headed flying foxes are recognised vectors for a range of potentially fatal human pathogens. However, to date research has primarily focused on viral disease carriage, overlooking bacterial pathogens, which also represent a significant human disease risk. The current study applied 16S rRNA amplicon sequencing, community analysis and a multi-tiered database OTU picking approach to identify faecal-derived zoonotic bacteria within two colonies of P. poliocephalus from Victoria, Australia. Our data show that sequences associated with Enterobacteriaceae (62.8% ± 24.7%, Pasteurellaceae (19.9% ± 25.7% and Moraxellaceae (9.4% ± 11.8% dominate flying fox faeces. Further colony specific differences in bacterial faecal colonisation patterns were also identified. In total, 34 potential pathogens, representing 15 genera, were identified. However, species level definition was only possible for Clostridium perfringens, which likely represents a low infectious risk due to the low proportion observed within the faeces and high infectious dose required for transmission. In contrast, sequences associated with other pathogenic species clusters such as Haemophilus haemolyticus-H. influenzae and Salmonella bongori-S. enterica, were present at high proportions in the faeces, and due to their relatively low infectious doses and modes of transmissions, represent a greater potential human disease risk. These analyses of the microbial community composition of Pteropus poliocephalus have significantly advanced our understanding of the potential bacterial disease risk associated with flying foxes and should direct future epidemiological and quantitative microbial risk assessments to further define the health risks presented by these animals.

  15. An automated technique to identify potential inappropriate traditional Chinese medicine (TCM) prescriptions.

    Science.gov (United States)

    Yang, Hsuan-Chia; Iqbal, Usman; Nguyen, Phung Anh; Lin, Shen-Hsien; Huang, Chih-Wei; Jian, Wen-Shan; Li, Yu-Chuan

    2016-04-01

    Medication errors such as potential inappropriate prescriptions would induce serious adverse drug events to patients. Information technology has the ability to prevent medication errors; however, the pharmacology of traditional Chinese medicine (TCM) is not as clear as in western medicine. The aim of this study was to apply the appropriateness of prescription (AOP) model to identify potential inappropriate TCM prescriptions. We used the association rule of mining techniques to analyze 14.5 million prescriptions from the Taiwan National Health Insurance Research Database. The disease and TCM (DTCM) and traditional Chinese medicine-traditional Chinese medicine (TCMM) associations are computed by their co-occurrence, and the associations' strength was measured as Q-values, which often referred to as interestingness or life values. By considering the number of Q-values, the AOP model was applied to identify the inappropriate prescriptions. Afterwards, three traditional Chinese physicians evaluated 1920 prescriptions and validated the detected outcomes from the AOP model. Out of 1920 prescriptions, 97.1% of positive predictive value and 19.5% of negative predictive value were shown by the system as compared with those by experts. The sensitivity analysis indicated that the negative predictive value could improve up to 27.5% when the model's threshold changed to 0.4. We successfully applied the AOP model to automatically identify potential inappropriate TCM prescriptions. This model could be a potential TCM clinical decision support system in order to improve drug safety and quality of care. Copyright © 2016 John Wiley & Sons, Ltd.

  16. Vitiligo blood transcriptomics provides new insights into disease mechanisms and identifies potential novel therapeutic targets.

    Science.gov (United States)

    Dey-Rao, Rama; Sinha, Animesh A

    2017-01-28

    Significant gaps remain regarding the pathomechanisms underlying the autoimmune response in vitiligo (VL), where the loss of self-tolerance leads to the targeted killing of melanocytes. Specifically, there is incomplete information regarding alterations in the systemic environment that are relevant to the disease state. We undertook a genome-wide profiling approach to examine gene expression in the peripheral blood of VL patients and healthy controls in the context of our previously published VL-skin gene expression profile. We used several in silico bioinformatics-based analyses to provide new insights into disease mechanisms and suggest novel targets for future therapy. Unsupervised clustering methods of the VL-blood dataset demonstrate a "disease-state"-specific set of co-expressed genes. Ontology enrichment analysis of 99 differentially expressed genes (DEGs) uncovers a down-regulated immune/inflammatory response, B-Cell antigen receptor (BCR) pathways, apoptosis and catabolic processes in VL-blood. There is evidence for both type I and II interferon (IFN) playing a role in VL pathogenesis. We used interactome analysis to identify several key blood associated transcriptional factors (TFs) from within (STAT1, STAT6 and NF-kB), as well as "hidden" (CREB1, MYC, IRF4, IRF1, and TP53) from the dataset that potentially affect disease pathogenesis. The TFs overlap with our reported lesional-skin transcriptional circuitry, underscoring their potential importance to the disease. We also identify a shared VL-blood and -skin transcriptional "hot spot" that maps to chromosome 6, and includes three VL-blood dysregulated genes (PSMB8, PSMB9 and TAP1) described as potential VL-associated genetic susceptibility loci. Finally, we provide bioinformatics-based support for prioritizing dysregulated genes in VL-blood or skin as potential therapeutic targets. We examined the VL-blood transcriptome in context with our (previously published) VL-skin transcriptional profile to address

  17. Identifying Potential Recommendation Domains for Conservation Agriculture in Ethiopia, Kenya, and Malawi

    Science.gov (United States)

    Tesfaye, Kindie; Jaleta, Moti; Jena, Pradyot; Mutenje, Munyaradzi

    2015-02-01

    Conservation agriculture (CA) is being promoted as an option for reducing soil degradation, conserving water, enhancing crop productivity, and maintaining yield stability. However, CA is a knowledge- and technology-intensive practice, and may not be feasible or may not perform better than conventional agriculture under all conditions and farming systems. Using high resolution (≈1 km2) biophysical and socioeconomic geospatial data, this study identified potential recommendation domains (RDs) for CA in Ethiopia, Kenya, and Malawi. The biophysical variables used were soil texture, surface slope, and rainfall while the socioeconomic variables were market access and human and livestock population densities. Based on feasibility and comparative performance of CA over conventional agriculture, the biophysical and socioeconomic factors were first used to classify cultivated areas into three biophysical and three socioeconomic potential domains, respectively. Combinations of biophysical and socioeconomic domains were then used to develop potential RDs for CA based on adoption potential within the cultivated areas. About 39, 12, and 5 % of the cultivated areas showed high biophysical and socioeconomic potential while 50, 39, and 21 % of the cultivated areas showed high biophysical and medium socioeconomic potential for CA in Malawi, Kenya, and Ethiopia, respectively. The results indicate considerable acreages of land with high CA adoption potential in the mixed crop-livestock systems of the studied countries. However, there are large differences among countries depending on biophysical and socio-economic conditions. The information generated in this study could be used for targeting CA and prioritizing CA-related agricultural research and investment priorities in the three countries.

  18. Identifying potentially eligible subjects for research: paper-based logs versus the hospital administrative database.

    Science.gov (United States)

    Magee, L A; Massey, K; von Dadelszen, P; Fazio, M; Payne, B; Liston, R

    2011-12-01

    The Canadian Perinatal Network (CPN) is a national database focused on threatened very pre-term birth. Women with one or more conditions most commonly associated with very pre-term birth are included if admitted to a participating tertiary perinatal unit at 22 weeks and 0 days to 28 weeks and 6 days. At BC Women's Hospital and Health Centre, we compared traditional paper-based ward logs and a search of the Canadian Institute for Health Information (CIHI) electronic database of inpatient discharges to identify patients. The study identified 244 women potentially eligible for inclusion in the CPN admitted between April and December 2007. Of the 155 eligible women entered into the CPN database, each method identified a similar number of unique records (142 and 147) not ascertained by the other: 10 (6.4%) by CIHI search and 5 (3.2%) by ward log review. However, CIHI search achieved these results after reviewing fewer records (206 vs. 223) in less time (0.67 vs. 13.6 hours for ward logs). Either method is appropriate for identification of potential research subjects using gestational age criteria. Although electronic methods are less time-consuming, they cannot be performed until after the patient is discharged and records and charts are reviewed. Each method's advantages and disadvantages will dictate use for a specific project.

  19. The potential for research-based information in public health: Identifying unrecognised information needs

    Directory of Open Access Journals (Sweden)

    Forsetlund Louise

    2001-01-01

    Full Text Available Abstract Objective To explore whether there is a potential for greater use of research-based information in public health practice in a local setting. Secondly, if research-based information is relevant, to explore the extent to which this generates questioning behaviour. Design Qualitative study using focus group discussions, observation and interviews. Setting Public health practices in Norway. Participants 52 public health practitioners. Results In general, the public health practitioners had a positive attitude towards research-based information, but believed that they had few cases requiring this type of information. They did say, however, that there might be a potential for greater use. During five focus groups and six observation days we identified 28 questions/cases where it would have been appropriate to seek out research evidence according to our definition. Three of the public health practitioners identified three of these 28 cases as questions for which research-based information could have been relevant. This gap is interpreted as representing unrecognised information needs. Conclusions There is an unrealised potential in public health practice for more frequent and extensive use of research-based information. The practitioners did not appear to reflect on the need for scientific information when faced with new cases and few questions of this type were generated.

  20. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  1. Threat-level-dependent manipulation of signaled body size: dog growls' indexical cues depend on the different levels of potential danger.

    Science.gov (United States)

    Bálint, Anna; Faragó, Tamás; Miklósi, Ádám; Pongrácz, Péter

    2016-11-01

    Body size is an important feature that affects fighting ability; however, size-related parameters of agonistic vocalizations are difficult to manipulate because of anatomical constraints within the vocal production system. Rare examples of acoustic size modulation are due to specific features that enable the sender to steadily communicate exaggerated body size. However, one could argue that it would be more adaptive if senders could adjust their signaling behavior to the fighting potential of their actual opponent. So far there has been no experimental evidence for this possibility. We tested this hypothesis by exposing family dogs (Canis familiaris) to humans with potentially different fighting ability. In a within-subject experiment, 64 dogs of various breeds consecutively faced two threateningly approaching humans, either two men or two women of different stature, or a man and a woman of similar or different stature. We found that the dogs' vocal responses were affected by the gender of the threatening stranger and the dog owner's gender. Dogs with a female owner, or those dogs which came from a household where both genders were present, reacted with growls of lower values of the Pitch-Formant component (including deeper fundamental frequency and lower formant dispersion) to threatening men. Our results are the first to show that non-human animals react with dynamic alteration of acoustic parameters related to their individual indexical features (body size), depending on the level of threat in an agonistic encounter.

  2. The global partnership: its achievements, missed opportunities and potential to address future threats from the spread of CBRN materials and expertise - 59335

    International Nuclear Information System (INIS)

    Heyes, Alan; Bowen, Wyn; Chalmers, Hugh

    2012-01-01

    Document available in abstract form only. Full text of publication follows: In 2002, the G8 launched the Global Partnership (GP) against the Spread of Weapons and Materials of Mass Destruction. The partnerships budget was placed at $20 billion over 10 years, and it was supported by some 23 countries and the European Union (EU).Though it has had little public recognition, the partnership has been one of the G8's most successful initiatives and has led to many benefits, including improved international security and addressing a sizeable proportion of the Cold War nuclear and chemical weapons arsenal in the Former Soviet Union. Its future, however, remains undecided, as its funding is set to expire in less than two years. In 2009 and 2010 Kings College London with generous funding support from the US John D. and Catherine T. MacArthur Foundation, carried out a detailed evaluation of the achievements and benefits of the GP to date, its failings and lost opportunities, and potential future direction. Our findings indicate that the partnership has aided security in the Former Soviet Union and had a significant number of wider benefits with the potential to continue to do the same on a broader geographic level in future. As such, it is a valuable tool to assist the international community to work together to address global threats relating to chemical, biological, radiological and nuclear materials and related expertise and the G8 should take steps to renew its funding. (authors)

  3. Using Helicopter Electromagnetic Surveys to Identify Potential Hazards at Mine Waste Impoundments

    Energy Technology Data Exchange (ETDEWEB)

    Hammack, R.W.

    2008-01-01

    In July 2003, helicopter electromagnetic surveys were conducted at 14 coal waste impoundments in southern West Virginia. The purpose of the surveys was to detect conditions that could lead to impoundment failure either by structural failure of the embankment or by the flooding of adjacent or underlying mine works. Specifically, the surveys attempted to: 1) identify saturated zones within the mine waste, 2) delineate filtrate flow paths through the embankment or into adjacent strata and receiving streams, and 3) identify flooded mine workings underlying or adjacent to the waste impoundment. Data from the helicopter surveys were processed to generate conductivity/depth images. Conductivity/depth images were then spatially linked to georeferenced air photos or topographic maps for interpretation. Conductivity/depth images were found to provide a snapshot of the hydrologic conditions that exist within the impoundment. This information can be used to predict potential areas of failure within the embankment because of its ability to image the phreatic zone. Also, the electromagnetic survey can identify areas of unconsolidated slurry in the decant basin and beneath the embankment. Although shallow, flooded mineworks beneath the impoundment were identified by this survey, it cannot be assumed that electromagnetic surveys can detect all underlying mines. A preliminary evaluation of the data implies that helicopter electromagnetic surveys can provide a better understanding of the phreatic zone than the piezometer arrays that are typically used.

  4. Genome-wide gene expression dataset used to identify potential therapeutic targets in androgenetic alopecia

    Directory of Open Access Journals (Sweden)

    R. Dey-Rao

    2017-08-01

    Full Text Available The microarray dataset attached to this report is related to the research article with the title: “A genomic approach to susceptibility and pathogenesis leads to identifying potential novel therapeutic targets in androgenetic alopecia” (Dey-Rao and Sinha, 2017 [1]. Male-pattern hair loss that is induced by androgens (testosterone in genetically predisposed individuals is known as androgenetic alopecia (AGA. The raw dataset is being made publicly available to enable critical and/or extended analyses. Our related research paper utilizes the attached raw dataset, for genome-wide gene-expression associated investigations. Combined with several in silico bioinformatics-based analyses we were able to delineate five strategic molecular elements as potential novel targets towards future AGA-therapy.

  5. Market potential of nanoremediation in Europe - Market drivers and interventions identified in a deliberative scenario approach.

    Science.gov (United States)

    Bartke, Stephan; Hagemann, Nina; Harries, Nicola; Hauck, Jennifer; Bardos, Paul

    2018-04-01

    A deliberate expert-based scenario approach is applied to better understand the likely determinants of the evolution of the market for nanoparticles use in remediation in Europe until 2025. An initial set of factors had been obtained from a literature review and was complemented by a workshop and key-informant interviews. In further expert engaging formats - focus groups, workshops, conferences, surveys - this initial set of factors was condensed and engaged experts scored the factors regarding their importance for being likely to influence the market development. An interaction matrix was obtained identifying the factors being most active in shaping the market development in Europe by 2025, namely "Science-Policy-Interface" and "Validated information on nanoparticle application potential". Based on these, potential scenarios were determined and development of factors discussed. Conclusions are offered on achievable interventions to enhance nanoremediation deployment. Copyright © 2017 Elsevier B.V. All rights reserved.

  6. Identifying Pre-Service Teachers’ Beliefs About Teaching EFL and Their Potential Changes

    Directory of Open Access Journals (Sweden)

    Sergio Andrés Suárez Flórez

    2017-07-01

    Full Text Available This study aims at identifying pre-service teachers’ beliefs about teaching English as a foreign language and tracking their potential changes throughout the teaching practicum. Participants were two pre-service teachers in their fifth year of their Bachelor of Arts in Foreign Languages program in a public university in Colombia. Data were gathered through a modified version of Beliefs about Language Learning Inventory before the practicum, eight weekly journal entries administered during ten weeks, and two semi-structured interviews at the end of the teaching practicum. The findings revealed that most of the pre-service teachers’ beliefs changed once they faced the reality of the classroom.

  7. Geological study for identifying potential aquifer zone in Pakes and Bandung Villages, Konang District, Bangkalan Region

    International Nuclear Information System (INIS)

    I Gde Sukadana

    2010-01-01

    Konang District has a problem on fresh water supply particularly in dry season. Two villages in the district, namely Pakes and Konang, are densely populated areas having agriculture activities, so available of sufficient fresh water is necessary. A fresh water source that can be developed in this area is deep groundwater source from potential aquifers. A geological study has been conducted to identify potential aquifer based on lithological aspect and geological structure. According to the regional stratigraphy. the study area consists of Tawun Formation and Ngrayong Formation. They compose of carbonaceous clay stone (the oldest rock unit), carbonaceous clay stone with sandy limestone intercalations, sandy limestone interbed with carbonaceous clay stone, tuff sandstone with clay stone intercalations, and reef limestone (the youngest) respectively. Strike and dip positions of the rocks layers are N110°E/22° - N150°E/26°, located on the south anticline axis with wavy plan to gentle slope of hilly morphology. Among the rock unit, only sandy limestone has fine sand with sub angular in shape and open pack. Qualitatively. this rock has good porosity and permeability and is enables to save and to flow subsurface water. Thus. the sandy limestone is considered as a potential zone for fresh water resources. Whereas, carbonaceous clay stone with clay grain size has low porosity and permeability, so it is potential as a cap rock. (author)

  8. Patterns of Seismicity Associated with USGS Identified Areas of Potentially Induced Seismicity.

    Science.gov (United States)

    Barnes, Caitlin; Halihan, Todd

    2018-03-13

    A systematic review across U.S. Geological Survey (USGS) identified potentially induced seismic locations was conducted to discover seismic distance patterns and trends over time away from injection disposal wells. Previous research indicates a 10 km (6 miles) average where the majority of induced seismicity is expected to occur within individual locations, with some areas reporting a larger radius of 35 km (22 miles) to over 70 km (43 miles). This research analyzed earthquake occurrences within nine USGS locations where specified wells were identified as contributors to induced seismicity to determine distance patterns from disposal wells or outward seismic migration over time using established principles of hydrogeology. Results indicate a radius of 31.6 km (20 miles) where 90% of felt earthquakes occur among locations, with the closest proximal felt seismic events, on average, occurring 3 km (1.9 miles) away from injection disposal wells. The results of this research found distance trends across multiple locations of potentially induced seismicity. © 2018, National Ground Water Association.

  9. Virtual target screening to rapidly identify potential protein targets of natural products in drug discovery

    Directory of Open Access Journals (Sweden)

    Yuri Pevzner

    2014-05-01

    Full Text Available Inherent biological viability and diversity of natural products make them a potentially rich source for new therapeutics. However, identification of bioactive compounds with desired therapeutic effects and identification of their protein targets is a laborious, expensive process. Extracts from organism samples may show desired activity in phenotypic assays but specific bioactive compounds must be isolated through further separation methods and protein targets must be identified by more specific phenotypic and in vitro experimental assays. Still, questions remain as to whether all relevant protein targets for a compound have been identified. The desire is to understand breadth of purposing for the compound to maximize its use and intellectual property, and to avoid further development of compounds with insurmountable adverse effects. Previously we developed a Virtual Target Screening system that computationally screens one or more compounds against a collection of virtual protein structures. By scoring each compound-protein interaction, we can compare against averaged scores of synthetic drug-like compounds to determine if a particular protein would be a potential target of a compound of interest. Here we provide examples of natural products screened through our system as we assess advantages and shortcomings of our current system in regards to natural product drug discovery.

  10. Virtual target screening to rapidly identify potential protein targets of natural products in drug discovery

    Directory of Open Access Journals (Sweden)

    Yuri Pevzner

    2015-08-01

    Full Text Available Inherent biological viability and diversity of natural products make them a potentially rich source for new therapeutics. However, identification of bioactive compounds with desired therapeutic effects and identification of their protein targets is a laborious, expensive process. Extracts from organism samples may show desired activity in phenotypic assays but specific bioactive compounds must be isolated through further separation methods and protein targets must be identified by more specific phenotypic and in vitro experimental assays. Still, questions remain as to whether all relevant protein targets for a compound have been identified. The desire is to understand breadth of purposing for the compound to maximize its use and intellectual property, and to avoid further development of compounds with insurmountable adverse effects. Previously we developed a Virtual Target Screening system that computationally screens one or more compounds against a collection of virtual protein structures. By scoring each compound-protein interaction, we can compare against averaged scores of synthetic drug-like compounds to determine if a particular protein would be a potential target of a compound of interest. Here we provide examples of natural products screened through our system as we assess advantages and shortcomings of our current system in regards to natural product drug discovery.

  11. How accurately does the Brief Job Stress Questionnaire identify workers with or without potential psychological distress?

    Science.gov (United States)

    Tsutsumi, Akizumi; Inoue, Akiomi; Eguchi, Hisashi

    2017-07-27

    The manual for the Japanese Stress Check Program recommends use of the Brief Job Stress Questionnaire (BJSQ) from among the program's instruments and proposes criteria for defining "high-stress" workers. This study aimed to examine how accurately the BJSQ identifies workers with or without potential psychological distress. We used an online survey to administer the BJSQ with a psychological distress scale (K6) to randomly selected workers (n=1,650). We conducted receiver operating characteristics curve analyses to estimate the screening performance of the cutoff points that the Stress Check Program manual recommends for the BJSQ. Prevalence of workers with potential psychological distress defined as K6 score ≥13 was 13%. Prevalence of "high-risk" workers defined using criteria recommended by the program manual was 16.7% for the original version of the BJSQ. The estimated values were as follows: sensitivity, 60.5%; specificity, 88.9%; Youden index, 0.504; positive predictive value, 47.3%; negative predictive value, 93.8%; positive likelihood ratio, 6.0; and negative likelihood ratio, 0.4. Analyses based on the simplified BJSQ indicated lower sensitivity compared with the original version, although we expected roughly the same screening performance for the best scenario using the original version. Our analyses in which psychological distress measured by K6 was set as the target condition indicate less than half of the identified "high-stress" workers warrant consideration for secondary screening for psychological distress.

  12. Rapid, computer vision-enabled murine screening system identifies neuropharmacological potential of two new mechanisms

    Directory of Open Access Journals (Sweden)

    Steven L Roberds

    2011-09-01

    Full Text Available The lack of predictive in vitro models for behavioral phenotypes impedes rapid advancement in neuropharmacology and psychopharmacology. In vivo behavioral assays are more predictive of activity in human disorders, but such assays are often highly resource-intensive. Here we describe the successful application of a computer vision-enabled system to identify potential neuropharmacological activity of two new mechanisms. The analytical system was trained using multiple drugs that are used clinically to treat depression, schizophrenia, anxiety, and other psychiatric or behavioral disorders. During blinded testing the PDE10 inhibitor TP-10 produced a signature of activity suggesting potential antipsychotic activity. This finding is consistent with TP-10’s activity in multiple rodent models that is similar to that of clinically used antipsychotic drugs. The CK1ε inhibitor PF-670462 produced a signature consistent with anxiolytic activity and, at the highest dose tested, behavioral effects similar to that of opiate analgesics. Neither TP-10 nor PF-670462 was included in the training set. Thus, computer vision-based behavioral analysis can facilitate drug discovery by identifying neuropharmacological effects of compounds acting through new mechanisms.

  13. Identifying Potential Area and Financial Prospects of Rooftop Solar Photovoltaics (PV

    Directory of Open Access Journals (Sweden)

    Sarawut Ninsawat

    2016-10-01

    Full Text Available In an urban area, the roof is the only available surface that can be utilized for installing solar photovoltaics (PV, and the active surface area depends on the type of roof. Shadows on a solar panel can be caused by nearby tall buildings, construction materials such as water tanks, or the roof configuration itself. The azimuth angle of the sun varies, based on the season and the time of day. Therefore, the simulation of shadow for one or two days or using the rule of thumb may not be sufficient to evaluate shadow effects on solar panels throughout the year. In this paper, a methodology for estimating the solar potential of solar PV on rooftops is presented, which is particularly applicable to urban areas. The objective of this method is to assess how roof type and shadow play a role in potentiality and financial benefit. The method starts with roof type extraction from high-resolution satellite imagery, using Object Base Image Analysis (OBIA, the generation of a 3D structure from height data and roof type, the simulation of shadow throughout the year, and the identification of potential and financial prospects. Based on the results obtained, the system seems to be adequate for calculating the financial benefits of solar PV to a very fine scale. The payback period varied from 7–13 years depending on the roof type, direction, and shadow impact. Based on the potentiality, a homeowner can make a profit of up to 200%. This method could help homeowners to identify potential roof area and economic interest.

  14. Proteomic Analysis of Saliva Identifies Potential Biomarkers for Orthodontic Tooth Movement

    Science.gov (United States)

    Ellias, Mohd Faiz; Zainal Ariffin, Shahrul Hisham; Karsani, Saiful Anuar; Abdul Rahman, Mariati; Senafi, Shahidan; Megat Abdul Wahab, Rohaya

    2012-01-01

    Orthodontic treatment has been shown to induce inflammation, followed by bone remodelling in the periodontium. These processes trigger the secretion of various proteins and enzymes into the saliva. This study aims to identify salivary proteins that change in expression during orthodontic tooth movement. These differentially expressed proteins can potentially serve as protein biomarkers for the monitoring of orthodontic treatment and tooth movement. Whole saliva from three healthy female subjects were collected before force application using fixed appliance and at 14 days after 0.014′′ Niti wire was applied. Salivary proteins were resolved using two-dimensional gel electrophoresis (2DE) over a pH range of 3–10, and the resulting proteome profiles were compared. Differentially expressed protein spots were then identified by MALDI-TOF/TOF tandem mass spectrometry. Nine proteins were found to be differentially expressed; however, only eight were identified by MALDI-TOF/TOF. Four of these proteins—Protein S100-A9, immunoglobulin J chain, Ig alpha-1 chain C region, and CRISP-3—have known roles in inflammation and bone resorption. PMID:22919344

  15. Capparis spinosa L. in A Systematic Review: A Xerophilous Species of Multi Values and Promising Potentialities for Agrosystems under the Threat of Global Warming

    Directory of Open Access Journals (Sweden)

    Stephanie Chedraoui

    2017-10-01

    Full Text Available Caper (Capparis spinosa L. is a xerophytic shrub with a remarkable adaptability to harsh environments. This plant species is of great interest for its medicinal/pharmacological properties and its culinary uses. Its phytochemical importance relies on many bioactive components present in different organs and its cultivation can be of considerable economic value. Moreover, taxonomic identification of C. spinosa L. has been difficult due to its wide heterogeneity, and many authors fell into confusion due to the scarcity of genetic studies. The present review summarizes information concerning C. spinosa L. including agronomic performance, botanical description, taxonomical approaches, traditional pharmacological uses, phytochemical evaluation and genetic studies. This knowledge represents an important tool for further research studies and agronomic development on this indigenous species with respect to the emerging climatic change in the Eastern Mediterranean countries. Indeed, this world region is particularly under the threat of global warming and it appears necessary to rethink agricultural systems to adapt them to current and futures challenging environmental conditions. Capparis spinosa L. could be a part of this approach. So, this review presents a state of the art considering caper as a potential interesting crop under arid or semi-arid regions (such as Eastern Mediterranean countries within the climate change context. The aim is to raise awareness in the scientific community (geneticists, physiologists, ecophysiologists, agronomists, … about the caper strengths and interest to the development of this shrub as a crop.

  16. Survey and documentation of the potential and actual invasive alien plant species and other biological threats to biodiversity in Awash National Park, Ethiopia

    Directory of Open Access Journals (Sweden)

    Sebsebe DEMISSEW

    2011-01-01

    Full Text Available The study was conducted at the Awash National Park (ANP Ethiopia, todocument Invasive Alien Species (IAS and to assess the spread of Prosopis juliflora (Sw. DC. A total of 64 sample plots were laid systematically along the altitudinal gradient of 750 to 1916 m.Potential IAS were recorded. IAS which may threaten biodiversity of the park includes species such as Prosopis juliflora, Parthenium hysterophorus L., Cryptostegia grandiflora Roxb. ex R. Br., Parkinsonia aculeata L., Senna occidentalis (L. Link, Datura ferox L. and Xanthium strumarium L. Except P. juliflora and P. hysterophorus, all others were not recorded in Ethiopia as IAS. P.juliflora was recorded in three plots with cover of 1% to 10%. P. juliflora was also found spread in different parts of the park particularly following the route of cattle movement. P. hysterophoruswas recorded in and around nine sample plots. Plot 46, 47 and 48 werehighly infested by P. hysterophorus which covered more than 60, 70 and 80% of the ground layer respectively. C. grandiflora was recorded in 11 plots with cover ranging from 1% to 35%. In view of all the natural as well as anthropogenic threats to the biodiversity of the Park, the ANP is at high risk. The rich biodiversity needsimmediate management intervention.

  17. Capparis spinosa L. in A Systematic Review: A Xerophilous Species of Multi Values and Promising Potentialities for Agrosystems under the Threat of Global Warming.

    Science.gov (United States)

    Chedraoui, Stephanie; Abi-Rizk, Alain; El-Beyrouthy, Marc; Chalak, Lamis; Ouaini, Naim; Rajjou, Loïc

    2017-01-01

    Caper ( Capparis spinosa L.) is a xerophytic shrub with a remarkable adaptability to harsh environments. This plant species is of great interest for its medicinal/pharmacological properties and its culinary uses. Its phytochemical importance relies on many bioactive components present in different organs and its cultivation can be of considerable economic value. Moreover, taxonomic identification of C. spinosa L. has been difficult due to its wide heterogeneity, and many authors fell into confusion due to the scarcity of genetic studies. The present review summarizes information concerning C. spinosa L. including agronomic performance, botanical description, taxonomical approaches, traditional pharmacological uses, phytochemical evaluation and genetic studies. This knowledge represents an important tool for further research studies and agronomic development on this indigenous species with respect to the emerging climatic change in the Eastern Mediterranean countries. Indeed, this world region is particularly under the threat of global warming and it appears necessary to rethink agricultural systems to adapt them to current and futures challenging environmental conditions. Capparis spinosa L. could be a part of this approach. So, this review presents a state of the art considering caper as a potential interesting crop under arid or semi-arid regions (such as Eastern Mediterranean countries) within the climate change context. The aim is to raise awareness in the scientific community (geneticists, physiologists, ecophysiologists, agronomists, …) about the caper strengths and interest to the development of this shrub as a crop.

  18. Co-expression modules construction by WGCNA and identify potential prognostic markers of uveal melanoma.

    Science.gov (United States)

    Wan, Qi; Tang, Jing; Han, Yu; Wang, Dan

    2018-01-01

    Uveal melanoma is an aggressive cancer which has a high percentage recurrence and with a worse prognosis. Identify the potential prognostic markers of uveal melanoma may provide information for early detection of recurrence and treatment. RNA sequence data of uveal melanoma and patient clinic traits were obtained from The Cancer Genome Atlas (TCGA) database. Co-expression modules were built by weighted gene co -expression network analysis (WGCNA) and applied to investigate the relationship underlying modules and clinic traits. Besides, functional enrichment analysis was performed on these co-expression genes from interested modules. First, using WGCNA, identified 21 co-expression modules were constructed by the 10975 genes from the 80 human uveal melanoma samples. The number of genes in these modules ranged from 42 to 5091. Found four co -expression modules significantly correlated with three clinic traits (status, recurrence and recurrence Time). Module red, and purple positively correlated with patient's life status and recurrence Time. Module green positively correlates with recurrence. The result of functional enrichment analysis showed that the module magenta was mainly enriched genetic material assemble processes, the purple module was mainly enriched in tissue homeostasis and melanosome membrane and the module red was mainly enriched metastasis of cell, suggesting its critical role in the recurrence and development of the disease. Additionally, identified the hug gene (top connectivity with other genes) in each module. The hub gene SLC17A7, NTRK2, ABTB1 and ADPRHL1 might play a vital role in recurrence of uveal melanoma. Our findings provided the framework of co-expression gene modules of uveal melanoma and identified some prognostic markers might be detection of recurrence and treatment for uveal melanoma. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. Potentially preventable infant and child deaths identified at autopsy; findings and implications.

    Science.gov (United States)

    Bamber, Andrew R; Mifsud, William; Wolfe, Ingrid; Cass, Hilary; Pryce, Jeremy; Malone, Marian; Sebire, Neil J

    2015-09-01

    The purpose of the study was to determine the proportion of pediatric deaths investigated by HM Coronial autopsy which were potentially preventable deaths due to treatable natural disease, and what implications such findings may have for health policies to reduce their occurrence. A retrospective study of 1779 autopsies of individuals between 7 days and 14 years of age requested by HM Coroner, taking place in one specialist pediatric autopsy center, was undertaken. Cases were included if they involved a definite natural disease process in which appropriate recognition and treatment was likely to have affected their outcome. Strict criteria were used and cases were excluded where the individual had any longstanding condition which might have predisposed them to, or altered the recognition of, acute illness, or its response to therapy. Almost 8% (134/1779) of the study group were potentially preventable deaths as a result of natural disease, the majority occurring in children younger than 2 years of age. Most individuals reported between 1 and 7 days of symptoms before their death, and the majority had sought medical advice during this period, including from general practitioners within working hours, and hospital emergency departments. Of those who had sought medical attention, around one-third had done so more than once (28%, 15/53). Sepsis and pneumonia accounted for the majority of deaths (46 and 34% respectively), with all infections (sepsis, pneumonia and meningitis) accounting for 110/134 (82%). Around 10% of pediatric deaths referred to HM Coroner are potentially preventable, being the result of treatable natural acute illnesses. In many cases medical advice had been sought during the final illness. The results highlight how a review of autopsy data can identify significant findings with the potential to reduce mortality, and the importance of centralized investigation and reporting of pediatric deaths.

  20. Potential Coastal Pumped Hydroelectric Energy Storage Locations Identified using GIS-based Topographic Analysis

    Science.gov (United States)

    Parsons, R.; Barnhart, C. J.; Benson, S. M.

    2013-12-01

    Large-scale electrical energy storage could accommodate variable, weather dependent energy resources such as wind and solar. Pumped hydroelectric energy storage (PHS) and compressed energy storage area (CAES) have life cycle energy and financial costs that are an order of magnitude lower than conventional electrochemical storage technologies. However PHS and CAES storage technologies require specific geologic conditions. Conventional PHS requires an upper and lower reservoir separated by at least 100 m of head, but no more than 10 km in horizontal distance. Conventional PHS also impacts fresh water supplies, riparian ecosystems, and hydrologic environments. A PHS facility that uses the ocean as the lower reservoir benefits from a smaller footprint, minimal freshwater impact, and the potential to be located near off shore wind resources and population centers. Although technologically nascent, today one coastal PHS facility exists. The storage potential for coastal PHS is unknown. Can coastal PHS play a significant role in augmenting future power grids with a high faction of renewable energy supply? In this study we employ GIS-based topographic analysis to quantify the coastal PHS potential of several geographic locations, including California, Chile and Peru. We developed automated techniques that seek local topographic minima in 90 m spatial resolution shuttle radar topography mission (SRTM) digital elevation models (DEM) that satisfy the following criteria conducive to PHS: within 10 km from the sea; minimum elevation 150 m; maximum elevation 1000 m. Preliminary results suggest the global potential for coastal PHS could be very significant. For example, in northern Chile we have identified over 60 locations that satisfy the above criteria. Two of these locations could store over 10 million cubic meters of water or several GWh of energy. We plan to report a global database of candidate coastal PHS locations and to estimate their energy storage capacity.

  1. Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet

    OpenAIRE

    Jungsuk Song; Younsu Lee; Jang-Won Choi; Joon-Min Gil; Jaekyung Han; Sang-Soo Choi

    2017-01-01

    The darknet (i.e., a set of unused IP addresses) is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet (‘the darknet traffic’) do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers...

  2. USING GIS TO IDENTIFY POTENTIAL AREAS SUSCEPTIBLE TO FLOOD. CASE STUDY: SOLONEŢ RIVER

    Directory of Open Access Journals (Sweden)

    V. TIPLEA

    2011-03-01

    Full Text Available Using GIS to Identify Potential Areas Susceptible to Flood. Case Study: Soloneţ River. In this study, we aim to analyze the impact of different peak flows in territory and also a better understanding of the dynamic of a river flow. The methodology used for flood zone delimitation is based on a quantitative analysis model which requires the use of mathematical, physical and statistical operations in order to emphasize the relations between the different variables that were implied (discharges, grain size, terrain morphology, soil saturation, vegetation etc.. The results cannot be expected to be completely accurate but can provide a good representation of the process. Validation of results will inevitably be difficult and should be measured in the field. The information resulting from this study could be useful for raising awareness about both hazards and possible mitigation measure, a key component of disaster risk reduction planning.

  3. Identifying potential sources of Sudan I contamination in Capsicum fruits over its growth period.

    Science.gov (United States)

    Wu, Naiying; Gao, Wei; Zhou, Li; Lian, Yunhe; Li, Fengfei; Han, Wenjie

    2015-04-15

    Sudan dyes in spices are often assumed to arise from cross-contamination or malicious addition. Here, experiments were carried out to identify the potential source of Sudan I-IV in Capsicum fruits through investigation of their contents in native Capsicum tissues, soils and associated agronomic materials. Sudan II-IV was not detected in any of the tested samples. Sudan I was found in almost all samples except for the mulching film. Sudan I concentrations decreased from stems to leaves and then to fruits or roots. Sudan I levels in soils were significantly elevated by vegetation treatment. These results exclude the possibility of soil as the main source for Sudan I contamination in Capsicum fruits. Further study found out pesticide and fertilizer constitutes the major source of Sudan I contamination. This work represents a preliminary step for a detailed Sudan I assessment to support Capsicum management and protection in the studied region. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. A new simplex chemometric approach to identify olive oil blends with potentially high traceability.

    Science.gov (United States)

    Semmar, N; Laroussi-Mezghani, S; Grati-Kamoun, N; Hammami, M; Artaud, J

    2016-10-01

    Olive oil blends (OOBs) are complex matrices combining different cultivars at variable proportions. Although qualitative determinations of OOBs have been subjected to several chemometric works, quantitative evaluations of their contents remain poorly developed because of traceability difficulties concerning co-occurring cultivars. Around this question, we recently published an original simplex approach helping to develop predictive models of the proportions of co-occurring cultivars from chemical profiles of resulting blends (Semmar & Artaud, 2015). Beyond predictive model construction and validation, this paper presents an extension based on prediction errors' analysis to statistically define the blends with the highest predictability among all the possible ones that can be made by mixing cultivars at different proportions. This provides an interesting way to identify a priori labeled commercial products with potentially high traceability taking into account the natural chemical variability of different constitutive cultivars. Copyright © 2016 Elsevier Ltd. All rights reserved.

  5. Gut Bacteria Missing in Severe Acute Malnutrition, Can We Identify Potential Probiotics by Culturomics?

    Directory of Open Access Journals (Sweden)

    Maryam Tidjani Alou

    2017-05-01

    Full Text Available Severe acute malnutrition is the world-leading cause of children under-five's death. Recent metagenomics studies have established a link between gut microbiota and severe acute malnutrition, describing an immaturity with a striking depletion in oxygen-sensitive prokaryotes. Amoxicillin and therapeutic diet cure most of the children with severe acute malnutrition but an irreversible disruption of the gut microbiota is suspected in the refractory and most severe cases. In these cases, therapeutic diet may be unable to reverse the microbiota alteration leading to persistent impaired development or death. In addition, as enteric sepsis is a major cause of death in this context, identification of missing gut microbes to be tested as probiotics (live bacteria that confer a benefit to the host to restore rapidly the healthy gut microbiota and prevent the gut pathogenic invasion is of foremost importance. In this study, stool samples of malnourished patients with kwashiorkor and healthy children were collected from Niger and Senegal and analyzed by culturomics and metagenomics. We found a globally decreased diversity, a decrease in the hitherto unknown diversity (new species isolation, a depletion in oxygen-sensitive prokaryotes including Methanobrevibacter smithii and an enrichment in potentially pathogenic Proteobacteria, Fusobacteria and Streptococcus gallolyticus. A complex of 12 species identified only in healthy children using culturomics and metagenomics were identified as probiotics candidates, providing a possible, defined, reproducible, safe, and convenient alternative to fecal transplantation to restore a healthy gut microbiota in malnourished children. Microbiotherapy based on selected strains has the potential to improve the current treatment of severe acute malnutrition and prevent relapse and death by reestablishing a healthy gut microbiota.

  6. TH-B-BRC-01: How to Identify and Resolve Potential Clinical Errors

    Energy Technology Data Exchange (ETDEWEB)

    Das, I. [NYU Langone Medical Center, New York, NY (United States)

    2016-06-15

    Radiation treatment consists of a chain of events influenced by the quality of machine operation, beam data commissioning, machine calibration, patient specific data, simulation, treatment planning, imaging and treatment delivery. There is always a chance that the clinical medical physicist may make or fail to detect an error in one of the events that may impact on the patient’s treatment. In the clinical scenario, errors may be systematic and, without peer review, may have a low detectability because they are not part of routine QA procedures. During treatment, there might be errors on machine that needs attention. External reviews of some of the treatment delivery components by independent reviewers, like IROC, can detect errors, but may not be timely. The goal of this session is to help junior clinical physicists identify potential errors as well as the approach of quality assurance to perform a root cause analysis to find and eliminate an error and to continually monitor for errors. A compilation of potential errors will be presented by examples of the thought process required to spot the error and determine the root cause. Examples may include unusual machine operation, erratic electrometer reading, consistent lower electron output, variation in photon output, body parts inadvertently left in beam, unusual treatment plan, poor normalization, hot spots etc. Awareness of the possibility and detection of error in any link of the treatment process chain will help improve the safe and accurate delivery of radiation to patients. Four experts will discuss how to identify errors in four areas of clinical treatment. D. Followill, NIH grant CA 180803.

  7. TH-B-BRC-01: How to Identify and Resolve Potential Clinical Errors

    International Nuclear Information System (INIS)

    Das, I.

    2016-01-01

    Radiation treatment consists of a chain of events influenced by the quality of machine operation, beam data commissioning, machine calibration, patient specific data, simulation, treatment planning, imaging and treatment delivery. There is always a chance that the clinical medical physicist may make or fail to detect an error in one of the events that may impact on the patient’s treatment. In the clinical scenario, errors may be systematic and, without peer review, may have a low detectability because they are not part of routine QA procedures. During treatment, there might be errors on machine that needs attention. External reviews of some of the treatment delivery components by independent reviewers, like IROC, can detect errors, but may not be timely. The goal of this session is to help junior clinical physicists identify potential errors as well as the approach of quality assurance to perform a root cause analysis to find and eliminate an error and to continually monitor for errors. A compilation of potential errors will be presented by examples of the thought process required to spot the error and determine the root cause. Examples may include unusual machine operation, erratic electrometer reading, consistent lower electron output, variation in photon output, body parts inadvertently left in beam, unusual treatment plan, poor normalization, hot spots etc. Awareness of the possibility and detection of error in any link of the treatment process chain will help improve the safe and accurate delivery of radiation to patients. Four experts will discuss how to identify errors in four areas of clinical treatment. D. Followill, NIH grant CA 180803

  8. Identifying potentially cost effective chronic care programs for people with COPD

    Directory of Open Access Journals (Sweden)

    L M G Steuten

    2008-12-01

    Full Text Available L M G Steuten1, K M M Lemmens2, A P Nieboer2, H JM Vrijhoef31Maastricht University Medical Centre, School for Care and Public Health Research, Department of Health, Organisation, Policy and Economics, Maastricht, The Netherlands; 2Erasmus University Medical Centre, Institute of Health Policy and Management, Rotterdam, The Netherlands; 3Maastricht University Medical Centre, School for Care and Public Health Research, Department of Integrated Care, Maastricht, The NetherlandsObjective: To review published evidence regarding the cost effectiveness of multi-component COPD programs and to illustrate how potentially cost effective programs can be identified.Methods: Systematic search of Medline and Cochrane databases for evaluations of multi-component disease management or chronic care programs for adults with COPD, describing process, intermediate, and end results of care. Data were independently extracted by two reviewers and descriptively summarized.Results: Twenty articles describing 17 unique COPD programs were included. There is little evidence for significant improvements in process and intermediate outcomes, except for increased provision of patient self-management education and improved disease-specific knowledge. Overall, the COPD programs generate end results equivalent to usual care, but programs containing ≥3 components show lower relative risks for hospitalization. There is limited scope for programs to break-even or save money.Conclusion: Identifying cost effective multi-component COPD programs remains a challenge due to scarce methodologically sound studies that demonstrate significant improvements on process, intermediate and end results of care. Estimations of potential cost effectiveness of specific programs illustrated in this paper can, in the absence of ‘perfect data’, support timely decision-making regarding these programs. Nevertheless, well-designed health economic studies are needed to decrease the current decision

  9. Threats and opportunities for post-closure development in dolomitic ...

    African Journals Online (AJOL)

    Mining-related impacts such as large-scale land degradation associated with dewatering of karstic aquifers and widespread pollution of surface water and groundwater systems are discussed. Based on this, potential threats and opportunities for post-mining scenarios are identified in a series of 3 papers. Part 1 of this series ...

  10. Exome Sequencing Identifies Potential Risk Variants for Mendelian Disorders at High Prevalence in Qatar

    Science.gov (United States)

    Rodriguez-Flores, Juan L.; Fakhro, Khalid; Hackett, Neil R.; Salit, Jacqueline; Fuller, Jennifer; Agosto-Perez, Francisco; Gharbiah, Maey; Malek, Joel A.; Zirie, Mahmoud; Jayyousi, Amin; Badii, Ramin; Al-Marri, Ajayeb Al-Nabet; Chouchane, Lotfi; Stadler, Dora J.; Hunter-Zinck, Haley; Mezey, Jason G.; Crystal, Ronald G.

    2013-01-01

    Exome sequencing of families of related individuals has been highly successful in identifying genetic polymorphisms responsible for Mendelian disorders. Here, we demonstrate the value of the reverse approach, where we use exome sequencing of a sample of unrelated individuals to analyze allele frequencies of known causal mutations for Mendelian diseases. We sequenced the exomes of 100 individuals representing the three major genetic subgroups of the Qatari population (Q1 Bedouin, Q2 Persian-South Asian, Q3 African) and identified 37 variants in 33 genes with effects on 36 clinically significant Mendelian diseases. These include variants not present in 1000 Genomes and variants at high frequency when compared to 1000 Genomes populations. Several of these Mendelian variants were only segregating in one Qatari subpopulation, where the observed subpopulation specificity trends were confirmed in an independent population of 386 Qataris. Pre-marital genetic screening in Qatar tests for only 4 out of the 37, such that this study provides a set of Mendelian disease variants with potential impact on the epidemiological profile of the population that could be incorporated into the testing program if further experimental and clinical characterization confirms high penetrance. PMID:24123366

  11. Identifying potential misfit items in cognitive process of learning engineering mathematics based on Rasch model

    International Nuclear Information System (INIS)

    Ataei, Sh; Mahmud, Z; Khalid, M N

    2014-01-01

    The students learning outcomes clarify what students should know and be able to demonstrate after completing their course. So, one of the issues on the process of teaching and learning is how to assess students' learning. This paper describes an application of the dichotomous Rasch measurement model in measuring the cognitive process of engineering students' learning of mathematics. This study provides insights into the perspective of 54 engineering students' cognitive ability in learning Calculus III based on Bloom's Taxonomy on 31 items. The results denote that some of the examination questions are either too difficult or too easy for the majority of the students. This analysis yields FIT statistics which are able to identify if there is data departure from the Rasch theoretical model. The study has identified some potential misfit items based on the measurement of ZSTD where the removal misfit item was accomplished based on the MNSQ outfit of above 1.3 or less than 0.7 logit. Therefore, it is recommended that these items be reviewed or revised to better match the range of students' ability in the respective course.

  12. Application of positive matrix factorization to identify potential sources of PAHs in soil of Dalian, China

    International Nuclear Information System (INIS)

    Wang Degao; Tian Fulin; Yang Meng; Liu Chenlin; Li Yifan

    2009-01-01

    Soil derived sources of polycyclic aromatic hydrocarbons (PAHs) in the region of Dalian, China were investigated using positive matrix factorization (PMF). Three factors were separated based on PMF for the statistical investigation of the datasets both in summer and winter. These factors were dominated by the pattern of single sources or groups of similar sources, showing seasonal and regional variations. The main sources of PAHs in Dalian soil in summer were the emissions from coal combustion average (46%), diesel engine (30%), and gasoline engine (24%). In winter, the main sources were the emissions from coal-fired boiler (72%), traffic average (20%), and gasoline engine (8%). These factors with strong seasonality indicated that coal combustion in winter and traffic exhaust in summer dominated the sources of PAHs in soil. These results suggested that PMF model was a proper approach to identify the sources of PAHs in soil. - PMF model is a proper approach to identify potential sources of PAHs in soil based on the PAH profiles measured in the field and those published in the literature.

  13. Omen: identifying potential spear-phishing targets before the email is sent.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Jeremy Daniel.

    2013-07-01

    We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attacker must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.

  14. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  15. Predicting Fish Growth Potential and Identifying Water Quality Constraints: A Spatially-Explicit Bioenergetics Approach

    Science.gov (United States)

    Budy, Phaedra; Baker, Matthew; Dahle, Samuel K.

    2011-10-01

    Anthropogenic impairment of water bodies represents a global environmental concern, yet few attempts have successfully linked fish performance to thermal habitat suitability and fewer have distinguished co-varying water quality constraints. We interfaced fish bioenergetics, field measurements, and Thermal Remote Imaging to generate a spatially-explicit, high-resolution surface of fish growth potential, and next employed a structured hypothesis to detect relationships among measures of fish performance and co-varying water quality constraints. Our thermal surface of fish performance captured the amount and spatial-temporal arrangement of thermally-suitable habitat for three focal species in an extremely heterogeneous reservoir, but interpretation of this pattern was initially confounded by seasonal covariation of water residence time and water quality. Subsequent path analysis revealed that in terms of seasonal patterns in growth potential, catfish and walleye responded to temperature, positively and negatively, respectively; crappie and walleye responded to eutrophy (negatively). At the high eutrophy levels observed in this system, some desired fishes appear to suffer from excessive cultural eutrophication within the context of elevated temperatures whereas others appear to be largely unaffected or even enhanced. Our overall findings do not lead to the conclusion that this system is degraded by pollution; however, they do highlight the need to use a sensitive focal species in the process of determining allowable nutrient loading and as integrators of habitat suitability across multiple spatial and temporal scales. We provide an integrated approach useful for quantifying fish growth potential and identifying water quality constraints on fish performance at spatial scales appropriate for whole-system management.

  16. Development of a predictive methodology for identifying high radon exhalation potential areas

    International Nuclear Information System (INIS)

    Ielsch, G.

    2001-01-01

    Radon 222 is a radioactive natural gas originating from the decay of radium 226 which itself originates from the decay of uranium 23 8 naturally present in rocks and soil. Inhalation of radon gas and its decay products is a potential health risk for man. Radon can accumulate in confined environments such as buildings, and is responsible for one third of the total radiological exposure of the general public to radiation. The problem of how to manage this risk then arises. The main difficulty encountered is due to the large variability of exposure to radon across the country. A prediction needs to be made of areas with the highest density of buildings with high radon levels. Exposure to radon varies depending on the degree of confinement of the habitat, the lifestyle of the occupants and particularly emission of radon from the surface of the soil on which the building is built. The purpose of this thesis is to elaborate a methodology for determining areas presenting a high potential for radon exhalation at the surface of the soil. The methodology adopted is based on quantification of radon exhalation at the surface, starting from a precise characterization of the main local geological and pedological parameters that control the radon source and its transport to the ground/atmosphere interface. The methodology proposed is innovative in that it combines a cartographic analysis, parameters integrated into a Geographic Information system, and a simplified model for vertical transport of radon by diffusion through pores in the soil. This methodology has been validated on two typical areas, in different geological contexts, and gives forecasts that generally agree with field observations. This makes it possible to identify areas with a high exhalation potential within a range of a few square kilometers. (author)

  17. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  18. Developing tools to identify marginal lands and assess their potential for bioenergy production

    Science.gov (United States)

    Galatsidas, Spyridon; Gounaris, Nikolaos; Dimitriadis, Elias; Rettenmaier, Nils; Schmidt, Tobias; Vlachaki, Despoina

    2017-04-01

    The term "marginal land" is currently intertwined in discussions about bioenergy although its definition is neither specific nor firm. The uncertainty arising from marginal land classification and quantification is one of the major constraining factors for its potential use. The clarification of political aims, i.e. "what should be supported?" is also an important constraining factor. Many approaches have been developed to identify marginal lands, based on various definitions according to the management goals. Concerns have been frequently raised regarding the impacts of marginal land use on environment, ecosystem services and sustainability. Current tools of soil quality and land potentials assessment fail to meet the needs of marginal land identification and exploitation for biomass production, due to the lack of comprehensive analysis of interrelated land functions and their quantitative evaluation. Land marginality is determined by dynamic characteristics in many cases and may therefore constitute a transitional state, which requires reassessment in due time. Also, marginal land should not be considered simply a dormant natural resource waiting to be used, since it may already provide multiple benefits and services to society relating to wildlife, biodiversity, carbon sequestration, etc. The consequences of cultivating such lands need to be fully addressed to present a balanced view of their sustainable potential for bioenergy. This framework is the basis for the development of the SEEMLA tools, which aim at supporting the identification, assessment, management of marginal lands in Europe and the decision-making for sustainable biomass production of them using appropriate bioenergy crops. The tools comprise two applications, a web-based one (independent of spatial data) and a GIS-based application (land regionalization on the basis of spatial data), which both incorporate: - Land resource characteristics, restricting the cultivation of agricultural crops but

  19. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  20. Assessing urban potential flooding risk and identifying effective risk-reduction measures.

    Science.gov (United States)

    Cherqui, Frédéric; Belmeziti, Ali; Granger, Damien; Sourdril, Antoine; Le Gauffre, Pascal

    2015-05-01

    Flood protection is one of the traditional functions of any drainage system, and it remains a major issue in many cities because of economic and health impact. Heavy rain flooding has been well studied and existing simulation software can be used to predict and improve level of protection. However, simulating minor flooding remains highly complex, due to the numerous possible causes related to operational deficiencies or negligent behaviour. According to the literature, causes of blockages vary widely from one case to another: it is impossible to provide utility managers with effective recommendations on how to improve the level of protection. It is therefore vital to analyse each context in order to define an appropriate strategy. Here we propose a method to represent and assess the flooding risk, using GIS and data gathered during operation and maintenance. Our method also identifies potential management responses. The approach proposed aims to provide decision makers with clear and comprehensible information. Our method has been successfully applied to the Urban Community of Bordeaux (France) on 4895 interventions related to flooding recorded during the 2009-2011 period. Results have shown the relative importance of different issues, such as human behaviour (grease, etc.) or operational deficiencies (roots, etc.), and lead to identify corrective and proactive. This study also confirms that blockages are not always directly due to the network itself and its deterioration. Many causes depend on environmental and operating conditions on the network and often require collaboration between municipal departments in charge of roads, green spaces, etc. Copyright © 2015 Elsevier B.V. All rights reserved.

  1. Visual Indicators on Vaccine Boxes as Early Warning Tools to Identify Potential Freeze Damage.

    Science.gov (United States)

    Angoff, Ronald; Wood, Jillian; Chernock, Maria C; Tipping, Diane

    2015-07-01

    The aim of this study was to determine whether the use of visual freeze indicators on vaccines would assist health care providers in identifying vaccines that may have been exposed to potentially damaging temperatures. Twenty-seven sites in Connecticut involved in the Vaccine for Children Program participated. In addition to standard procedures, visual freeze indicators (FREEZEmarker ® L; Temptime Corporation, Morris Plains, NJ) were affixed to each box of vaccine that required refrigeration but must not be frozen. Temperatures were monitored twice daily. During the 24 weeks, all 27 sites experienced triggered visual freeze indicator events in 40 of the 45 refrigerators. A total of 66 triggered freeze indicator events occurred in all 4 types of refrigerators used. Only 1 of the freeze events was identified by a temperature-monitoring device. Temperatures recorded on vaccine data logs before freeze indicator events were within the 35°F to 46°F (2°C to 8°C) range in all but 1 instance. A total of 46,954 doses of freeze-sensitive vaccine were stored at the time of a visual freeze indicator event. Triggered visual freeze indicators were found on boxes containing 6566 doses (14.0% of total doses). Of all doses stored, 14,323 doses (30.5%) were of highly freeze-sensitive vaccine; 1789 of these doses (12.5%) had triggered indicators on the boxes. Visual freeze indicators are useful in the early identification of freeze events involving vaccines. Consideration should be given to including these devices as a component of the temperature-monitoring system for vaccines.

  2. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  3. Threats from urban expansion, agricultural transformation and forest loss on global conservation priority areas

    Science.gov (United States)

    Moilanen, Atte; Di Minin, Enrico

    2017-01-01

    Including threats in spatial conservation prioritization helps identify areas for conservation actions where biodiversity is at imminent risk of extinction. At the global level, an important limitation when identifying spatial priorities for conservation actions is the lack of information on the spatial distribution of threats. Here, we identify spatial conservation priorities under three prominent threats to biodiversity (residential and commercial development, agricultural expansion, and forest loss), which are primary drivers of habitat loss and threaten the persistence of the highest number of species in the International Union for the Conservation of Nature (IUCN) Red List, and for which spatial data is available. We first explore how global priority areas for the conservation of vertebrate (mammals, birds, and amphibians) species coded in the Red List as vulnerable to each threat differ spatially. We then identify spatial conservation priorities for all species vulnerable to all threats. Finally, we identify the potentially most threatened areas by overlapping the identified priority areas for conservation with maps for each threat. We repeat the same with four other well-known global conservation priority area schemes, namely Key Biodiversity Areas, Biodiversity Hotspots, the global Protected Area Network, and Wilderness Areas. We find that residential and commercial development directly threatens only about 4% of the global top 17% priority areas for species vulnerable under this threat. However, 50% of the high priority areas for species vulnerable to forest loss overlap with areas that have already experienced some forest loss. Agricultural expansion overlapped with ~20% of high priority areas. Biodiversity Hotspots had the greatest proportion of their total area under direct threat from all threats, while expansion of low intensity agriculture was found to pose an imminent threat to Wilderness Areas under future agricultural expansion. Our results

  4. 40 CFR Table 5 to Subpart Jj of... - List of VHAP of Potential Concern Identified by Industry

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 10 2010-07-01 2010-07-01 false List of VHAP of Potential Concern Identified by Industry 5 Table 5 to Subpart JJ of Part 63 Protection of Environment ENVIRONMENTAL PROTECTION.... 63, Subpt. JJ, Table 5 Table 5 to Subpart JJ of Part 63—List of VHAP of Potential Concern Identified...

  5. Genome-Wide Analysis to Identify HLA Factors Potentially Associated With Severe Dengue

    Directory of Open Access Journals (Sweden)

    Sudheer Gupta

    2018-04-01

    Full Text Available The pathogenesis of dengue hemorrhagic fever (DHF, following dengue virus (DENV infection, is a complex and poorly understood phenomenon. In view of the clinical need of identifying patients with higher likelihood of developing this severe outcome, we undertook a comparative genome-wide association analysis of epitope variants from sequences available in the ViPR database that have been reported to be differentially related to dengue fever and DHF. Having enumerated the incriminated epitope variants, we determined the corresponding HLA alleles in the context of which DENV infection could potentially precipitate DHF. Our analysis considered the development of DHF in three different perspectives: (a as a consequence of primary DENV infection, (b following secondary DENV infection with a heterologous serotype, (c as a result of DENV infection following infection with related flaviviruses like Zika virus, Japanese Encephalitis virus, West Nile virus, etc. Subject to experimental validation, these viral and host markers would be valuable in triaging DENV-infected patients for closer supervision owing to the relatively higher risk of poor prognostic outcome and also for the judicious allocation of scarce institutional resources during large outbreaks.

  6. New approaches for identifying and testing potential new anti-asthma agents.

    Science.gov (United States)

    Licari, Amelia; Castagnoli, Riccardo; Brambilla, Ilaria; Marseglia, Alessia; Tosca, Maria Angela; Marseglia, Gian Luigi; Ciprandi, Giorgio

    2018-01-01

    Asthma is a chronic disease with significant heterogeneity in clinical features, disease severity, pattern of underlying disease mechanisms, and responsiveness to specific treatments. While the majority of asthmatic patients are controlled by standard pharmacological strategies, a significant subgroup has limited therapeutic options representing a major unmet need. Ongoing asthma research aims to better characterize distinct clinical phenotypes, molecular endotypes, associated reliable biomarkers, and also to develop a series of new effective targeted treatment modalities. Areas covered: The expanding knowledge on the pathogenetic mechanisms of asthma has allowed researchers to investigate a range of new treatment options matched to patient profiles. The aim of this review is to provide a comprehensive and updated overview of the currently available, new and developing approaches for identifying and testing potential treatment options for asthma management. Expert opinion: Future therapeutic strategies for asthma require the identification of reliable biomarkers that can help with diagnosis and endotyping, in order to determine the most effective drug for the right patient phenotype. Furthermore, in addition to the identification of clinical and inflammatory phenotypes, it is expected that a better understanding of the mechanisms of airway remodeling will likely optimize asthma targeted treatment.

  7. Identifying areas under potential risk of illegal construction and demolition waste dumping using GIS tools.

    Science.gov (United States)

    Seror, Nissim; Portnov, Boris A

    2018-05-01

    Construction and demolition (C&D) waste, dumped illegally in ravines and open areas, contaminates soil and can cause underground water pollution and forests fires. Yet, effective monitoring of illegal C&D waste dumping and enforcing legislation against the offenders are often a difficult task due to the large size of geographic areas that need to be monitored, and limited human and financial resources available to environmental law enforcement agencies. In this study, we use Geographic Information System (GIS) tools and geo-statistical modelling to identify the areas under potentially elevated risk of illegal C&D waste dumping in the Haifa district of Israel. As our analysis shows, locational factors, significantly associated with the accumulated amount of waste in the existing illegal C&D waste sites, include: distance to the nearest main road, depth of the ravine present at the site (pwaste dumping for future monitoring. As we suggest, the proposed approach may be useful for environmental law enforcement authorities, by helping them to focus on specific sites for inspection, save resources, and act against the offenders more efficiently. Copyright © 2018 Elsevier Ltd. All rights reserved.

  8. RNAi phenotype profiling of kinases identifies potential therapeutic targets in Ewing's sarcoma.

    Science.gov (United States)

    Arora, Shilpi; Gonzales, Irma M; Hagelstrom, R Tanner; Beaudry, Christian; Choudhary, Ashish; Sima, Chao; Tibes, Raoul; Mousses, Spyro; Azorsa, David O

    2010-08-18

    Ewing's sarcomas are aggressive musculoskeletal tumors occurring most frequently in the long and flat bones as a solitary lesion mostly during the teen-age years of life. With current treatments, significant number of patients relapse and survival is poor for those with metastatic disease. As part of novel target discovery in Ewing's sarcoma, we applied RNAi mediated phenotypic profiling to identify kinase targets involved in growth and survival of Ewing's sarcoma cells. Four Ewing's sarcoma cell lines TC-32, TC-71, SK-ES-1 and RD-ES were tested in high throughput-RNAi screens using a siRNA library targeting 572 kinases. Knockdown of 25 siRNAs reduced the growth of all four Ewing's sarcoma cell lines in replicate screens. Of these, 16 siRNA were specific and reduced proliferation of Ewing's sarcoma cells as compared to normal fibroblasts. Secondary validation and preliminary mechanistic studies highlighted the kinases STK10 and TNK2 as having important roles in growth and survival of Ewing's sarcoma cells. Furthermore, knockdown of STK10 and TNK2 by siRNA showed increased apoptosis. In summary, RNAi-based phenotypic profiling proved to be a powerful gene target discovery strategy, leading to successful identification and validation of STK10 and TNK2 as two novel potential therapeutic targets for Ewing's sarcoma.

  9. Enterococcus phages as potential tool for identifying sewage inputs in the Great Lakes region

    Science.gov (United States)

    Vijayavel, K.; Byappanahalli, Muruleedhara N.; Whitman, Richard L.; Ebdon, J.; Taylor, H.; Kashian, D.R.

    2014-01-01

    Bacteriophages are viruses living in bacteria that can be used as a tool to detect fecal contamination in surface waters around the world. However, the lack of a universal host strain makes them unsuitable for tracking fecal sources. We evaluated the suitability of two newly isolated Enterococcus host strains (ENT-49 and ENT-55) capable for identifying sewage contamination in impacted waters by targeting phages specific to these hosts. Both host strains were isolated from wastewater samples and identified as E. faecium by 16S rRNA gene sequencing. Occurrence of Enterococcus phages was evaluated in sewage samples (n = 15) from five wastewater treatment plants and in fecal samples from twenty-two species of wild and domesticated animals (individual samples; n = 22). Levels of Enterococcus phages, F + coliphages, Escherichia coli and enterococci were examined from four rivers, four beaches, and three harbors. Enterococcus phages enumeration was at similar levels (Mean = 6.72 Log PFU/100 mL) to F + coliphages in all wastewater samples, but were absent from all non-human fecal sources tested. The phages infecting Enterococcus spp. and F + coliphages were not detected in the river samples (detection threshold < 10 PFU/100 mL), but were present in the beach and harbor samples (range = 1.83 to 2.86 Log PFU/100 mL). Slightly higher concentrations (range = 3.22 to 3.69 Log MPN/100 mL) of E. coli and enterococci when compared to F + coliphages and Enterococcus phages, were observed in the river, beach and harbor samples. Our findings suggest that the bacteriophages associated with these particular Enterococcus host strains offer potentially sensitive and human-source specific indicators of enteric pathogen risk.

  10. Multi-temporal terrestrial laser scanning for identifying rockslide modifications: potentialities and problems

    Science.gov (United States)

    Castagnetti, Cristina; Bertacchini, Eleonora; Capra, Alessandro; Rivola, Riccardo

    2013-04-01

    The heart of this research is to provide an efficient methodology for a reliable acquisition and interpretation of Terrestrial Laser Scanner (TLS) data in the application field of landslide monitoring. In particular, rockslides, which are characterized by vertical walls of rock and by a complex morphology, are of great concern in the study. In these cases the airborne laser scanning is not able to provide useful and reliable description and the terrestrial laser scanning might be the only possible choice to obtain a good and reliable description of the geomorphology or to identify the changes occurred over time. The last purpose is still a challenging task when long distances are involved because the accurate and punctual identification of displacements is not possible due to the laser beam divergence. The final purpose of the research is a proposal of a methodology which is based on TLS technology for identifying displacements and extracting geomorphological changes. The approach is clearly based on a multi-temporal analysis which is computed on several repetitions of TLS surveys performed on the area of interest. To achieve best results and optimize the processing strategy, different methods about point clouds alignment have been tested together with algorithms both for filtering and post-processing. The case study is the Collagna Landslide that is located in the North Appennines (Reggio Emilia, Italy) on the right flank of Biola torrent. The large scale composite landslide area is made both by a wide rock slide sector and a more limited earth slide sector that, after high precipitation rates, disrupted the National Road 63 in December 2008. An integrated monitoring system is installed since 2009 and comprises both point-based technologies such as extensometers, total station and global positioning system, and also area-based technologies such as airborne laser scanner, long-range TLS and ground-based radar. This choice allows to couple the advantages of both

  11. A spatial modeling approach to identify potential butternut restoration sites in Mammoth Cave National Park

    Science.gov (United States)

    Thompson, L.M.; Van Manen, F.T.; Schlarbaum, S.E.; DePoy, M.

    2006-01-01

    Incorporation of disease resistance is nearly complete for several important North American hardwood species threatened by exotic fungal diseases. The next important step toward species restoration would be to develop reliable tools to delineate ideal restoration sites on a landscape scale. We integrated spatial modeling and remote sensing techniques to delineate potential restoration sites for Butternut (Juglans cinerea L.) trees, a hardwood species being decimated by an exotic fungus, in Mammoth Cave National Park (MCNP), Kentucky. We first developed a multivariate habitat model to determine optimum Butternut habitats within MCNP. Habitat characteristics of 54 known Butternut locations were used in combination with eight topographic and land use data layers to calculate an index of habitat suitability based on Mahalanobis distance (D2). We used a bootstrapping technique to test the reliability of model predictions. Based on a threshold value for the D2 statistic, 75.9% of the Butternut locations were correctly classified, indicating that the habitat model performed well. Because Butternut seedlings require extensive amounts of sunlight to become established, we used canopy cover data to refine our delineation of favorable areas for Butternut restoration. Areas with the most favorable conditions to establish Butternut seedlings were limited to 291.6 ha. Our study provides a useful reference on the amount and location of favorable Butternut habitat in MCNP and can be used to identify priority areas for future Butternut restoration. Given the availability of relevant habitat layers and accurate location records, our approach can be applied to other tree species and areas. ?? 2006 Society for Ecological Restoration International.

  12. Testing the potential of geochemical techniques in identifying hydrological systems within landslides in partly weathered marls

    Science.gov (United States)

    Bogaard, T. A.

    2003-04-01

    This paper’s objectives are twofold: to test the potential of cation exchange capacity (CEC) analysis for refinement of the knowledge of the hydrological system in landslide areas; and to examine two laboratory CEC analysis techniques on their applicability to partly weathered marls. The NH4Ac and NaCl laboratory techniques are tested. The geochemical results are compared with the core descriptions and interpreted with respect to their usefulness. Both analysis techniques give identical results for CEC, and are plausible on the basis of the available clay content information. The determination of the exchangeable cations was more difficult, since part of the marls dissolved. With the ammonium-acetate method more of the marls are dissolved than with the sodium-chloride method. This negatively affects the results of the exchangeable cations. Therefore, the NaCl method is to be preferred for the determination of the cation fractions at the complex, be it that this method has the disadvantage that the sodium fraction cannot be determined. To overcome this problem it is recommended to try and use another salt e.g. SrCl2 as displacement fluid. Both Alvera and Boulc-Mondorès examples show transitions in cation composition with depth. It was shown that the exchangeable cation fractions can be useful in locating boundaries between water types, especially the boundary between the superficial, rain fed hydrological system and the lower, regional ground water system. This information may be important for landslide interventions since the hydrological system and the origin of the water need to be known in detail. It is also plausible that long-term predictions of slope stability may be improved by knowledge of the hydrogeochemical evolution of clayey landslides. In the Boulc-Mondorès example the subsurface information that can be extracted from CEC analyses was presented. In the Boulc-Mondorès cores deviant intervals of CEC could be identified. These are interpreted as

  13. Testing the potential of geochemical techniques for identifying hydrological systems within landslides in partly weathered marls

    Science.gov (United States)

    Bogaard, T. A.; Buma, J. T.; Klawer, C. J. M.

    2004-03-01

    This paper's objective is to determine how useful geochemistry can be in landslide investigations. More specifically, what additional information can be gained by analysing the cation exchange capacity (CEC) and cation composition in respect to the hydrological system of a landslide area in clayey material. Two cores from the Boulc-Mondorès landslide (France) and one core from the Alvera landslide (Italy) were analysed. The NH 4Ac and NaCl laboratory techniques are tested. The geochemical results are compared with the core descriptions and interpreted with respect to their usefulness. Both analysis techniques give identical results for CEC, and are plausible on the basis of the available clay content information. The determination of the exchangeable cations was more difficult, since part of the marls dissolved. With the ammonium-acetate method more of the marls are dissolved than with the sodium-chloride method. The NaCl method is preferred for the determination of the cation fractions at the complex, be it that this method has the disadvantage that the sodium fraction cannot be determined. To overcome this problem, it is recommended to try other displacement fluids. In the Boulc-Mondorès example, the subsurface information that can be extracted from CEC analyses was presented. In the Boulc-Mondorès cores deviant intervals of CEC could be identified. These are interpreted as weathered layers (and preferential flow paths) that may develop or have already developed into slip surfaces. The major problem of the CEC analyses was to explain the origin of the differences found in the core samples. Both Alvera and Boulc-Mondorès examples show transitions in cation composition with depth. It was shown that the exchangeable caution fractions can be useful in locating boundaries between water types, especially the boundary between the superficial, rain-fed hydrological system and the lower, regional groundwater system. This information may be important for landslide

  14. Metabolomic profiling identifies potential pathways involved in the interaction of iron homeostasis with glucose metabolism

    Directory of Open Access Journals (Sweden)

    Lars Stechemesser

    2017-01-01

    Full Text Available Objective: Elevated serum ferritin has been linked to type 2 diabetes (T2D and adverse health outcomes in subjects with the Metabolic Syndrome (MetS. As the mechanisms underlying the negative impact of excess iron have so far remained elusive, we aimed to identify potential links between iron homeostasis and metabolic pathways. Methods: In a cross-sectional study, data were obtained from 163 patients, allocated to one of three groups: (1 lean, healthy controls (n = 53, (2 MetS without hyperferritinemia (n = 54 and (3 MetS with hyperferritinemia (n = 56. An additional phlebotomy study included 29 patients with biopsy-proven iron overload before and after iron removal. A detailed clinical and biochemical characterization was obtained and metabolomic profiling was performed via a targeted metabolomics approach. Results: Subjects with MetS and elevated ferritin had higher fasting glucose (p < 0.001, HbA1c (p = 0.035 and 1 h glucose in oral glucose tolerance test (p = 0.002 compared to MetS subjects without iron overload, whereas other clinical and biochemical features of the MetS were not different. The metabolomic study revealed significant differences between MetS with high and low ferritin in the serum concentrations of sarcosine, citrulline and particularly long-chain phosphatidylcholines. Methionine, glutamate, and long-chain phosphatidylcholines were significantly different before and after phlebotomy (p < 0.05 for all metabolites. Conclusions: Our data suggest that high serum ferritin concentrations are linked to impaired glucose homeostasis in subjects with the MetS. Iron excess is associated to distinct changes in the serum concentrations of phosphatidylcholine subsets. A pathway involving sarcosine and citrulline also may be involved in iron-induced impairment of glucose metabolism. Author Video: Author Video Watch what authors say about their articles Keywords: Metabolomics, Hyperferritinemia, Iron overload, Metabolic

  15. Threat and error management for anesthesiologists: a predictive risk taxonomy

    Science.gov (United States)

    Ruskin, Keith J.; Stiegler, Marjorie P.; Park, Kellie; Guffey, Patrick; Kurup, Viji; Chidester, Thomas

    2015-01-01

    Purpose of review Patient care in the operating room is a dynamic interaction that requires cooperation among team members and reliance upon sophisticated technology. Most human factors research in medicine has been focused on analyzing errors and implementing system-wide changes to prevent them from recurring. We describe a set of techniques that has been used successfully by the aviation industry to analyze errors and adverse events and explain how these techniques can be applied to patient care. Recent findings Threat and error management (TEM) describes adverse events in terms of risks or challenges that are present in an operational environment (threats) and the actions of specific personnel that potentiate or exacerbate those threats (errors). TEM is a technique widely used in aviation, and can be adapted for the use in a medical setting to predict high-risk situations and prevent errors in the perioperative period. A threat taxonomy is a novel way of classifying and predicting the hazards that can occur in the operating room. TEM can be used to identify error-producing situations, analyze adverse events, and design training scenarios. Summary TEM offers a multifaceted strategy for identifying hazards, reducing errors, and training physicians. A threat taxonomy may improve analysis of critical events with subsequent development of specific interventions, and may also serve as a framework for training programs in risk mitigation. PMID:24113268

  16. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  17. BACTERIAL AIR MICROFLORA ISOLATES IN TWO OBSTETRICS AND GYNAECOLOGY UNITS OF A HOSPITAL IN NIGERIA ARE POTENTIAL THREATS OF NOSOCOMIAL INFECTIONS.

    OpenAIRE

    2016-01-01

    Ever since the history of infirmaries, nosocomial infections have been of grave threats to hospital set-ups, the deadliest being nosocomial respiratory tract infection (RTI). Nosocomial RTI was consequently investigated in two units of Obstetrics and Gynaecology department of a hospital in Nigeria using the and ldquo;Settling Plate and rdquo; technique and various culture media for bacteria isolation. Identification of the isolates was done on the basis of each isolate\\'s cultural, morpholog...

  18. 7 CFR 170.6 - How are potential market participants identified for the USDA Farmers Market?

    Science.gov (United States)

    2010-01-01

    ... (Continued) AGRICULTURAL MARKETING SERVICE (Standards, Inspections, Marketing Practices), DEPARTMENT OF AGRICULTURE (CONTINUED) MISCELLANEOUS MARKETING PRACTICES UNDER THE AGRICULTURAL MARKETING ACT OF 1946 USDA...? Potential market participants are recruited by AMS market management through local farm organizations in the...

  19. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  20. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  1. Onset Dynamics of Action Potentials in Rat Neocortical Neurons and Identified Snail Neurons: Quantification of the Difference

    OpenAIRE

    Volgushev, Maxim; Malyshev, Aleksey; Balaban, Pavel; Chistiakova, Marina; Volgushev, Stanislav; Wolf, Fred

    2008-01-01

    The generation of action potentials (APs) is a key process in the operation of nerve cells and the communication between neurons. Action potentials in mammalian central neurons are characterized by an exceptionally fast onset dynamics, which differs from the typically slow and gradual onset dynamics seen in identified snail neurons. Here we describe a novel method of analysis which provides a quantitative measure of the onset dynamics of action potentials. This method captures the...

  2. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  3. Data in support of quantitative proteomics to identify potential virulence regulators in Paracoccidioides brasiliensis isolates

    Directory of Open Access Journals (Sweden)

    Alexandre Keiji Tashima

    2015-12-01

    Full Text Available Paracoccidioides genus are the etiologic agents of paracoccidioidomycosis (PCM, a systemic mycosis endemic in Latin America. Few virulence factors have been identified in these fungi. This paper describes support data from the quantitative proteomics of Paracoccidioides brasiliensis attenuated and virulent isolates [1]. The protein compositions of two isolates of the Pb18 strain showing distinct infection profiles were quantitatively assessed by stable isotopic dimethyl labeling and proteomic analysis. The mass spectrometry and the analysis dataset have been deposited to the ProteomeXchange Consortium via the PRIDE partner repository with identifier PXD000804.

  4. Identifying the potential of changes to blood sample logistics using simulation

    DEFF Research Database (Denmark)

    Jørgensen, Pelle Morten Thomas; Jacobsen, Peter; Poulsen, Jørgen Hjelm

    2013-01-01

    of the simulation was to evaluate changes made to the transportation of blood samples between wards and the laboratory. The average- (AWT) and maximum waiting time (MWT) from a blood sample was drawn at the ward until it was received at the laboratory, and the distribution of arrivals of blood samples......, each of the scenarios was tested in terms of what amount of resources would give the optimal result. The simulations showed a big improvement potential in implementing a new technology/mean for transporting the blood samples. The pneumatic tube system showed the biggest potential lowering the AWT...

  5. Evaluation of potential regulatory elements identified as DNase I hypersensitive sites in the CFTR gene

    DEFF Research Database (Denmark)

    Phylactides, M.; Rowntree, R.; Nuthall, H.

    2002-01-01

    hypersensitive sites (DHS) within the locus. We previously identified at least 12 clusters of DHS across the CFTR gene and here further evaluate DHS in introns 2,3,10,16,17a, 18, 20 and 21 to assess their functional importance in regulation of CFTR gene expression. Transient transfections of enhancer/reporter...

  6. Cluster analysis of spontaneous preterm birth phenotypes identifies potential associations among preterm birth mechanisms.

    Science.gov (United States)

    Esplin, M Sean; Manuck, Tracy A; Varner, Michael W; Christensen, Bryce; Biggio, Joseph; Bukowski, Radek; Parry, Samuel; Zhang, Heping; Huang, Hao; Andrews, William; Saade, George; Sadovsky, Yoel; Reddy, Uma M; Ilekis, John

    2015-09-01

    We sought to use an innovative tool that is based on common biologic pathways to identify specific phenotypes among women with spontaneous preterm birth (SPTB) to enhance investigators' ability to identify and to highlight common mechanisms and underlying genetic factors that are responsible for SPTB. We performed a secondary analysis of a prospective case-control multicenter study of SPTB. All cases delivered a preterm singleton at SPTB ≤34.0 weeks' gestation. Each woman was assessed for the presence of underlying SPTB causes. A hierarchic cluster analysis was used to identify groups of women with homogeneous phenotypic profiles. One of the phenotypic clusters was selected for candidate gene association analysis with the use of VEGAS software. One thousand twenty-eight women with SPTB were assigned phenotypes. Hierarchic clustering of the phenotypes revealed 5 major clusters. Cluster 1 (n = 445) was characterized by maternal stress; cluster 2 (n = 294) was characterized by premature membrane rupture; cluster 3 (n = 120) was characterized by familial factors, and cluster 4 (n = 63) was characterized by maternal comorbidities. Cluster 5 (n = 106) was multifactorial and characterized by infection (INF), decidual hemorrhage (DH), and placental dysfunction (PD). These 3 phenotypes were correlated highly by χ(2) analysis (PD and DH, P cluster 3 of SPTB. We identified 5 major clusters of SPTB based on a phenotype tool and hierarch clustering. There was significant correlation between several of the phenotypes. The INS gene was associated with familial factors that were underlying SPTB. Copyright © 2015 Elsevier Inc. All rights reserved.

  7. Identifying the Potential Organizational Impact of an Educational Peer Review Program

    Science.gov (United States)

    Toth, Kate E.; McKey, Colleen A.

    2010-01-01

    The literature on educational peer review (EPR) has focused on evaluating EPR's impact on faculty and/or student learning outcomes; no literature exists on the potential organizational impact. A qualitative (case study) research design explored perceptions of 17 faculty and 10 administrators within a school of nursing in an Ontario university…

  8. Identifying electricity-saving potential in rural China: Empirical evidence from a household survey

    International Nuclear Information System (INIS)

    Yu, Yihua; Guo, Jin

    2016-01-01

    In recent years, there has been a fast-growing body of literature examining energy-saving potential in relation to electricity. However, empirical studies focusing on non-Western nations are limited. To fill this gap, this study intends to examine the electricity-saving potential of rural households in China using a unique data set from the China Residential Electricity Consumption Survey (CRECS) in collaboration with the China General Social Survey (CGSS), conducted nationwide at the household level in rural China. We use a stochastic frontier model, which allows us to decompose residential electricity consumption into the minimum necessary amount of consumption based on physical characteristics (e.g. house size, house age, number of televisions or refrigerators) and estimate the consumption slack (i.e. the amount of electricity consumption that could be saved), which depends on various factors. We find that rural households in China are generally efficient in electricity saving and the saving potential is affected by (fast) information feedback and social-demographic characteristics, instead of by the (averaged) electricity price, or energy efficiency labelling signals. In addition, we find no evidence of regional heterogeneity on electricity saving potential for rural households. Policy implications are derived. - Highlights: •Electricity saving potential of rural households in China is examined. •Unique survey data from the CRECS in collaboration with the CGSS are used. •A stochastic frontier model is applied. •Information feedback and social-demographic characteristics matter. •Electricity price or energy efficiency tier rating does not matter.

  9. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  10. Fine-Mapping of Common Genetic Variants Associated with Colorectal Tumor Risk Identified Potential Functional Variants.

    Directory of Open Access Journals (Sweden)

    Mengmeng Du

    Full Text Available Genome-wide association studies (GWAS have identified many common single nucleotide polymorphisms (SNPs associated with colorectal cancer risk. These SNPs may tag correlated variants with biological importance. Fine-mapping around GWAS loci can facilitate detection of functional candidates and additional independent risk variants. We analyzed 11,900 cases and 14,311 controls in the Genetics and Epidemiology of Colorectal Cancer Consortium and the Colon Cancer Family Registry. To fine-map genomic regions containing all known common risk variants, we imputed high-density genetic data from the 1000 Genomes Project. We tested single-variant associations with colorectal tumor risk for all variants spanning genomic regions 250-kb upstream or downstream of 31 GWAS-identified SNPs (index SNPs. We queried the University of California, Santa Cruz Genome Browser to examine evidence for biological function. Index SNPs did not show the strongest association signals with colorectal tumor risk in their respective genomic regions. Bioinformatics analysis of SNPs showing smaller P-values in each region revealed 21 functional candidates in 12 loci (5q31.1, 8q24, 11q13.4, 11q23, 12p13.32, 12q24.21, 14q22.2, 15q13, 18q21, 19q13.1, 20p12.3, and 20q13.33. We did not observe evidence of additional independent association signals in GWAS-identified regions. Our results support the utility of integrating data from comprehensive fine-mapping with expanding publicly available genomic databases to help clarify GWAS associations and identify functional candidates that warrant more onerous laboratory follow-up. Such efforts may aid the eventual discovery of disease-causing variant(s.

  11. Benchmarking to Identify Practice Variation in Test Ordering: A Potential Tool for Utilization Management.

    Science.gov (United States)

    Signorelli, Heather; Straseski, Joely A; Genzen, Jonathan R; Walker, Brandon S; Jackson, Brian R; Schmidt, Robert L

    2015-01-01

    Appropriate test utilization is usually evaluated by adherence to published guidelines. In many cases, medical guidelines are not available. Benchmarking has been proposed as a method to identify practice variations that may represent inappropriate testing. This study investigated the use of benchmarking to identify sites with inappropriate utilization of testing for a particular analyte. We used a Web-based survey to compare 2 measures of vitamin D utilization: overall testing intensity (ratio of total vitamin D orders to blood-count orders) and relative testing intensity (ratio of 1,25(OH)2D to 25(OH)D test orders). A total of 81 facilities contributed data. The average overall testing intensity index was 0.165, or approximately 1 vitamin D test for every 6 blood-count tests. The average relative testing intensity index was 0.055, or one 1,25(OH)2D test for every 18 of the 25(OH)D tests. Both indexes varied considerably. Benchmarking can be used as a screening tool to identify outliers that may be associated with inappropriate test utilization. Copyright© by the American Society for Clinical Pathology (ASCP).

  12. Identifying potential engaging leaders within medical education: The role of positive influence on peers.

    Science.gov (United States)

    Michalec, Barret; Veloski, J Jon; Hojat, Mohammadreza; Tykocinski, Mark L

    2014-08-26

    Abstract Background: Previous research has paid little to no attention towards exploring methods of identifying existing medical student leaders. Aim: Focusing on the role of influence and employing the tenets of the engaging leadership model, this study examines demographic and academic performance-related differences of positive influencers and if students who have been peer-identified as positive influencers also demonstrate high levels of genuine concern for others. Methods: Three separate fourth-year classes were asked to designate classmates that had significant positive influences on their professional and personal development. The top 10% of those students receiving positive influence nominations were compared with the other students on demographics, academic performance, and genuine concern for others. Results: Besides age, no demographic differences were found between positive influencers and other students. High positive influencers were not found to have higher standardized exam scores but did receive significantly higher clinical clerkship ratings. High positive influencers were found to possess a higher degree of genuine concern for others. Conclusion: The findings lend support to (a) utilizing the engaging model to explore leaders and leadership within medical education, (b) this particular method of identifying existing medical student leaders, and (c) return the focus of leadership research to the power of influence.

  13. IDENTIFYING REGIONAL CLUSTER MANAGEMENT POTENTIALS EMPIRICAL RESULTS FROM THREE NORTH RHINEWESTPHALIAN REGIONS

    OpenAIRE

    Rudiger Hamm; Christiane Goebel

    2010-01-01

    The development and support of clusters is an issue that became quite popular by players dealing with regional economic policy. But before a regional development agency can start to implement a cluster-oriented strategy there a two question that have to be answered: 1. What are the regional fields of competence (cluster potentials) that fulfill the requirements for a cluster-oriented regional development policy? 2. If you find such regional fields of competence, are the enterprises willing to...

  14. Identifying the potential of changes to blood sample logistics using simulation.

    Science.gov (United States)

    Jørgensen, Pelle; Jacobsen, Peter; Poulsen, Jørgen Hjelm

    2013-01-01

    Using simulation as an approach to display and improve internal logistics at hospitals has great potential. This study shows how a simulation model displaying the morning blood-taking round at a Danish public hospital can be developed and utilized with the aim of improving the logistics. The focus of the simulation was to evaluate changes made to the transportation of blood samples between wards and the laboratory. The average- (AWT) and maximum waiting time (MWT) from a blood sample was drawn at the ward until it was received at the laboratory, and the distribution of arrivals of blood samples in the laboratory were used as the evaluation criteria. Four different scenarios were tested and compared with the current approach: (1) Using AGVs (mobile robots), (2) using a pneumatic tube system, (3) using porters that are called upon, or (4) using porters that come to the wards every 45 minutes. Furthermore, each of the scenarios was tested in terms of what amount of resources would give the optimal result. The simulations showed a big improvement potential in implementing a new technology/mean for transporting the blood samples. The pneumatic tube system showed the biggest potential lowering the AWT and MWT with approx. 36% and 18%, respectively. Additionally, all of the scenarios had a more even distribution of arrivals except for porters coming to the wards every 45 min. As a consequence of the results obtained in the study, the hospital decided to implement a pneumatic tube system.

  15. Prediction potential of candidate biomarker sets identified and validated on gene expression data from multiple datasets

    Directory of Open Access Journals (Sweden)

    Karacali Bilge

    2007-10-01

    Full Text Available Abstract Background Independently derived expression profiles of the same biological condition often have few genes in common. In this study, we created populations of expression profiles from publicly available microarray datasets of cancer (breast, lymphoma and renal samples linked to clinical information with an iterative machine learning algorithm. ROC curves were used to assess the prediction error of each profile for classification. We compared the prediction error of profiles correlated with molecular phenotype against profiles correlated with relapse-free status. Prediction error of profiles identified with supervised univariate feature selection algorithms were compared to profiles selected randomly from a all genes on the microarray platform and b a list of known disease-related genes (a priori selection. We also determined the relevance of expression profiles on test arrays from independent datasets, measured on either the same or different microarray platforms. Results Highly discriminative expression profiles were produced on both simulated gene expression data and expression data from breast cancer and lymphoma datasets on the basis of ER and BCL-6 expression, respectively. Use of relapse-free status to identify profiles for prognosis prediction resulted in poorly discriminative decision rules. Supervised feature selection resulted in more accurate classifications than random or a priori selection, however, the difference in prediction error decreased as the number of features increased. These results held when decision rules were applied across-datasets to samples profiled on the same microarray platform. Conclusion Our results show that many gene sets predict molecular phenotypes accurately. Given this, expression profiles identified using different training datasets should be expected to show little agreement. In addition, we demonstrate the difficulty in predicting relapse directly from microarray data using supervised machine

  16. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Directory of Open Access Journals (Sweden)

    Lucas B. Fortini

    2017-07-01

    Full Text Available For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also found other (but not all anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  17. Identifying Key Issues and Potential Solutions for Integrated Arrival, Departure, Surface Operations by Surveying Stakeholder Preferences

    Science.gov (United States)

    Aponso, Bimal; Coppenbarger, Richard A.; Jung, Yoon; Quon, Leighton; Lohr, Gary; O’Connor, Neil; Engelland, Shawn

    2015-01-01

    NASA's Aeronautics Research Mission Directorate (ARMD) collaborates with the FAA and industry to provide concepts and technologies that enhance the transition to the next-generation air-traffic management system (NextGen). To facilitate this collaboration, ARMD has a series of Airspace Technology Demonstration (ATD) sub-projects that develop, demonstrate, and transitions NASA technologies and concepts for implementation in the National Airspace System (NAS). The second of these sub-projects, ATD-2, is focused on the potential benefits to NAS stakeholders of integrated arrival, departure, surface (IADS) operations. To determine the project objectives and assess the benefits of a potential solution, NASA surveyed NAS stakeholders to understand the existing issues in arrival, departure, and surface operations, and the perceived benefits of better integrating these operations. NASA surveyed a broad cross-section of stakeholders representing the airlines, airports, air-navigation service providers, and industry providers of NAS tools. The survey indicated that improving the predictability of flight times (schedules) could improve efficiency in arrival, departure, and surface operations. Stakeholders also mentioned the need for better strategic and tactical information on traffic constraints as well as better information sharing and a coupled collaborative planning process that allows stakeholders to coordinate IADS operations. To assess the impact of a potential solution, NASA sketched an initial departure scheduling concept and assessed its viability by surveying a select group of stakeholders for a second time. The objective of the departure scheduler was to enable flights to move continuously from gate to cruise with minimal interruption in a busy metroplex airspace environment using strategic and tactical scheduling enhanced by collaborative planning between airlines and service providers. The stakeholders agreed that this departure concept could improve schedule

  18. Web-based Tool Identifies and Quantifies Potential Cost Savings Measures at the Hanford Site

    International Nuclear Information System (INIS)

    Renevitz, Marisa J.; Peschong, Jon C.; Charboneau, Briant L.; Simpson, Brett C.

    2014-01-01

    The Technical Improvement system is an approachable web-based tool that is available to Hanford DOE staff, site contractors, and general support service contractors as part of the baseline optimization effort underway at the Hanford Site. Finding and implementing technical improvements are a large part of DOE's cost savings efforts. The Technical Improvement dashboard is a key tool for brainstorming and monitoring the progress of submitted baseline optimization and potential cost/schedule efficiencies. The dashboard is accessible to users over the Hanford Local Area Network (HLAN) and provides a highly visual and straightforward status to management on the ideas provided, alleviating the need for resource intensive weekly and monthly reviews

  19. Potential use of ionic species for identifying source land-uses of stormwater runoff.

    Science.gov (United States)

    Lee, Dong Hoon; Kim, Jin Hwi; Mendoza, Joseph A; Lee, Chang-Hee; Kang, Joo-Hyon

    2017-02-01

    Identifying critical land-uses or source areas is important to prioritize resources for cost-effective stormwater management. This study investigated the use of information on ionic composition as a fingerprint to identify the source land-use of stormwater runoff. We used 12 ionic species in stormwater runoff monitored for a total of 20 storm events at five sites with different land-use compositions during the 2012-2014 wet seasons. A stepwise forward discriminant function analysis (DFA) with the jack-knifed cross validation approach was used to select ionic species that better discriminate the land-use of its source. Of the 12 ionic species, 9 species (K + , Mg 2+ , Na + , NH 4 + , Br - , Cl - , F - , NO 2 - , and SO 4 2- ) were selected for better performance of the DFA. The DFA successfully differentiated stormwater samples from urban, rural, and construction sites using concentrations of the ionic species (70%, 95%, and 91% of correct classification, respectively). Over 80% of the new data cases were correctly classified by the trained DFA model. When applied to data cases from a mixed land-use catchment and downstream, the DFA model showed the greater impact of urban areas and rural areas respectively in the earlier and later parts of a storm event.

  20. Using Market Research to Characterize College Students and Identify Potential Targets for Influencing Health Behaviors

    Science.gov (United States)

    Berg, Carla J.; Ling, Pamela M.; Guo, Hongfei; Windle, Michael; Thomas, Janet L.; Ahluwalia, Jasjit S.; An, Lawrence C.

    2013-01-01

    Marketing campaigns, such as those developed by the tobacco industry, are based on market research, which defines segments of a population by assessing psychographic characteristics (i.e., attitudes, interests). This study uses a similar approach to define market segments of college smokers, to examine differences in their health behaviors (smoking, drinking, binge drinking, exercise, diet), and to determine the validity of these segments. A total of 2,265 undergraduate students aged 18–25 years completed a 108-item online survey in fall 2008 assessing demographic, psychographic (i.e., attitudes, interests), and health-related variables. Among the 753 students reporting past 30-day smoking, cluster analysis was conducted using 21 psychographic questions and identified three market segments – Stoic Individualists, Responsible Traditionalists, and Thrill-Seeking Socializers. We found that segment membership was related to frequency of alcohol use, binge drinking, and limiting dietary fat. We then developed three messages targeting each segment and conducted message testing to validate the segments on a subset of 73 smokers representing each segment in spring 2009. As hypothesized, each segment indicated greater relevance and salience for their respective message. These findings indicate that identifying qualitatively different subgroups of young adults through market research may inform the development of engaging interventions and health campaigns targeting college students. PMID:25264429

  1. Identifying and sequencing a Mycobacterium sp. strain F4 as a potential bioremediation agent for quinclorac.

    Science.gov (United States)

    Li, Yingying; Chen, Wu; Wang, Yunsheng; Luo, Kun; Li, Yue; Bai, Lianyang; Luo, Feng

    2017-01-01

    Quinclorac is a widely used herbicide in rice filed. Unfortunately, quinclorac residues are phytotoxic to many crops/vegetables. The degradation of quinclorac in nature is very slow. On the other hand, degradation of quinclorac using bacteria can be an effective and efficient method to reduce its contamination. In this study, we isolated a quinclorac bioremediation bacterium strain F4 from quinclorac contaminated soils. Based on morphological characteristics and 16S rRNA gene sequence analysis, we identified strain F4 as Mycobacterium sp. We investigated the effects of temperature, pH, inoculation size and initial quinclorac concentration on growth and degrading efficiency of F4 and determined the optimal quinclorac degrading condition of F4. Under optimal degrading conditions, F4 degraded 97.38% of quinclorac from an initial concentration of 50 mg/L in seven days. Our indoor pot experiment demonstrated that the degradation products were non-phytotoxic to tobacco. After analyzing the quinclorac degradation products of F4, we proposed that F4 could employ two pathways to degrade quinclorac: one is through methylation, the other is through dechlorination. Furthermore, we reconstructed the whole genome of F4 through single molecular sequencing and de novo assembly. We identified 77 methyltransferases and eight dehalogenases in the F4 genome to support our hypothesized degradation path.

  2. Identifying potential maternal genes of Bombyx mori using digital gene expression profiling

    Science.gov (United States)

    Xu, Pingzhen

    2018-01-01

    Maternal genes present in mature oocytes play a crucial role in the early development of silkworm. Although maternal genes have been widely studied in many other species, there has been limited research in Bombyx mori. High-throughput next generation sequencing provides a practical method for gene discovery on a genome-wide level. Herein, a transcriptome study was used to identify maternal-related genes from silkworm eggs. Unfertilized eggs from five different stages of early development were used to detect the changing situation of gene expression. The expressed genes showed different patterns over time. Seventy-six maternal genes were annotated according to homology analysis with Drosophila melanogaster. More than half of the differentially expressed maternal genes fell into four expression patterns, while the expression patterns showed a downward trend over time. The functional annotation of these material genes was mainly related to transcription factor activity, growth factor activity, nucleic acid binding, RNA binding, ATP binding, and ion binding. Additionally, twenty-two gene clusters including maternal genes were identified from 18 scaffolds. Altogether, we plotted a profile for the maternal genes of Bombyx mori using a digital gene expression profiling method. This will provide the basis for maternal-specific signature research and improve the understanding of the early development of silkworm. PMID:29462160

  3. Identifying and sequencing a Mycobacterium sp. strain F4 as a potential bioremediation agent for quinclorac.

    Directory of Open Access Journals (Sweden)

    Yingying Li

    Full Text Available Quinclorac is a widely used herbicide in rice filed. Unfortunately, quinclorac residues are phytotoxic to many crops/vegetables. The degradation of quinclorac in nature is very slow. On the other hand, degradation of quinclorac using bacteria can be an effective and efficient method to reduce its contamination. In this study, we isolated a quinclorac bioremediation bacterium strain F4 from quinclorac contaminated soils. Based on morphological characteristics and 16S rRNA gene sequence analysis, we identified strain F4 as Mycobacterium sp. We investigated the effects of temperature, pH, inoculation size and initial quinclorac concentration on growth and degrading efficiency of F4 and determined the optimal quinclorac degrading condition of F4. Under optimal degrading conditions, F4 degraded 97.38% of quinclorac from an initial concentration of 50 mg/L in seven days. Our indoor pot experiment demonstrated that the degradation products were non-phytotoxic to tobacco. After analyzing the quinclorac degradation products of F4, we proposed that F4 could employ two pathways to degrade quinclorac: one is through methylation, the other is through dechlorination. Furthermore, we reconstructed the whole genome of F4 through single molecular sequencing and de novo assembly. We identified 77 methyltransferases and eight dehalogenases in the F4 genome to support our hypothesized degradation path.

  4. New potential markers of in vitro tomato morphogenesis identified by mRNA differential display.

    Science.gov (United States)

    Torelli, A; Soragni, E; Bolchi, A; Petrucco, S; Ottonello, S; Branca, C

    1996-12-01

    The identification of plant genes involved in early phases of in vitro morphogenesis can not only contribute to our understanding of the processes underlying growth regulator-controlled determination, but also provide novel markers for evaluating the outcome of in vitro regeneration experiments. To search for such genes and to monitor changes in gene expression accompanying in vitro regeneration, we have adapted the mRNA differential display technique to the comparative analysis of a model system of tomato cotyledons that can be driven selectively toward either shoot or callus formation by means of previously determined growth regulator supplementations. Hormone-independent transcriptional modulation (mainly down-regulation) has been found to be the most common event, indicating that a non-specific reprogramming of gene expression quantitatively predominates during the early phases of in vitro culture. However, cDNA fragments representative of genes that are either down-regulated or induced in a programme-specific manner could also be identified, and two of them (G35, G36) were further characterized. One of these cDNA fragments, G35, corresponds to an mRNA that is down-regulated much earlier in callus- (day 2) than in shoot-determined explants (day 6). The other, G36, identifies an mRNA that is transiently expressed in shoot-determined explants only, well before any macroscopic signs of differentiation become apparent, and thus exhibits typical features of a morphogenetic marker.

  5. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  6. Melatonin identified in meats and other food stuffs: potentially nutritional impact.

    Science.gov (United States)

    Tan, Dun-Xian; Zanghi, Brian M; Manchester, Lucien C; Reiter, Russel J

    2014-09-01

    Melatonin has been identified in primitive photosynthetic bacteria, fungi, plants, and animals including humans. Vegetables, fruits, cereals, wine, and beers all contain melatonin. However, the melatonin content in meats has not been reported previously. Here, for the first time, we report melatonin in meats, eggs, colostrum, and in other edible food products. The levels of melatonin measured by HPLC, in lamb, beef, pork, chicken, and fish, are comparable to other food stuffs (in the range of ng/g). These levels are significantly higher than melatonin concentrations in the blood of vertebrates. As melatonin is a potent antioxidant, its presence in the meat could contribute to shelf life duration as well as preserve their quality and taste. In addition, the consumption of these foods by humans or animals could have health benefits considering the important functions of melatonin as a potent free radical scavenger and antioxidant. © 2014 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  7. A Complementary Bioinformatics Approach to Identify Potential Plant Cell Wall Glycosyltransferase-Encoding Genes

    DEFF Research Database (Denmark)

    Egelund, Jack; Skjøt, Michael; Geshi, Naomi

    2004-01-01

    Plant cell wall (CW) synthesizing enzymes can be divided into the glycan (i.e. cellulose and callose) synthases, which are multimembrane spanning proteins located at the plasma membrane, and the glycosyltransferases (GTs), which are Golgi localized single membrane spanning proteins, believed....... Although much is known with regard to composition and fine structures of the plant CW, only a handful of CW biosynthetic GT genes-all classified in the CAZy system-have been characterized. In an effort to identify CW GTs that have not yet been classified in the CAZy database, a simple bioinformatics...... approach was adopted. First, the entire Arabidopsis proteome was run through the Transmembrane Hidden Markov Model 2.0 server and proteins containing one or, more rarely, two transmembrane domains within the N-terminal 150 amino acids were collected. Second, these sequences were submitted...

  8. Cheap and Nasty? The Potential Perils of Using Management Costs to Identify Global Conservation Priorities

    Science.gov (United States)

    McCreless, Erin; Visconti, Piero; Carwardine, Josie; Wilcox, Chris; Smith, Robert J.

    2013-01-01

    The financial cost of biodiversity conservation varies widely around the world and such costs should be considered when identifying countries to best focus conservation investments. Previous global prioritizations have been based on global models for protected area management costs, but this metric may be related to other factors that negatively influence the effectiveness and social impacts of conservation. Here we investigate such relationships and first show that countries with low predicted costs are less politically stable. Local support and capacity can mitigate the impacts of such instability, but we also found that these countries have less civil society involvement in conservation. Therefore, externally funded projects in these countries must rely on government agencies for implementation. This can be problematic, as our analyses show that governments in countries with low predicted costs score poorly on indices of corruption, bureaucratic quality and human rights. Taken together, our results demonstrate that using national-level estimates for protected area management costs to set global conservation priorities is simplistic, as projects in apparently low-cost countries are less likely to succeed and more likely to have negative impacts on people. We identify the need for an improved approach to develop global conservation cost metrics that better capture the true costs of avoiding or overcoming such problems. Critically, conservation scientists must engage with practitioners to better understand and implement context-specific solutions. This approach assumes that measures of conservation costs, like measures of conservation value, are organization specific, and would bring a much-needed focus on reducing the negative impacts of conservation to develop projects that benefit people and biodiversity. PMID:24260502

  9. Cheap and nasty? The potential perils of using management costs to identify global conservation priorities.

    Directory of Open Access Journals (Sweden)

    Erin McCreless

    Full Text Available The financial cost of biodiversity conservation varies widely around the world and such costs should be considered when identifying countries to best focus conservation investments. Previous global prioritizations have been based on global models for protected area management costs, but this metric may be related to other factors that negatively influence the effectiveness and social impacts of conservation. Here we investigate such relationships and first show that countries with low predicted costs are less politically stable. Local support and capacity can mitigate the impacts of such instability, but we also found that these countries have less civil society involvement in conservation. Therefore, externally funded projects in these countries must rely on government agencies for implementation. This can be problematic, as our analyses show that governments in countries with low predicted costs score poorly on indices of corruption, bureaucratic quality and human rights. Taken together, our results demonstrate that using national-level estimates for protected area management costs to set global conservation priorities is simplistic, as projects in apparently low-cost countries are less likely to succeed and more likely to have negative impacts on people. We identify the need for an improved approach to develop global conservation cost metrics that better capture the true costs of avoiding or overcoming such problems. Critically, conservation scientists must engage with practitioners to better understand and implement context-specific solutions. This approach assumes that measures of conservation costs, like measures of conservation value, are organization specific, and would bring a much-needed focus on reducing the negative impacts of conservation to develop projects that benefit people and biodiversity.

  10. Identifying and acting on potentially inappropriate care? Inadequacy of current hospital coding for this task.

    Science.gov (United States)

    Cooper, P David; Smart, David R

    2017-06-01

    Recent Australian attempts to facilitate disinvestment in healthcare, by identifying instances of 'inappropriate' care from large Government datasets, are subject to significant methodological flaws. Amongst other criticisms has been the fact that the Government datasets utilized for this purpose correlate poorly with datasets collected by relevant professional bodies. Government data derive from official hospital coding, collected retrospectively by clerical personnel, whilst professional body data derive from unit-specific databases, collected contemporaneously with care by clinical personnel. Assessment of accuracy of official hospital coding data for hyperbaric services in a tertiary referral hospital. All official hyperbaric-relevant coding data submitted to the relevant Australian Government agencies by the Royal Hobart Hospital, Tasmania, Australia for financial year 2010-2011 were reviewed and compared against actual hyperbaric unit activity as determined by reference to original source documents. Hospital coding data contained one or more errors in diagnoses and/or procedures in 70% of patients treated with hyperbaric oxygen that year. Multiple discrete error types were identified, including (but not limited to): missing patients; missing treatments; 'additional' treatments; 'additional' patients; incorrect procedure codes and incorrect diagnostic codes. Incidental observations of errors in surgical, anaesthetic and intensive care coding within this cohort suggest that the problems are not restricted to the specialty of hyperbaric medicine alone. Publications from other centres indicate that these problems are not unique to this institution or State. Current Government datasets are irretrievably compromised and not fit for purpose. Attempting to inform the healthcare policy debate by reference to these datasets is inappropriate. Urgent clinical engagement with hospital coding departments is warranted.

  11. Cheap and nasty? The potential perils of using management costs to identify global conservation priorities.

    Science.gov (United States)

    McCreless, Erin; Visconti, Piero; Carwardine, Josie; Wilcox, Chris; Smith, Robert J

    2013-01-01

    The financial cost of biodiversity conservation varies widely around the world and such costs should be considered when identifying countries to best focus conservation investments. Previous global prioritizations have been based on global models for protected area management costs, but this metric may be related to other factors that negatively influence the effectiveness and social impacts of conservation. Here we investigate such relationships and first show that countries with low predicted costs are less politically stable. Local support and capacity can mitigate the impacts of such instability, but we also found that these countries have less civil society involvement in conservation. Therefore, externally funded projects in these countries must rely on government agencies for implementation. This can be problematic, as our analyses show that governments in countries with low predicted costs score poorly on indices of corruption, bureaucratic quality and human rights. Taken together, our results demonstrate that using national-level estimates for protected area management costs to set global conservation priorities is simplistic, as projects in apparently low-cost countries are less likely to succeed and more likely to have negative impacts on people. We identify the need for an improved approach to develop global conservation cost metrics that better capture the true costs of avoiding or overcoming such problems. Critically, conservation scientists must engage with practitioners to better understand and implement context-specific solutions. This approach assumes that measures of conservation costs, like measures of conservation value, are organization specific, and would bring a much-needed focus on reducing the negative impacts of conservation to develop projects that benefit people and biodiversity.

  12. The Placental Secretome: Identifying Potential Cross-Talk Between Placenta and Islet β-Cells

    Directory of Open Access Journals (Sweden)

    Robert Drynda

    2018-02-01

    Full Text Available Background/Aims: Insulin-secreting islet β-cells adapt to the insulin resistance associated with pregnancy by increasing functional β-cell mass, but the placental signals involved in this process are not well defined. In the current study, we analysed expression of G-protein coupled receptor (GPCR mRNAs in mouse islets and islet GPCR ligand mRNAs in placenta during pregnancy to generate an atlas of potential interactions between the placenta and β-cells to inform future functional studies of islet adaptive responses to pregnancy. Methods: Quantative RT-PCR arrays were used to measure mRNA expression levels of: (i 342 GPCRs in islets from non-pregnant mice, and in islets isolated from mice on gestational days 12 and 18; (ii 126 islet GPCR ligands in mouse placenta at gestational days 12 and 18. Results: At gestational day 12, a time of rapid expansion of the β-cell mass, 189 islet GPCR mRNAs were quantifiable, while 79 of the 126 known islet GPCR ligand mRNAs were detectable in placental extracts. Approximately half of the quantifiable placental GPCR ligand genes were of unknown function in β-cells. The expression of some islet GPCR and placental ligand mRNAs varied during pregnancy, with altered expression of both GPCR and ligand mRNAs by gestational day 18. Conclusion: The current study has revealed numerous potential routes for interaction between the placenta and islets, and offers an atlas to inform further functional studies of their roles in adaptive responses to pregnancy, and in the regulation of the β-cell mass.

  13. Identifying potential environmental impacts of waste handling strategies in textile industry.

    Science.gov (United States)

    Yacout, Dalia M M; Hassouna, M S

    2016-08-01

    Waste management is a successful instrument to minimize generated waste and improve environmental conditions. In spite of the large share of developing countries in the textile industry, limited information is available concerning the waste management strategies implemented for textiles on those countries and their environmental impacts. In the current study, two waste management approaches for hazardous solid waste treatment of acrylic fibers (landfill and incineration) were investigated. The main research questions were: What are the different impacts of each waste management strategy? Which waste management strategy is more ecofriendly? Life cycle assessment was employed in order to model the environmental impacts of each waste streaming approach separately then compare them together. Results revealed that incineration was the more ecofriendly approach. Highest impacts of both approaches were on ecotoxicity and carcinogenic potentials due to release of metals from pigment wastes. Landfill had an impact of 46.8 % on human health as compared to 28 % by incineration. Incineration impact on ecosystem quality was higher than landfill impact (68.4 and 51.3 %, respectively). As for resources category, incineration had a higher impact than landfill (3.5 and 2.0 %, respectively). Those impacts could be mitigated if state-of-the-art landfill or incinerator were used and could be reduced by applying waste to energy approaches for both management systems In conclusion, shifting waste treatment from landfill to incineration would decrease the overall environmental impacts and allow energy recovery. The potential of waste to energy approach by incineration with heat recovery could be considered in further studies. Future research is needed in order to assess the implementation of waste management systems and the preferable waste management strategies in the textile industry on developing countries.

  14. Using event related potentials to identify a user's behavioural intention aroused by product form design.

    Science.gov (United States)

    Ding, Yi; Guo, Fu; Zhang, Xuefeng; Qu, Qingxing; Liu, Weilin

    2016-07-01

    The capacity of product form to arouse user's behavioural intention plays a decisive role in further user experience, even in purchase decision, while traditional methods rarely give a fully understanding of user experience evoked by product form, especially the feeling of anticipated use of product. Behavioural intention aroused by product form designs has not yet been investigated electrophysiologically. Hence event related potentials (ERPs) were applied to explore the process of behavioural intention when users browsed different smart phone form designs with brand and price not taken into account for mainly studying the brain activity evoked by variety of product forms. Smart phone pictures with different anticipated user experience were displayed with equiprobability randomly. Participants were asked to click the left mouse button when certain picture gave them a feeling of behavioural intention to interact with. The brain signal of each participant was recorded by Curry 7.0. The results show that pictures with an ability to arouse participants' behavioural intention for further experience can evoke enhanced N300 and LPPs (late positive potentials) in central-parietal, parietal and occipital regions. The scalp topography shows that central-parietal, parietal and occipital regions are more activated. The results indicate that the discrepancy of ERPs can reflect the neural activities of behavioural intention formed or not. Moreover, amplitude of ERPs occurred in corresponding brain areas can be used to measure user experience. The exploring of neural correlated with behavioural intention provide an accurate measurement method of user's perception and help marketers to know which product can arouse users' behavioural intention, maybe taken as an evaluating indicator of product design. Copyright © 2016 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  15. Effective Drug Delivery in Diffuse Intrinsic Pontine Glioma: A Theoretical Model to Identify Potential Candidates

    Directory of Open Access Journals (Sweden)

    Fatma E. El-Khouly

    2017-10-01

    Full Text Available Despite decades of clinical trials for diffuse intrinsic pontine glioma (DIPG, patient survival does not exceed 10% at two years post-diagnosis. Lack of benefit from systemic chemotherapy may be attributed to an intact bloodbrain barrier (BBB. We aim to develop a theoretical model including relevant physicochemical properties in order to review whether applied chemotherapeutics are suitable for passive diffusion through an intact BBB or whether local administration via convection-enhanced delivery (CED may increase their therapeutic potential. Physicochemical properties (lipophilicity, molecular weight, and charge in physiological environment of anticancer drugs historically and currently administered to DIPG patients, that affect passive diffusion over the BBB, were included in the model. Subsequently, the likelihood of BBB passage of these drugs was ascertained, as well as their potential for intratumoral administration via CED. As only non-molecularly charged, lipophilic, and relatively small sized drugs are likely to passively diffuse through the BBB, out of 51 drugs modeled, only 8 (15%—carmustine, lomustine, erlotinib, vismodegib, lenalomide, thalidomide, vorinostat, and mebendazole—are theoretically qualified for systemic administration in DIPG. Local administration via CED might create more therapeutic options, excluding only positively charged drugs and drugs that are either prodrugs and/or only available as oral formulation. A wide variety of drugs have been administered systemically to DIPG patients. Our model shows that only few are likely to penetrate the BBB via passive diffusion, which may partly explain the lack of efficacy. Drug distribution via CED is less dependent on physicochemical properties and may increase the therapeutic options for DIPG.

  16. 3D geostatistical modelling for identifying sinkhole disaster potential zones around the Verkhnekamskoye potash deposit (Russia)

    Science.gov (United States)

    Royer, J. J.; Litaudon, J.; Filippov, L. O.; Lyubimova, T.; Maximovich, N.

    2017-07-01

    This work results from a cooperative scientific program between the Perm State University (Russia) and the University of Lorraine (France). Its objectives are to integrate modern 3D geomodeling in order to improve sustainable mining extraction, especially for predicting and avoiding the formation of sinkholes disaster potential zones. Systematic exploration drill holes performed in the Verkhnekamskoye potash deposit (Perm region, Russia) have been used to build a comprehensive 3D model for better understanding the spatial repartition of the ore quality (geometallurgy). A precise modelling of the mineralized layers allows an estimation of the in-situ ore reserves after interpolating by kriging the potassium (K) and magnesium (Mg) contents at the node of a regular centred grid (over a million cells). Total resources in potassium vary according to the cut-off between 4.7Gt @ 16.1 % K2O; 0.32 % MgCl2 for a cut-off grade at 13.1% K2O and 2.06 Gt @ 18.2 % K2O; 0.32 % MgCl2 at a cut-off of 16.5% K2O. Most of reserves are located in the KPI, KPII and KPIII layers, the KPI being the richest, and KPIII the largest in terms of tonnage. A systematic study of the curvature calculated along the roof of the mineralized layers points out the location of potential main faults which play a major role in the formation of sinkhole during exploitation. A risk map is then derived from this attribute.

  17. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  18. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  19. Proteomic analysis of polyribosomes identifies splicing factors as potential regulators of translation during mitosis.

    Science.gov (United States)

    Aviner, Ranen; Hofmann, Sarah; Elman, Tamar; Shenoy, Anjana; Geiger, Tamar; Elkon, Ran; Ehrlich, Marcelo; Elroy-Stein, Orna

    2017-06-02

    Precise regulation of mRNA translation is critical for proper cell division, but little is known about the factors that mediate it. To identify mRNA-binding proteins that regulate translation during mitosis, we analyzed the composition of polysomes from interphase and mitotic cells using unbiased quantitative mass-spectrometry (LC-MS/MS). We found that mitotic polysomes are enriched with a subset of proteins involved in RNA processing, including alternative splicing and RNA export. To demonstrate that these may indeed be regulators of translation, we focused on heterogeneous nuclear ribonucleoprotein C (hnRNP C) as a test case and confirmed that it is recruited to elongating ribosomes during mitosis. Then, using a combination of pulsed SILAC, metabolic labeling and ribosome profiling, we showed that knockdown of hnRNP C affects both global and transcript-specific translation rates and found that hnRNP C is specifically important for translation of mRNAs that encode ribosomal proteins and translation factors. Taken together, our results demonstrate how proteomic analysis of polysomes can provide insight into translation regulation under various cellular conditions of interest and suggest that hnRNP C facilitates production of translation machinery components during mitosis to provide daughter cells with the ability to efficiently synthesize proteins as they enter G1 phase. © The Author(s) 2017. Published by Oxford University Press on behalf of Nucleic Acids Research.

  20. Feasibility Study to Identify Potential Reductions in Energy Use in Tribal Buildings

    Energy Technology Data Exchange (ETDEWEB)

    Stevens, Willie [Confederated Salish and Kootenai Tribes, Pablo, MT (United States)

    2017-03-30

    Under this project, the Confederated Salish and Kootenai Tribes (CSKT) assessed the technical and economic feasibility of energy efficiency improvements to existing Tribally-owned buildings. The feasibility study followed a systematic approach in identifying, selecting, and ranking recommended measures, recognizing that the appropriateness of a measure would depend not only on technical issues but also on institutional and organizational issues, such as financing options and occupant requirements. The completed study provided the Tribes with the information needed to commit necessary resources to reduce the energy use and cost in approximately 40 Tribal buildings, including the changes that may be needed in each facility’s operation and maintenance and personnel requirements. It also presented an economic analysis of energy-efficiency capital improvements and an annotated list of financing options and possible funding sources for implementation and an overall strategy for implementation. This project was located in various Tribal communities located throughout the Flathead Indian Reservation in Western Montana. Notice: The following is a compilation of Annual Program Review Presentations, Award Modifications, and Quarterly Progress Reports submitted to the Department of Energy’s (DOE) Office of Indian Energy Policy and Programs by the Confederated Salish and Kootenai Tribes under agreement DE-EE0005171. This report covers project activities from September 30, 2011 through December 31, 2014 and has been uploaded to OSTI by DOE as a substitute for the required Final Technical Report which was not received by DOE from the project recipient.

  1. Historical uses of saffron: Identifying potential new avenues for modern research

    Directory of Open Access Journals (Sweden)

    Seyedeh Zeinab Mousavi

    2011-09-01

    Full Text Available Objective: During the ancient times, saffron (Crocus sativus L. had many uses around the world; however, some of these uses were forgotten throughout the history. But a newly formed interest in natural active compounds brought back the attention toward historical uses of saffron. Understanding different uses of saffron in the past can help us finding the best uses at present. In this study, we reviewed different uses of saffron throughout the history among different nations.Methods: ISI web of Science and Medline, along with references of traditional Iranian medicine were searched for historical uses of saffron.Results: Saffron has been known since more than 3000 years ago by many nations. It was valued not only as a culinary condiment, but also as a dye, perfume and as a medicinal herb. Its medicinal uses ranged from treating eye problems to genitourinary and many other diseases in various cultures. It was also used as a tonic agent and antidepressant drug among many nations. Conclusion(s: Saffron has had many different uses such as a food additive and a palliative agent for many human diseases. Thus, as an important medicinal herb, it is a good candidate with many promising potentials to be considered for new drug design.

  2. Spatial Interaction Modeling to Identify Potentially Exposed Populations during RDD or IND Terrorism Incidents

    International Nuclear Information System (INIS)

    Regens, J.L.; Gunter, J.T.; Gupta, S.

    2009-01-01

    Homeland Security Presidential Directive no.5 (HSPD-5) Management of Domestic Incidents and Department of Homeland Security (DHS) Planning Guidance for Protection and Recovery Following Radiological Dispersal Device (RDD) and Improvised Nuclear Device (IND) Incidents underscore the need to delineate radiological emergency guidance applicable to remedial action and recovery following an RDD or IND incident. Rapid delineation of the population potentially exposed to ionizing radiation from fallout during terrorist incidents involving RDDs or low-yield nuclear devices (≤ 20 KT) is necessary for effective medical response and incident management as part of the recovery process. This paper illustrates the application of spatial interaction models to allocate population data for a representative U.S. urban area (≅1.3M people; 1,612.27 km 2 area) at a geographical scale relevant for accurately estimating risk given dose concentrations. Estimated total dose equivalents (TEDE) are calculated for isopleths moving away from the detonation point for typical release scenarios. Population is estimated within the TEDE zones using Euclidean distances between zip code polygon centroids generated in ArcGIS version 9.1 with distance decay determined by regression analysis to apportion origin-destination pairs to a population count and density matrix on a spatial basis for daytime and night-time release scenarios. (authors)

  3. Identifying the Potential for Robotics to Assist Older Adults in Different Living Environments

    Science.gov (United States)

    Mitzner, Tracy L.; Chen, Tiffany L.; Kemp, Charles C.; Rogers, Wendy A.

    2014-01-01

    As the older adult population grows and becomes more diverse, so will their needs and preferences for living environments. Many adults over 65 years of age require some assistance [1, 2]; yet it is important for their feelings of well-being that the assistance not restrict their autonomy [3]. Not only is autonomy correlated with quality of life [4], autonomy enhancement may improve functionality [2, 5]. The goal of this paper is to provide guidance for the development of technology to enhance autonomy and quality of life for older adults. We explore the potential for robotics to meet these needs. We evaluated older adults' diverse living situations and the predictors of residential moves to higher levels of care in the United States. We also examined older adults' needs for assistance with activities of daily living (ADLs), instrumental activities of daily living (IADLs), and medical conditions when living independently or in a long-term care residence. By providing support for older adults, mobile manipulator robots may reduce need-driven, undesired moves from residences with lower levels of care (i.e., private homes, assisted living) to those with higher levels of care (i.e., skilled nursing). PMID:24729800

  4. Historical uses of saffron: Identifying potential new avenues for modern research

    Directory of Open Access Journals (Sweden)

    Seyedeh Zeinab Mousavi

    2011-09-01

    Full Text Available Objective: During the ancient times, saffron (Crocus sativus L. had many uses around the world; however, some of these uses were forgotten throughout the history. But a newly formed interest in natural active compounds brought back the attention toward historical uses of saffron. Understanding different uses of saffron in the past can help us finding the best uses at present.In this study, wereviewed different uses of saffron throughout the history among different nations. Methods: ISI web of Science and Medline, along with references of traditional Iranian medicine were searched for historical uses of saffron. Results: Saffron has been known since more than 3000 years ago by many nations. It was valued not only as a culinary condiment, but also as a dye, perfume and as a medicinal herb. Its medicinal uses ranged from treating eye problems to genitourinary and many other diseases in various cultures. It was also used as a tonic agent and antidepressant drug among many nations. Conclusion(s: Saffron has had many different uses such as a food additive and a palliative agent for many human diseases. Thus, as an important medicinal herb, it is a good candidate with many promising potentials to be considered for new drug design.

  5. Identifying the null subject: evidence from event-related brain potentials.

    Science.gov (United States)

    Demestre, J; Meltzer, S; García-Albea, J E; Vigil, A

    1999-05-01

    Event-related brain potentials (ERPs) were recorded during spoken language comprehension to study the on-line effects of gender agreement violations in controlled infinitival complements. Spanish sentences were constructed in which the complement clause contained a predicate adjective marked for syntactic gender. By manipulating the gender of the antecedent (i.e., the controller) of the implicit subject while holding constant the gender of the adjective, pairs of grammatical and ungrammatical sentences were created. The detection of such a gender agreement violation would indicate that the parser had established the coreference relation between the null subject and its antecedent. The results showed a complex biphasic ERP (i.e., an early negativity with prominence at anterior and central sites, followed by a centroparietal positivity) in the violating condition as compared to the non-violating conditions. The brain reacts to NP-adjective gender agreement violations within a few hundred milliseconds of their occurrence. The data imply that the parser has properly coindexed the null subject of an infinitive clause with its antecedent.

  6. Using Smoke Injection in Drains to Identify Potential Preferential Pathways in a Drained Arable Field

    Science.gov (United States)

    Nielsen, M. H.; Petersen, C. T.; Hansen, S.

    2014-12-01

    Macropores forming a continuous pathway between the soil surface and subsurface drains favour the transport of many contaminants from agricultural fields to surface waters. The smoke injection method presented by Shipitalo and Gibbs (2000) used for demonstrating and quantifying such pathways has been further developed and used on a drained Danish sandy loam. In order to identify the preferential pathways to drains, smoke was injected in three 1.15 m deep tile drains (total drain length 93 m), and smoke emitting macropores (SEMP) at the soil surface were counted and characterized as producing either strong or weak plumes compared to reference plumes from 3 and 6 mm wide tubes. In the two situations investigated in the present study - an early spring and an autumn situation, smoke only penetrated the soil surface layer via earthworm burrows located in a 1.0 m wide belt directly above the drain lines. However, it is known from previous studies that desiccation fractures in a dry summer situation also can contribute to the smoke pattern. The distance between SEMP measured along the drain lines was on average 0.46 m whereas the average spacing between SEMP with strong plumes was 2.3 m. Ponded water was applied in 6 cm wide rings placed above 52 burrows including 17 reference burrows which did not emit smoke. Thirteen pathways in the soil were examined using dye tracer and profile excavation. SEMP with strong plumes marked the entrance of highly efficient transport pathways conducting surface applied water and dye tracer into the drain. However, no single burrow was traced all the way from the surface into the drain, the dye patterns branched off in a network of other macropores. Water infiltration rates were significantly higher (P drains and surface waters, pathways being associated primarily with unevenly distributed SEMP producing strong smoke plumes.

  7. IDENTIFYING POTENTIAL MARKERS OF THE SUN'S GIANT CONVECTIVE SCALE

    Energy Technology Data Exchange (ETDEWEB)

    McIntosh, Scott W.; Wang, Xin [High Altitude Observatory, National Center for Atmospheric Research, P.O. Box 3000, Boulder, CO 80307 (United States); Leamon, Robert J. [Department of Physics, Montana State University, Bozeman, MT 59717 (United States); Scherrer, Philip H. [W. W. Hansen Experimental Physics Laboratory, Stanford University, Stanford, CA 94305 (United States)

    2014-04-01

    Line-of-sight magnetograms from the Helioseismic and Magnetic Imager (HMI) of the Solar Dynamics Observatory (SDO) are analyzed using a diagnostic known as the magnetic range of influence (MRoI). The MRoI is a measure of the length over which a photospheric magnetogram is balanced and so its application gives the user a sense of the connective length scales in the outer solar atmosphere. The MRoI maps and histograms inferred from the SDO/HMI magnetograms primarily exhibit four scales: a scale of a few megameters that can be associated with granulation, a scale of a few tens of megameters that can be associated with super-granulation, a scale of many hundreds to thousands of megameters that can be associated with coronal holes and active regions, and a hitherto unnoticed scale that ranges from 100 to 250 Mm. We infer that this final scale is an imprint of the (rotationally driven) giant convective scale on photospheric magnetism. This scale appears in MRoI maps as well-defined, spatially distributed concentrations that we have dubbed ''g-nodes''. Furthermore, using coronal observations from the Atmospheric Imaging Assembly on SDO, we see that the vicinity of these g-nodes appears to be a preferred location for the formation of extreme-ultraviolet (and likely X-Ray) brightpoints. These observations and straightforward diagnostics offer the potential of a near real-time mapping of the Sun's largest convective scale, a scale that possibly reaches to the very bottom of the convective zone.

  8. iTRAQ-Based Quantitative Proteomics Identifies Potential Regulatory Proteins Involved in Chicken Eggshell Brownness.

    Directory of Open Access Journals (Sweden)

    Guangqi Li

    Full Text Available Brown eggs are popular in many countries and consumers regard eggshell brownness as an important indicator of egg quality. However, the potential regulatory proteins and detailed molecular mechanisms regulating eggshell brownness have yet to be clearly defined. In the present study, we performed quantitative proteomics analysis with iTRAQ technology in the shell gland epithelium of hens laying dark and light brown eggs to investigate the candidate proteins and molecular mechanisms underlying variation in chicken eggshell brownness. The results indicated 147 differentially expressed proteins between these two groups, among which 65 and 82 proteins were significantly up-regulated in the light and dark groups, respectively. Functional analysis indicated that in the light group, the down-regulated iron-sulfur cluster assembly protein (Iba57 would decrease the synthesis of protoporphyrin IX; furthermore, the up-regulated protein solute carrier family 25 (mitochondrial carrier; adenine nucleotide translocator, member 5 (SLC25A5 and down-regulated translocator protein (TSPO would lead to increased amounts of protoporphyrin IX transported into the mitochondria matrix to form heme with iron, which is supplied by ovotransferrin protein (TF. In other words, chickens from the light group produce less protoporphyrin IX, which is mainly used for heme synthesis. Therefore, the exported protoporphyrin IX available for eggshell deposition and brownness is reduced in the light group. The current study provides valuable information to elucidate variation of chicken eggshell brownness, and demonstrates the feasibility and sensitivity of iTRAQ-based quantitative proteomics analysis in providing useful insights into the molecular mechanisms underlying brown eggshell pigmentation.

  9. Declines in Crime and Teen Childbearing: Identifying Potential Explanations for Contemporaneous Trends

    Science.gov (United States)

    Colen, Cynthia G.; Ramey, David M.; Browning, Christopher R.

    2016-01-01

    Objectives The previous 25 years have witnessed remarkable upheavals in the social landscape of the United States. Two of the most notable trends have been dramatic declines in levels of crime as well as teen childbearing. Much remains unknown about the underlying conditions that might be driving these changes. More importantly, we do not know if the same distal factors that are responsible for the drop in the crime rate are similarly implicated in falling rates of teen births. We examine four overarching potential explanations: fluctuations in economic opportunity, shifting population demographics, differences in state-level policies, and changes in expectations regarding health and mortality. Methods We combine state-specific data from existing secondary sources and model trajectories of violent crime, homicides, robberies, and teen fertility over a 20-year period from 1990 to 2010 using simultaneous fixed-effects regression models. Results We find that 4 of the 21 predictors examined - growth in the service sector of the labor market, increasing racial diversity especially among Hispanics, escalating levels of migration, and the expansion of family planning services to low-income women – offer the most convincing explanations for why rates of violent crime and teen births have been steadily decreasing over time. Moreover, we are able to account for almost a quarter of the joint declines in violent crime and teen births. Conclusions Our conclusions underscore the far reaching effects that aggregate level demographic conditions and policies are likely to have on important social trends that might, at first glance, seem unrelated. Furthermore, the effects of policy efforts designed to target outcomes in one area are likely to spill over into other domains. PMID:27695160

  10. Distribution and incidence of atoxigenic Aspergillus flavus VCG in tree crop orchards in California: a strategy for identifying potential antagonists

    Science.gov (United States)

    To identify predominant isolates for potential use as biocontrol agents, Aspergillus flavus isolates collected soils of almond, pistachio and fig orchard in the Central Valley of California were tested for their membership to 16 atoxigenic vegetative compatibility groups(VCGs), including YV36, the V...

  11. Novel modeling of combinatorial miRNA targeting identifies SNP with potential role in bone density.

    Directory of Open Access Journals (Sweden)

    Claudia Coronnello

    Full Text Available MicroRNAs (miRNAs are post-transcriptional regulators that bind to their target mRNAs through base complementarity. Predicting miRNA targets is a challenging task and various studies showed that existing algorithms suffer from high number of false predictions and low to moderate overlap in their predictions. Until recently, very few algorithms considered the dynamic nature of the interactions, including the effect of less specific interactions, the miRNA expression level, and the effect of combinatorial miRNA binding. Addressing these issues can result in a more accurate miRNA:mRNA modeling with many applications, including efficient miRNA-related SNP evaluation. We present a novel thermodynamic model based on the Fermi-Dirac equation that incorporates miRNA expression in the prediction of target occupancy and we show that it improves the performance of two popular single miRNA target finders. Modeling combinatorial miRNA targeting is a natural extension of this model. Two other algorithms show improved prediction efficiency when combinatorial binding models were considered. ComiR (Combinatorial miRNA targeting, a novel algorithm we developed, incorporates the improved predictions of the four target finders into a single probabilistic score using ensemble learning. Combining target scores of multiple miRNAs using ComiR improves predictions over the naïve method for target combination. ComiR scoring scheme can be used for identification of SNPs affecting miRNA binding. As proof of principle, ComiR identified rs17737058 as disruptive to the miR-488-5p:NCOA1 interaction, which we confirmed in vitro. We also found rs17737058 to be significantly associated with decreased bone mineral density (BMD in two independent cohorts indicating that the miR-488-5p/NCOA1 regulatory axis is likely critical in maintaining BMD in women. With increasing availability of comprehensive high-throughput datasets from patients ComiR is expected to become an essential

  12. The effect of stereotype threat on performance of a rhythmic motor skill.

    Science.gov (United States)

    Huber, Meghan E; Seitchik, Allison E; Brown, Adam J; Sternad, Dagmar; Harkins, Stephen G

    2015-04-01

    Many studies using cognitive tasks have found that stereotype threat, or concern about confirming a negative stereotype about one's group, debilitates performance. The few studies that documented similar effects on sensorimotor performance have used only relatively coarse measures to quantify performance. This study tested the effect of stereotype threat on a rhythmic ball bouncing task, where previous analyses of the task dynamics afforded more detailed quantification of the effect of threat on motor control. In this task, novices hit the ball with positive racket acceleration, indicative of unstable performance. With practice, they learn to stabilize error by changing their ball-racket impact from positive to negative acceleration. Results showed that for novices, stereotype threat potentiated hitting the ball with positive racket acceleration, leading to poorer performance of stigmatized females. However, when the threat manipulation was delivered after having acquired some skill, reflected by negative racket acceleration, the stigmatized females performed better. These findings are consistent with the mere effort account that argues that stereotype threat potentiates the most likely response on the given task. The study also demonstrates the value of identifying the control mechanisms through which stereotype threat has its effects on outcome measures. (c) 2015 APA, all rights reserved.

  13. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  14. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  15. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  16. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  17. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  18. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  19. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  20. Application of biclustering of gene expression data and gene set enrichment analysis methods to identify potentially disease causing nanomaterials

    Directory of Open Access Journals (Sweden)

    Andrew Williams

    2015-12-01

    Full Text Available Background: The presence of diverse types of nanomaterials (NMs in commerce is growing at an exponential pace. As a result, human exposure to these materials in the environment is inevitable, necessitating the need for rapid and reliable toxicity testing methods to accurately assess the potential hazards associated with NMs. In this study, we applied biclustering and gene set enrichment analysis methods to derive essential features of altered lung transcriptome following exposure to NMs that are associated with lung-specific diseases. Several datasets from public microarray repositories describing pulmonary diseases in mouse models following exposure to a variety of substances were examined and functionally related biclusters of genes showing similar expression profiles were identified. The identified biclusters were then used to conduct a gene set enrichment analysis on pulmonary gene expression profiles derived from mice exposed to nano-titanium dioxide (nano-TiO2, carbon black (CB or carbon nanotubes (CNTs to determine the disease significance of these data-driven gene sets.Results: Biclusters representing inflammation (chemokine activity, DNA binding, cell cycle, apoptosis, reactive oxygen species (ROS and fibrosis processes were identified. All of the NM studies were significant with respect to the bicluster related to chemokine activity (DAVID; FDR p-value = 0.032. The bicluster related to pulmonary fibrosis was enriched in studies where toxicity induced by CNT and CB studies was investigated, suggesting the potential for these materials to induce lung fibrosis. The pro-fibrogenic potential of CNTs is well established. Although CB has not been shown to induce fibrosis, it induces stronger inflammatory, oxidative stress and DNA damage responses than nano-TiO2 particles.Conclusion: The results of the analysis correctly identified all NMs to be inflammogenic and only CB and CNTs as potentially fibrogenic. In addition to identifying several

  1. Molecular analysis of faecal samples from birds to identify potential crop pests and useful biocontrol agents in natural areas.

    Science.gov (United States)

    King, R A; Symondson, W O C; Thomas, R J

    2015-06-01

    Wild habitats adjoining farmland are potentially valuable sources of natural enemies, but also of pests. Here we tested the utility of birds as 'sampling devices', to identify the diversity of prey available to predators and particularly to screen for pests and natural enemies using natural ecosystems as refugia. Here we used PCR to amplify prey DNA from three sympatric songbirds foraging on small invertebrates in Phragmites reedbed ecosystems, namely the Reed Warbler (Acrocephalus scirpaceus), Sedge Warbler (Acrocephalus schoenobaenus) and Cetti's Warbler (Cettia cetti). A recently described general invertebrate primer pair was used for the first time to analyse diets. Amplicons were cloned and sequenced, then identified by reference to the Barcoding of Life Database and to our own sequences obtained from fresh invertebrates. Forty-five distinct prey DNA sequences were obtained from 11 faecal samples, of which 39 could be identified to species or genus. Targeting three warbler species ensured that species-specific differences in prey choice broadened the range of prey taken. Amongst the prey found in reedbeds were major pests (including the tomato moth Lacanobia oleracea) as well as many potentially valuable natural enemies including aphidophagous hoverflies and braconid wasps. Given the mobility of birds, this approach provides a practical way of sampling a whole habitat at once, providing growers with information on possible invasion by locally resident pests and the colonization potential of natural enemies from local natural habitats.

  2. Can inbound and domestic medical tourism improve your bottom line? Identifying the potential of a U.S. tourism market.

    Science.gov (United States)

    Fottler, Myron D; Malvey, Donna; Asi, Yara; Kirchner, Sarah; Warren, Natalia A

    2014-01-01

    In large part due to current economic conditions and the political uncertainties of healthcare reform legislation, hospitals need to identify new sources of revenue. Two potentially untapped sources are inbound (international) and domestic (within the United States) medical tourists. This case study uses data from a large, urban healthcare system in the southeastern United States to quantify its potential market opportunities for medical tourism. The data were mined from electronic health records, and descriptive frequency analysis was used to provide a preliminary market assessment. This approach permits healthcare systems to move beyond anecdotal information and assess the relative market potential of their particular geographic area and the diagnostic services they offer for attracting inbound and domestic medical tourists. Implications for healthcare executives and guidance on how they can focus marketing efforts are discussed.

  3. Spatial characteristics of cadmium in topsoils in a typical e-waste recycling area in southeast China and its potential threat to shallow groundwater

    International Nuclear Information System (INIS)

    Wu, Chunfa; Luo, Yongming; Deng, Shaopo; Teng, Ying; Song, Jing

    2014-01-01

    Informal electrical and electronic waste (e-waste) recycling often creates secondary sources of cadmium (Cd) pollution. To characterize the total Cd concentration (Cd total ) in topsoil and evaluate the threat of Cd in topsoils to shallow groundwater, 187 topsoil samples and 12 shallow groundwater samples were collected in a typical e-waste recycling area in southeast China. Soil organic matter content, soil pH and Cd total in topsoil, pH and dissolved Cd concentration in shallow groundwater were measured. Cd total in the topsoils showed an inverse distribution trend with soil pH in that high Cd concentrations (and low pH values) were found in the surrounding area of the metal recycling industrial park where there were many family-operated e-waste recycling facilities before the industrial park was established and with low concentrations (and high pH values) in other areas, and they had similar spatial correlation structures. Cd accumulation and acidification were synchronous in topsoils, and soil pH was significantly correlated with Cd total in topsoils with low to moderate negative correlation coefficient (r = − 0.24), indicating that both of them maybe correlated with informal recycling. The shallow groundwater in the surrounding area of the metal recycling industrial park was seriously contaminated by Cd, and topsoil Cd accumulation and acidification in the surrounding area of e-waste recycling sites significantly increase the risk of shallow groundwater contaminated by Cd. Action is urgently required to control Cd accumulation and acidification by improving the recycling operations of e-wastes in order to reduce the risk of Cd leaching from topsoils and shallow groundwater contamination. - Highlights: • We characterize the Cd total in topsoils, pH and SOM in a typical e-waste recycling area. • The relationships between Cd total in topsoils, pH, and SOM were studied. • Impact of topsoil Cd accumulation and acidification on shallow groundwater quality

  4. Spatial characteristics of cadmium in topsoils in a typical e-waste recycling area in southeast China and its potential threat to shallow groundwater.

    Science.gov (United States)

    Wu, Chunfa; Luo, Yongming; Deng, Shaopo; Teng, Ying; Song, Jing

    2014-02-15

    Informal electrical and electronic waste (e-waste) recycling often creates secondary sources of cadmium (Cd) pollution. To characterize the total Cd concentration (Cdtotal) in topsoil and evaluate the threat of Cd in topsoils to shallow groundwater, 187 topsoil samples and 12 shallow groundwater samples were collected in a typical e-waste recycling area in southeast China. Soil organic matter content, soil pH and Cdtotal in topsoil, pH and dissolved Cd concentration in shallow groundwater were measured. Cdtotal in the topsoils showed an inverse distribution trend with soil pH in that high Cd concentrations (and low pH values) were found in the surrounding area of the metal recycling industrial park where there were many family-operated e-waste recycling facilities before the industrial park was established and with low concentrations (and high pH values) in other areas, and they had similar spatial correlation structures. Cd accumulation and acidification were synchronous in topsoils, and soil pH was significantly correlated with Cdtotal in topsoils with low to moderate negative correlation coefficient (r=-0.24), indicating that both of them maybe correlated with informal recycling. The shallow groundwater in the surrounding area of the metal recycling industrial park was seriously contaminated by Cd, and topsoil Cd accumulation and acidification in the surrounding area of e-waste recycling sites significantly increase the risk of shallow groundwater contaminated by Cd. Action is urgently required to control Cd accumulation and acidification by improving the recycling operations of e-wastes in order to reduce the risk of Cd leaching from topsoils and shallow groundwater contamination. Copyright © 2013. Published by Elsevier B.V.

  5. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  6. Content specificity of attention bias to threat in anxiety disorders: a meta-analysis.

    Science.gov (United States)

    Pergamin-Hight, Lee; Naim, Reut; Bakermans-Kranenburg, Marian J; van IJzendoorn, Marinus H; Bar-Haim, Yair

    2015-02-01

    Despite the established evidence for threat-related attention bias in anxiety, the mechanisms underlying this bias remain unclear. One important unresolved question is whether disorder-congruent threats capture attention to a greater extent than do more general or disorder-incongruent threat stimuli. Evidence for attention bias specificity in anxiety would implicate involvement of previous learning and memory processes in threat-related attention bias, whereas lack of content specificity would point to perturbations in more generic attention processes. Enhanced clarity of mechanism could have clinical implications for the stimuli types used in Attention Bias Modification Treatments (ABMT). Content specificity of threat-related attention bias in anxiety and potential moderators of this effect were investigated. A systematic search identified 37 samples from 29 articles (N=866). Relevant data were extracted based on specific coding rules, and Cohen's d effect size was used to estimate bias specificity effects. The results indicate greater attention bias toward disorder-congruent relative to disorder-incongruent threat stimuli (d=0.28, pattention tasks, or type of disorder-incongruent stimuli. No evidence of publication bias was observed. Implications for threat bias in anxiety and ABMT are discussed. Copyright © 2014 Elsevier Ltd. All rights reserved.

  7. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  8. Exome sequencing identifies rare deleterious mutations in DNA repair genes FANCC and BLM as potential breast cancer susceptibility alleles.

    Directory of Open Access Journals (Sweden)

    Ella R Thompson

    2012-09-01

    Full Text Available Despite intensive efforts using linkage and candidate gene approaches, the genetic etiology for the majority of families with a multi-generational breast cancer predisposition is unknown. In this study, we used whole-exome sequencing of thirty-three individuals from 15 breast cancer families to identify potential predisposing genes. Our analysis identified families with heterozygous, deleterious mutations in the DNA repair genes FANCC and BLM, which are responsible for the autosomal recessive disorders Fanconi Anemia and Bloom syndrome. In total, screening of all exons in these genes in 438 breast cancer families identified three with truncating mutations in FANCC and two with truncating mutations in BLM. Additional screening of FANCC mutation hotspot exons identified one pathogenic mutation among an additional 957 breast cancer families. Importantly, none of the deleterious mutations were identified among 464 healthy controls and are not reported in the 1,000 Genomes data. Given the rarity of Fanconi Anemia and Bloom syndrome disorders among Caucasian populations, the finding of multiple deleterious mutations in these critical DNA repair genes among high-risk breast cancer families is intriguing and suggestive of a predisposing role. Our data demonstrate the utility of intra-family exome-sequencing approaches to uncover cancer predisposition genes, but highlight the major challenge of definitively validating candidates where the incidence of sporadic disease is high, germline mutations are not fully penetrant, and individual predisposition genes may only account for a tiny proportion of breast cancer families.

  9. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  10. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  11. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  12. Spatial characteristics of cadmium in topsoils in a typical e-waste recycling area in southeast China and its potential threat to shallow groundwater

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Chunfa, E-mail: wchf1680@sina.com [Department of Agricultural Resources and Environment, Nanjing University of Information Science and Technology, 219 Ningliu Road, Nanjing 210044 (China); Key Laboratory of Soil Environment and Pollution Remediation, Institute of Soil Science, Chinese Academy of Sciences, 71 East Beijing Road, Nanjing 210008 (China); Luo, Yongming [Key Laboratory of Soil Environment and Pollution Remediation, Institute of Soil Science, Chinese Academy of Sciences, 71 East Beijing Road, Nanjing 210008 (China); Yantai Institute of Coastal Zone Research, Chinese Academy of Sciences, 17 Chunhui Rd, Yantai 264003 (China); Deng, Shaopo; Teng, Ying; Song, Jing [Key Laboratory of Soil Environment and Pollution Remediation, Institute of Soil Science, Chinese Academy of Sciences, 71 East Beijing Road, Nanjing 210008 (China)

    2014-02-01

    Informal electrical and electronic waste (e-waste) recycling often creates secondary sources of cadmium (Cd) pollution. To characterize the total Cd concentration (Cd{sub total}) in topsoil and evaluate the threat of Cd in topsoils to shallow groundwater, 187 topsoil samples and 12 shallow groundwater samples were collected in a typical e-waste recycling area in southeast China. Soil organic matter content, soil pH and Cd{sub total} in topsoil, pH and dissolved Cd concentration in shallow groundwater were measured. Cd{sub total} in the topsoils showed an inverse distribution trend with soil pH in that high Cd concentrations (and low pH values) were found in the surrounding area of the metal recycling industrial park where there were many family-operated e-waste recycling facilities before the industrial park was established and with low concentrations (and high pH values) in other areas, and they had similar spatial correlation structures. Cd accumulation and acidification were synchronous in topsoils, and soil pH was significantly correlated with Cd{sub total} in topsoils with low to moderate negative correlation coefficient (r = − 0.24), indicating that both of them maybe correlated with informal recycling. The shallow groundwater in the surrounding area of the metal recycling industrial park was seriously contaminated by Cd, and topsoil Cd accumulation and acidification in the surrounding area of e-waste recycling sites significantly increase the risk of shallow groundwater contaminated by Cd. Action is urgently required to control Cd accumulation and acidification by improving the recycling operations of e-wastes in order to reduce the risk of Cd leaching from topsoils and shallow groundwater contamination. - Highlights: • We characterize the Cd{sub total} in topsoils, pH and SOM in a typical e-waste recycling area. • The relationships between Cd{sub total} in topsoils, pH, and SOM were studied. • Impact of topsoil Cd accumulation and acidification on

  13. Reactive inspection response of NRC Region III to potential technical deficiencies identified in recent Nuclear Air Cleaning Conference papers

    International Nuclear Information System (INIS)

    Gill, C.F.

    1987-01-01

    In order to effectively meet its responsibility to protect the public health and safety, the Nuclear Regulatory Commission (NRC) nuclear power plant licensing and inspection programs respond to potential technical deficiencies identified by conference and professional society meeting papers when deemed appropriate. The NRC staff's response mechanisms for such technical deficiencies include: generic letters, Bulletins, Information Notices, Standard Review Plan (NUREG-0800) revisions, docketed Final Safety Analysis Report (FSAR) questions, special studies, special (reactive) inspection, and inspection program revisions. This paper describes reactive inspection efforts by Region III in response to potential technical deficiencies identified in recent air cleaning conference papers, including: post-accident effluent sample line deposition losses; failure to implement good engineering practices in the design, construction, and testing of Nuclear Air Treatment Systems (NATS); filter bypass via filter housing drain lines; spinster carbon degradation; use of silicone sealants and other temporary patching material in NATS; filter housing fire protection deluge system problems; lack of charcoal batch traceability; Quality Assurance records problems involving equipment, vendor, filter, and personnel qualifications; inadequate ANSI/ASME N510 acceptance criteria and tests; and failure to adequately demonstrate control room habitability per 10 CFR 50, Appendix A, General Design Criterion-19. Region III inspections indicate that many of these deficiencies appear to be prevalent. Inspection findings and utility responses to the findings are discussed. NRC Region III and Headquarters programmatic reactions to the identified generic problem areas are also discussed

  14. Profiling of the Tox21 Chemical Collection for Mitochondrial Function to Identify Compounds that Acutely Decrease Mitochondrial Membrane Potential

    Science.gov (United States)

    Attene-Ramos, Matias S.; Huang, Ruili; Michael, Sam; Witt, Kristine L.; Richard, Ann; Tice, Raymond R.; Simeonov, Anton; Austin, Christopher P.

    2014-01-01

    Background: Mitochondrial dysfunction has been implicated in the pathogenesis of a variety of disorders including cancer, diabetes, and neurodegenerative and cardiovascular diseases. Understanding whether different environmental chemicals and druglike molecules impact mitochondrial function represents an initial step in predicting exposure-related toxicity and defining a possible role for such compounds in the onset of various diseases. Objectives: We sought to identify individual chemicals and general structural features associated with changes in mitochondrial membrane potential (MMP). Methods: We used a multiplexed [two end points in one screen; MMP and adenosine triphosphate (ATP) content] quantitative high throughput screening (qHTS) approach combined with informatics tools to screen the Tox21 library of 10,000 compounds (~ 8,300 unique chemicals) at 15 concentrations each in triplicate to identify chemicals and structural features that are associated with changes in MMP in HepG2 cells. Results: Approximately 11% of the compounds (913 unique compounds) decreased MMP after 1 hr of treatment without affecting cell viability (ATP content). In addition, 309 compounds decreased MMP over a concentration range that also produced measurable cytotoxicity [half maximal inhibitory concentration (IC50) in MMP assay/IC50 in viability assay ≤ 3; p Tice RR, Simeonov A, Austin CP, Xia M. 2015. Profiling of the Tox21 chemical collection for mitochondrial function to identify compounds that acutely decrease mitochondrial membrane potential. Environ Health Perspect 123:49–56; http://dx.doi.org/10.1289/ehp.1408642 PMID:25302578

  15. Identifying Potential Conservation Corridors Along the Mongolia-Russia Border Using Resource Selection Functions: A Case Study on Argali Sheep

    Directory of Open Access Journals (Sweden)

    Buyanaa Chimeddorj

    2013-12-01

    Full Text Available The disruption of animal movements is known to affect wildlife populations, particularly large bodied, free-ranging mammals that require large geographic ranges to survive. Corridors commonly connect fragmented wildlife populations and their habitats, yet identifying corridors rarely uses data on habitat selection and movements of target species. New technologies and analytical tools make it possible to better integrate landscape patterns with spatial behavioral data. We show how resource selection functions can describe habitat suitability using continuous and multivariate metrics to determine potential wildlife movement corridors. During 2005–2010, we studied movements of argali sheep ( Ovis ammon near the Mongolia-Russia border using radio-telemetry and modeled their spatial distribution in relation to landscape features to create a spatially explicit habitat suitability surface to identify potential transboundary conservation corridors. Argali sheep habitat selection in western Mongolia positively correlated with elevation, ruggedness index, and distance to border. In other words, argali were tended use areas with higher elevation, rugged topography, and distances farther from the international border. We suggest that these spatial modeling approaches offer ways to design and identify wildlife corridors more objectively and holistically, and can be applied to many other target species.

  16. Environmental isotope and geophysical techniques to identify groundwater potential zones in drought prone areas of Amravati District, Maharashtra, India

    International Nuclear Information System (INIS)

    Jacob, Noble

    2017-01-01

    The groundwater potential of Anjangaon village in Amaravati district of Maharashtra is generally poor and the water quality is saline in most of the places. Farmers dig open wells (up to 30 m depth) and drill bore wells (100-150 m depth) for domestic and irrigation purposes. Most of the wells failed and farmers are struggling for fresh water in this region. To evaluate the groundwater recharge and to identify the groundwater potential zones an environmental isotope and geophysical study was carried out. Water samples were collected from rain, springs, open wells, bore wells and detention tanks and measured for environmental isotopes such as "1"8O, "2H and "3H. Isotope results indicate that the groundwater is getting modern component of recharge from the rain as well as from the detention tanks. The percentage contributions from the detention tanks were estimated to be about 40 to 90 %. In the southern part of the Anjagaon village, an electrical resistivity survey of the geological formation was carried out and a groundwater potential zone was delineated at 45m depth. The farmers were asked to drill bore wells at the identified depth. The drilled five bore wells yielded perennial source of good quality water

  17. Initial perspectives on process threat management

    International Nuclear Information System (INIS)

    Whiteley, James R. Rob; Mannan, M. Sam

    2004-01-01

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this 'inside the gate' response as process threat management. The authors have initiated a joint industry/academia study to address: - the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and; - identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study

  18. The northern naked-tailed armadillo in the Lacandona rainforest, Mexico: new records and potential threats Armadillo de cola desnuda en la selva lacandona, México: nuevos registros y amenazas potenciales

    Directory of Open Access Journals (Sweden)

    Arturo González-Zamora

    2012-06-01

    Full Text Available We review historic occurrences in Mexico of one of the least known Xenarthra of Mesoamerica - the northern naked-tailed armadillo (Cabassous centralis Miller, 1899. We document 6 new records in the Lacandona rainforest, southern Mexico, and through interviews with local people, we assess potential threats for this species in the region. In addition to being locally rare, our results show that hunting and death by road-kill may be major threats to this species in the region.Se revisaron los registros históricos en México de uno de los xenartros menos conocidos de Mesoamérica - el armadillo de cola desnuda (Cabassous centralis Miller, 1899. Se documentan 6 nuevos registros en la selva lacandona, sur de México. A través de entrevistas con pobladores locales, se evaluaron las amenazas potenciales para esta especie en la región. Además de ser localmente rara, nuestros resultados muestran que la cacería y las muertes por atropellamiento pueden ser las principales amenazas para esta especie en la región.

  19. Identifying factors for optimal development of health-related websites: a delphi study among experts and potential future users.

    Science.gov (United States)

    Schneider, Francine; van Osch, Liesbeth; de Vries, Hein

    2012-02-14

    The Internet has become a popular medium for offering tailored and targeted health promotion programs to the general public. However, suboptimal levels of program use in the target population limit the public health impact of these programs. Optimizing program development is considered as one of the main processes to increase usage rates. To distinguish factors potentially related to optimal development of health-related websites by involving both experts and potential users. By considering and incorporating the opinions of experts and potential users in the development process, involvement in the program is expected to increase, consequently resulting in increased appreciation, lower levels of attrition, and higher levels of sustained use. We conducted a systematic three-round Delphi study through the Internet. Both national and international experts (from the fields of health promotion, health psychology, e-communication, and technical Web design) and potential users were invited via email to participate. During this study an extensive list of factors potentially related to optimal development of health-related websites was identified, by focusing on factors related to layout, general and risk information provision, questionnaire use, additional services, and ease of use. Furthermore, we assessed the extent to which experts and potential users agreed on the importance of these factors. Differences as well as similarities among experts and potentials users were deduced. In total, 20 of 62 contacted experts participated in the first round (32% response rate); 60 of 200 contacted experts (30% response rate) and 210 potential users (95% response rate) completed the second-round questionnaire, and 32 of 60 contacted experts completed the third round (53% response rate). Results revealed important factors consented upon by experts and potential users (eg, ease of use, clear structure, and detailed health information provision), as well as differences regarding

  20. Techniques and methodologies to identify potential generated industries of NORM in Angola Republic and evaluate its impacts

    International Nuclear Information System (INIS)

    Diogo, José Manuel Sucumula

    2017-01-01

    Numerous steps have been taken worldwide to identify and quantify the radiological risks associated with the mining of ores containing Naturally Occurrence Radioactive Material (NORM), often resulting in unnecessary exposures to individuals and high environmental damage, with devastating consequences for the health of workers and damage to the economy of many countries due to a lack of regulations or inadequate regulations. For these and other reasons, the objective of this work was to identify industrial potential generating NORM in the Republic of Angola and to estimate its radiological environmental impacts. To achieve this objective, we studied the theoretical aspects, identified the main internationally recognized industrial companies that as generate by NORM. The Brazilian experience in the regulatory aspect was observed in the evaluation criteria to classify industries that generate NORM, the methods of mining and its radiological environmental impacts, as well as the main techniques applied to evaluate the concentrations of radionuclides in a specific environmental matrix and/or a NORM sample. The study approach allowed the elaboration of a NORM map for the main provinces of Angola, establishing the evaluation criteria for implementing the Radiation Protection Plan in the extractive industry, establishing measures to control ionizing radiation in mining, identifying and quantifying radionuclides present in samples of lees oil. However, in order to assess adequately the radiological environmental impact of the NORM industry, it is not enough to identify them, it is important to know the origin, quantify the radioactive material released as liquid and gaseous effluents, identify the main routes of exposure and examine how this material spreads into the environment until it reaches man. (author)

  1. Target based screening of small molecule library identifies pregnelonene, a Nrf2 agonist, as a potential radioprotector in zebrafish

    International Nuclear Information System (INIS)

    Joshi, Jayadev; Ghosh, Subhajit; Dimri, Manali; Shrivastava, Nitisha; Indracanti, Prem Kumar; Ray, Jharna

    2014-01-01

    Reactive oxygen species, cellular oxidative stress, tissue inflammation and cell death are the downstream consequences of radiation exposures which ultimately could lead to organism death. Present study aims at identifying potential targets and screening of small molecule compound library for identifying novel and effective radioprotectors. In-silco analysis of known radioprotectors revealed three main function, antioxidant, anti-inflammation and antiapoptosis. In this study, a collection of small molecules (John Hopkins Clinical Compound Library, JHCCL) were screened for these different functions using the biological activity database of NCBI with the help of in-house developed python script. Further, filtering of the JHCCL was done by searching for molecules which are known to be active against target of radiobiological significance, Nrf-2. Close observation of potential hits identified, pregnenolone, as an Nrf-2 agonist which was further evaluated for radioprotection in zebrafish model. Pregnenolone rendered significant protection (at 40 μM; added 1 hour prior to 20 Gy gamma radiation) in terms of damage manifestations (pericardial edema, microcephaly, micropthalmia, yolk sac resorption, curvature of spine, blood flow, body length, heart-beat, blood clot, roughness of skin) and survival advantage (60%) when compared to irradiated control. Further, the ability of pregnenolone to act as a neuroprotectant was also carried out using in-house developed software for assessing neuromotor functions. In comparison to radiation alone group, pregnenolone was found to possess significant neuroactive functions and diminished radiation induced neuronal impairment. Over all these results suggests that pregnenolone is an effective radioprotector which warrants further investigation for validation of its radioprotective action in higher vertebrates. Apart from that the utility of approach to screen out bioactivity data base of various chemical compound libraries for possible

  2. Geospatiotemporal data mining in an early warning system for forest threats in the United States

    Science.gov (United States)

    F.M. Hoffman; R.T. Mills; J. Kumar; S.S. Vulli; W.W. Hargrove

    2010-01-01

    We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250 m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster...

  3. Decision tool for clients with medical issues: a framework for identifying driving risk and potential to return to driving.

    Science.gov (United States)

    Dickerson, Anne E; Bédard, Michel

    2014-04-01

    This paper offers occupational therapy generalists and specialists a new framework by which to consider clinical evaluation data and an older adult's driving risk and potential to resume this previously learned skill. Based on Michon's model describing the hierarchy of driving levels, clinical questions identify the factors that may affect a client's fitness to drive. The first part is intended to support clinical judgment of whether a client needs a driving evaluation by a driver rehabilitation specialist. The second part offers a framework to organize clinical data that are already known and determine what other evaluation information is justified and necessary to make a driving recommendation. Methods and rational for use are discussed.

  4. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  5. Eco-Efficient Process Improvement at the Early Development Stage: Identifying Environmental and Economic Process Hotspots for Synergetic Improvement Potential.

    Science.gov (United States)

    Piccinno, Fabiano; Hischier, Roland; Seeger, Stefan; Som, Claudia

    2018-05-15

    We present here a new eco-efficiency process-improvement method to highlight combined environmental and costs hotspots of the production process of new material at a very early development stage. Production-specific and scaled-up results for life cycle assessment (LCA) and production costs are combined in a new analysis to identify synergetic improvement potentials and trade-offs, setting goals for the eco-design of new processes. The identified hotspots and bottlenecks will help users to focus on the relevant steps for improvements from an eco-efficiency perspective and potentially reduce their associated environmental impacts and production costs. Our method is illustrated with a case study of nanocellulose. The results indicate that the production route should start with carrot pomace, use heat and solvent recovery, and deactivate the enzymes with bleach instead of heat. To further improve the process, the results show that focus should be laid on the carrier polymer, sodium alginate, and the production of the GripX coating. Overall, the method shows that the underlying LCA scale-up framework is valuable for purposes beyond conventional LCA studies and is applicable at a very early stage to provide researchers with a better understanding of their production process.

  6. Review on Invasive Tree of Heaven (Ailanthus altissima (Mill.) Swingle) Conflicting Values: Assessment of Its Ecosystem Services and Potential Biological Threat.

    Science.gov (United States)

    Sladonja, Barbara; Sušek, Marta; Guillermic, Julia

    2015-10-01

    Globally, invasions by alien plants are rapidly increasing in extent and severity, leading to large-scale ecosystem degradation. One of the most widespread invasive alien plant species in Europe and North America, Tree of Heaven (Ailanthus altissima (Mill.) Swingle) was introduced intentionally for use as an ornamental plant in the 18th century. Since then, it has spread and is now frequently found in a number of countries. Today, Tree of Heaven is considered one of the worst invasive plant species in Europe and is also listed as invasive in North America and many other countries. Millennium Ecosystem Assessment is one of many systems trying to list and categorize biological services to humans and to provide a tool for identifying services delivered by natural ecosystems. Invasive species have generally caused degradation of the services, have a major impact on the environment, and are threatening biodiversity and reducing overall species abundance and diversity. On the other hand, some invasive species can provide services useful to human well-being. In the present review A. altissima impacts on ecosystems are identified and positive influences on some ecosystem services are weighed against the negative effects on the environment and human health. The aim of the present review is to resume the general knowledge of A. altissima, group available references on distribution and ecology according to countries, compare ecosystem services provided or enhanced by A. altissima presence and the negative effects it causes, identify gaps in current knowledge, and give recommendations for future lines of research.

  7. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  8. Transcriptome analysis of the Cryptocaryon irritans tomont stage identifies potential genes for the detection and control of cryptocaryonosis

    Directory of Open Access Journals (Sweden)

    Wan Kiew-Lian

    2010-01-01

    Full Text Available Abstract Background Cryptocaryon irritans is a parasitic ciliate that causes cryptocaryonosis (white spot disease in marine fish. Diagnosis of cryptocaryonosis often depends on the appearance of white spots on the surface of the fish, which are usually visible only during later stages of the disease. Identifying suitable biomarkers of this parasite would aid the development of diagnostic tools and control strategies for C. irritans. The C. irritans genome is virtually unexplored; therefore, we generated and analyzed expressed sequence tags (ESTs of the parasite to identify genes that encode for surface proteins, excretory/secretory proteins and repeat-containing proteins. Results ESTs were generated from a cDNA library of C. irritans tomonts isolated from infected Asian sea bass, Lates calcarifer. Clustering of the 5356 ESTs produced 2659 unique transcripts (UTs containing 1989 singletons and 670 consensi. BLAST analysis showed that 74% of the UTs had significant similarity (E-value -5 to sequences that are currently available in the GenBank database, with more than 15% of the significant hits showing unknown function. Forty percent of the UTs had significant similarity to ciliates from the genera Tetrahymena and Paramecium. Comparative gene family analysis with related taxa showed that many protein families are conserved among the protozoans. Based on gene ontology annotation, functional groups were successfully assigned to 790 UTs. Genes encoding excretory/secretory proteins and membrane and membrane-associated proteins were identified because these proteins often function as antigens and are good antibody targets. A total of 481 UTs were classified as encoding membrane proteins, 54 were classified as encoding for membrane-bound proteins, and 155 were found to contain excretory/secretory protein-coding sequences. Amino acid repeat-containing proteins and GPI-anchored proteins were also identified as potential candidates for the development of

  9. Human Plasma Metabolomics Study across All Stages of Age-Related Macular Degeneration Identifies Potential Lipid Biomarkers.

    Science.gov (United States)

    Laíns, Inês; Kelly, Rachel S; Miller, John B; Silva, Rufino; Vavvas, Demetrios G; Kim, Ivana K; Murta, Joaquim N; Lasky-Su, Jessica; Miller, Joan W; Husain, Deeba

    2018-02-01

    To characterize the plasma metabolomic profile of patients with age-related macular degeneration (AMD) using mass spectrometry (MS). Cross-sectional observational study. We prospectively recruited participants with a diagnosis of AMD and a control group (>50 years of age) without any vitreoretinal disease. All participants underwent color fundus photography, used for AMD diagnosis and staging, according to the Age-Related Eye Disease Study classification scheme. Fasting blood samples were collected and plasma was analyzed by Metabolon, Inc. (Durham, NC), using ultrahigh-performance liquid chromatography (UPLC) and high-resolution MS. Metabolon's hardware and software were used to identify peaks and control quality. Principal component analysis and multivariate regression were performed to assess differences in the metabolomic profiles of AMD patients versus controls, while controlling for potential confounders. For biological interpretation, pathway enrichment analysis of significant metabolites was performed using MetaboAnalyst. The primary outcome measures were levels of plasma metabolites in participants with AMD compared with controls and among different AMD severity stages. We included 90 participants with AMD (30 with early AMD, 30 with intermediate AMD, and 30 with late AMD) and 30 controls. Using UPLC and MS, 878 biochemicals were identified. Multivariate logistic regression identified 87 metabolites with levels that differed significantly between AMD patients and controls. Most of these metabolites (82.8%; n = 72), including the most significant metabolites, belonged to the lipid pathways. Analysis of variance revealed that of the 87 metabolites, 48 (55.2%) also were significantly different across the different stages of AMD. A significant enrichment of the glycerophospholipids pathway was identified (P = 4.7 × 10 -9 ) among these metabolites. Participants with AMD have altered plasma metabolomic profiles compared with controls. Our data suggest

  10. Identifying Potential Areas of Human Zika Infection in the City of Los Angeles, California by Use of Remote Sensing Imagery

    Science.gov (United States)

    Lee, J.

    2017-12-01

    As of April 2017, California is the third most prevalent state on the United States for Zika Infection and Southern California has an ever growing population of Aedes mosquitos. Zika is a disease which poses a significant risk to humans and other mammals due to its effects on pregnancy. This emerging disease is highly contagious due to its spread of infection primarily by Aedes aegypti mosquitos. Aedes mosquitos are able to breed in small rain collecting containers which allow the species to persevere in urban and semi urban environments. We hope to identify potential areas with risk of human infection within Los Angeles and its surrounding areas. This study integrates remote sensing, GIS, statistical, and environmental techniques to study favorable habitats for this particular species of mosquitos and their larvae. The study of the geographic and landscape factors which promote the larvae development allow for the disease spread to be analyzed and modeled. There are several goals in the development of this study. These include the coordination of statistical data with local epidemiology departments, identify workflows to improve efficiency, create models which can be utilized for disease prevention, and identify geographic risk factors for the spread of Zika.

  11. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  12. Clinical proteomics identifies urinary CD14 as a potential biomarker for diagnosis of stable coronary artery disease.

    Directory of Open Access Journals (Sweden)

    Min-Yi Lee

    Full Text Available Inflammation plays a key role in coronary artery disease (CAD and other manifestations of atherosclerosis. Recently, urinary proteins were found to be useful markers for reflecting inflammation status of different organs. To identify potential biomarker for diagnosis of CAD, we performed one-dimensional SDS-gel electrophoresis followed by liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS. Among the proteins differentially expressed in urine samples, monocyte antigen CD14 was found to be consistently expressed in higher amounts in the CAD patients as compared to normal controls. Using enzyme-linked immunosorbent assays to analyze the concentrations of CD14 in urine and serum, we confirmed that urinary CD14 levels were significantly higher in patients (n = 73 with multi-vessel and single vessel CAD than in normal control (n = 35 (P < 0.001. Logistic regression analysis further showed that urinary CD14 concentration level is associated with severity or number of diseased vessels and SYNTAX score after adjustment for potential confounders. Concomitantly, the proportion of CD14+ monocytes was significantly increased in CAD patients (59.7 ± 3.6% as compared with healthy controls (14.9 ± 2.1% (P < 0.001, implicating that a high level of urinary CD14 may be potentially involved in mechanism(s leading to CAD pathogenesis. By performing shotgun proteomics, we further revealed that CD14-associated inflammatory response networks may play an essential role in CAD. In conclusion, the current study has demonstrated that release of CD14 in urine coupled with more CD14+ monocytes in CAD patients is significantly correlated with severity of CAD, pointing to the potential application of urinary CD14 as a novel noninvasive biomarker for large-scale diagnostic screening of susceptible CAD patients.

  13. A GIS-based approach for identifying potential runoff harvesting sites in the Thukela River basin, South Africa

    Science.gov (United States)

    de Winnaar, G.; Jewitt, G. P. W.; Horan, M.

    Water scarce countries such as South Africa are subject to various hydrological constraints which can often be attributed to poor rainfall partitioning, particularly within resource poor farming communities that are reliant on rainfed agriculture. Recent initiatives to address this have shifted focus to explore more efficient alternatives to water supply and the recognition of numerous opportunities to implement runoff harvesting as a means to supplement water availability. However, increasing the implementation of runoff harvesting, without encountering unintended impacts on downstream hydrological and ecological systems, requires better understanding of the hydrologic and environmental impacts at catchment scale. In this paper the representation of spatial variations in landscape characteristics such as soil, land use, rainfall and slope information is shown to be an important step in identifying potential runoff harvesting sites, after which modelling the hydrological response in catchments where extensive runoff harvesting is being considered can be performed and likely impacts assessed. Geographic information systems (GIS) was utilised as an integrating tool to store, analyse and manage spatial information and when linked to hydrological response models, provided a rational means to facilitate decision making by providing catchment level identification, planning and assessment of runoff harvesting sites as illustrated by a case study at the Potshini catchment, a small sub-catchment in the Thukela River basin, South Africa. Through the linked GIS, potential runoff harvesting sites are identified relative to areas that concentrate runoff and where the stored water will be appropriately distributed. Based on GIS analysis it was found that 17% percent of the Potshini catchment area has a high potential for generating surface runoff, whereas an analysis of all factors which influence the location of such systems, shows that 18% is highly suitable for runoff

  14. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    OpenAIRE

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01

    This chapter explores stereotype threat in organizational contexts. Building on the understanding that stereotype threat involves concerns about confirming a negative stereotype about one’s group, we begin by elucidating the scope of potential stereotype threat effects in organizations. We first examine the ubiquity of evaluations in organizations, which are at the heart of stereotype threat. Next we specify the potential psychological consequences of stereotype threat on targeted individua...

  15. Energy Efficiency of Technological Equipment at the Economic Agent by Identifying the Points with Recoverable Heat Potential

    Directory of Open Access Journals (Sweden)

    Arina Negoiţescu

    2017-11-01

    Full Text Available For an energy-efficient future, the EU needs to step up its efforts to maximize energy savings. In this context, the paper addresses the steps needed to establish energy efficiency measures and proposes effective measures to reduce consumption by recovering large amounts of energy lost to industrial consumers. The points with the highest recoverable energy potential have been identified and it is proposed to install the heat recovery systems on the flue gas exhaust circuits and polluted air from Industrial Technological Equipment (ITE such as dyeing/drying cabins (DDC. Therefore, whenever possible and as small as energy saving, energy recovery solutions at any level, but especially at local level, need to be applied. In conclusion, by concentrating all the energy-saving efforts that are still being wasted, Europe can contribute, by saving energy, to ensuring a sustainable energy future

  16. TH-B-BRC-00: How to Identify and Resolve Potential Clinical Errors Before They Impact Patients Treatment: Lessons Learned

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2016-06-15

    Radiation treatment consists of a chain of events influenced by the quality of machine operation, beam data commissioning, machine calibration, patient specific data, simulation, treatment planning, imaging and treatment delivery. There is always a chance that the clinical medical physicist may make or fail to detect an error in one of the events that may impact on the patient’s treatment. In the clinical scenario, errors may be systematic and, without peer review, may have a low detectability because they are not part of routine QA procedures. During treatment, there might be errors on machine that needs attention. External reviews of some of the treatment delivery components by independent reviewers, like IROC, can detect errors, but may not be timely. The goal of this session is to help junior clinical physicists identify potential errors as well as the approach of quality assurance to perform a root cause analysis to find and eliminate an error and to continually monitor for errors. A compilation of potential errors will be presented by examples of the thought process required to spot the error and determine the root cause. Examples may include unusual machine operation, erratic electrometer reading, consistent lower electron output, variation in photon output, body parts inadvertently left in beam, unusual treatment plan, poor normalization, hot spots etc. Awareness of the possibility and detection of error in any link of the treatment process chain will help improve the safe and accurate delivery of radiation to patients. Four experts will discuss how to identify errors in four areas of clinical treatment. D. Followill, NIH grant CA 180803.

  17. TH-B-BRC-00: How to Identify and Resolve Potential Clinical Errors Before They Impact Patients Treatment: Lessons Learned

    International Nuclear Information System (INIS)

    2016-01-01

    Radiation treatment consists of a chain of events influenced by the quality of machine operation, beam data commissioning, machine calibration, patient specific data, simulation, treatment planning, imaging and treatment delivery. There is always a chance that the clinical medical physicist may make or fail to detect an error in one of the events that may impact on the patient’s treatment. In the clinical scenario, errors may be systematic and, without peer review, may have a low detectability because they are not part of routine QA procedures. During treatment, there might be errors on machine that needs attention. External reviews of some of the treatment delivery components by independent reviewers, like IROC, can detect errors, but may not be timely. The goal of this session is to help junior clinical physicists identify potential errors as well as the approach of quality assurance to perform a root cause analysis to find and eliminate an error and to continually monitor for errors. A compilation of potential errors will be presented by examples of the thought process required to spot the error and determine the root cause. Examples may include unusual machine operation, erratic electrometer reading, consistent lower electron output, variation in photon output, body parts inadvertently left in beam, unusual treatment plan, poor normalization, hot spots etc. Awareness of the possibility and detection of error in any link of the treatment process chain will help improve the safe and accurate delivery of radiation to patients. Four experts will discuss how to identify errors in four areas of clinical treatment. D. Followill, NIH grant CA 180803

  18. General Approach to Identifying Potential Targets for Cancer Imaging by Integrated Bioinformatics Analysis of Publicly Available Genomic Profiles

    Directory of Open Access Journals (Sweden)

    Yongliang Yang

    2011-03-01

    Full Text Available Molecular imaging has moved to the forefront of drug development and biomedical research. The identification of appropriate imaging targets has become the touchstone for the accurate diagnosis and prognosis of human cancer. Particularly, cell surface- or membrane-bound proteins are attractive imaging targets for their aberrant expression, easily accessible location, and unique biochemical functions in tumor cells. Previously, we published a literature mining of potential targets for our in-house enzyme-mediated cancer imaging and therapy technology. Here we present a simple and integrated bioinformatics analysis approach that assembles a public cancer microarray database with a pathway knowledge base for ascertaining and prioritizing upregulated genes encoding cell surface- or membrane-bound proteins, which could serve imaging targets. As examples, we obtained lists of potential hits for six common and lethal human tumors in the prostate, breast, lung, colon, ovary, and pancreas. As control tests, a number of well-known cancer imaging targets were detected and confirmed by our study. Further, by consulting gene-disease and protein-disease databases, we suggest a number of significantly upregulated genes as promising imaging targets, including cell surface-associated mucin-1, prostate-specific membrane antigen, hepsin, urokinase plasminogen activator receptor, and folate receptors. By integrating pathway analysis, we are able to organize and map “focused” interaction networks derived from significantly dysregulated entity pairs to reflect important cellular functions in disease processes. We provide herein an example of identifying a tumor cell growth and proliferation subnetwork for prostate cancer. This systematic mining approach can be broadly applied to identify imaging or therapeutic targets for other human diseases.

  19. Planting sentinel European trees in eastern Asia as a novel method to identify potential insect pest invaders.

    Science.gov (United States)

    Roques, Alain; Fan, Jian-Ting; Courtial, Béatrice; Zhang, Yan-Zhuo; Yart, Annie; Auger-Rozenberg, Marie-Anne; Denux, Olivier; Kenis, Marc; Baker, Richard; Sun, Jiang-Hua

    2015-01-01

    Quarantine measures to prevent insect invasions tend to focus on well-known pests but a large proportion of the recent invaders were not known to cause significant damage in their native range, or were not even known to science before their introduction. A novel method is proposed to detect new potential pests of woody plants in their region of origin before they are introduced to a new continent. Since Asia is currently considered to be the main supplier of insect invaders to Europe, sentinel trees were planted in China during 2007-2011 as an early warning tool to identify the potential for additional Asian insect species to colonize European trees. Seedlings (1-1.5 m tall) of five broadleaved (Quercus petraea, Q. suber, Q. ilex, Fagus sylvatica, and Carpinus betulus) and two conifer species (Abies alba and Cupressus sempervirens) were planted in blocks of 100 seedlings at two widely separated sites (one in a nursery near Beijing and the other in a forest environment near Fuyang in eastern China), and then regularly surveyed for colonization by insects. A total of 104 insect species, mostly defoliators, were observed on these new hosts, and at least six species were capable of larval development. Although a number of the insects observed were probably incidental feeders, 38 species had more than five colonization events, mostly infesting Q. petraea, and could be considered as being capable of switching to European trees if introduced to Europe. Three years was shown to be an appropriate duration for the experiment, since the rate of colonization then tended to plateau. A majority of the identified species appeared to have switched from agricultural crops and fruit trees rather than from forest trees. Although these results are promising, the method is not appropriate for xylophagous pests and other groups developing on larger trees. Apart from the logistical problems, the identification to species level of the specimens collected was a major difficulty. This

  20. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment.

  1. A New Framework to Minimize Insider Threats in Nuclear Power Operations

    International Nuclear Information System (INIS)

    Suh, Young A; Yim, Man-Sung

    2016-01-01

    In a 2008 report, IAEA presented preventive and protective measures against such threat. These are summarized as : (1) Exclude potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, prior to allowing them access; (2) Exclude further potential insiders by identifying undesirable behavior or characteristics, which may indicate motivation, after they have access; (3) Minimize opportunities for malicious acts by limiting access, authority and knowledge, and by other measures; (4) Detect, delay and respond to malicious acts. The nuclear security risk, i.e. insider threat, has concerned continuously because the existing physical protection system is only for outsider threats. In addition, with high possibility of use of multicultural workforce in newcomers' NPPs, the detection and prediction of insider threat is a hot potato. Thus, this paper suggested a new framework for predicting and detecting the insider threat. This framework integrates the behavioral indicators, stimulus monitoring and cognitive monitoring. This framework open a chance to detect and predict the insider before commits a crime accurately. This model can be direct application to reduce the security risks in multicultural environment

  2. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  3. Identifying cognitive preferences for attractive female faces: an event-related potential experiment using a study-test paradigm.

    Science.gov (United States)

    Zhang, Yan; Kong, Fanchang; Chen, Hong; Jackson, Todd; Han, Li; Meng, Jing; Yang, Zhou; Gao, Jianguo; Najam ul Hasan, Abbasi

    2011-11-01

    In this experiment, sensitivity to female facial attractiveness was examined by comparing event-related potentials (ERPs) in response to attractive and unattractive female faces within a study-test paradigm. Fourteen heterosexual participants (age range 18-24 years, mean age 21.67 years) were required to judge 84 attractive and 84 unattractive face images as either "attractive" or "unattractive." They were then asked whether they had previously viewed each face in a recognition task in which 50% of the images were novel. Analyses indicated that attractive faces elicited more enhanced ERP amplitudes than did unattractive faces in judgment (N300 and P350-550 msec) and recognition (P160 and N250-400 msec and P400-700 msec) tasks on anterior locations. Moreover, longer reaction times and higher accuracy rate were observed in identifying attractive faces than unattractive faces. In sum, this research identified neural and behavioral bases related to cognitive preferences for judging and recognizing attractive female faces. Explanations for the results are that attractive female faces arouse more intense positive emotions in participants than do unattractive faces, and they also represent reproductive fitness and mating value from the evolutionary perspective. Copyright © 2011 Wiley-Liss, Inc.

  4. Cross-comparison of the genome sequences from human, chimpanzee, Neanderthal and a Denisovan hominin identifies novel potentially compensated mutations

    Directory of Open Access Journals (Sweden)

    Zhang Guojie

    2011-07-01

    Full Text Available Abstract The recent publication of the draft genome sequences of the Neanderthal and a ~50,000-year-old archaic hominin from Denisova Cave in southern Siberia has ushered in a new age in molecular archaeology. We previously cross-compared the human, chimpanzee and Neanderthal genome sequences with respect to a set of disease-causing/disease-associated missense and regulatory mutations (Human Gene Mutation Database and succeeded in identifying genetic variants which, although apparently pathogenic in humans, may represent a 'compensated' wild-type state in at least one of the other two species. Here, in an attempt to identify further 'potentially compensated mutations' (PCMs of interest, we have compared our dataset of disease-causing/disease-associated mutations with their corresponding nucleotide positions in the Denisovan hominin, Neanderthal and chimpanzee genomes. Of the 15 human putatively disease-causing mutations that were found to be compensated in chimpanzee, Denisovan or Neanderthal, only a solitary F5 variant (Val1736Met was specific to the Denisovan. In humans, this missense mutation is associated with activated protein C resistance and an increased risk of thromboembolism and recurrent miscarriage. It is unclear at this juncture whether this variant was indeed a PCM in the Denisovan or whether it could instead have been associated with disease in this ancient hominin.

  5. In silico repositioning-chemogenomics strategy identifies new drugs with potential activity against multiple life stages of Schistosoma mansoni.

    Directory of Open Access Journals (Sweden)

    Bruno J Neves

    2015-01-01

    Full Text Available Morbidity and mortality caused by schistosomiasis are serious public health problems in developing countries. Because praziquantel is the only drug in therapeutic use, the risk of drug resistance is a concern. In the search for new schistosomicidal drugs, we performed a target-based chemogenomics screen of a dataset of 2,114 proteins to identify drugs that are approved for clinical use in humans that may be active against multiple life stages of Schistosoma mansoni. Each of these proteins was treated as a potential drug target, and its amino acid sequence was used to interrogate three databases: Therapeutic Target Database (TTD, DrugBank and STITCH. Predicted drug-target interactions were refined using a combination of approaches, including pairwise alignment, conservation state of functional regions and chemical space analysis. To validate our strategy, several drugs previously shown to be active against Schistosoma species were correctly predicted, such as clonazepam, auranofin, nifedipine, and artesunate. We were also able to identify 115 drugs that have not yet been experimentally tested against schistosomes and that require further assessment. Some examples are aprindine, gentamicin, clotrimazole, tetrabenazine, griseofulvin, and cinnarizine. In conclusion, we have developed a systematic and focused computer-aided approach to propose approved drugs that may warrant testing and/or serve as lead compounds for the design of new drugs against schistosomes.

  6. Can empathy, other personality attributes, and level of positive social influence in medical school identify potential leaders in medicine?

    Science.gov (United States)

    Hojat, Mohammadreza; Michalec, Barret; Veloski, J Jon; Tykocinski, Mark L

    2015-04-01

    To test the hypotheses that medical students recognized by peers as the most positive social influencers would score (1) high on measures of engaging personality attributes that are conducive to relationship building (empathy, sociability, activity, self-esteem), and (2) low on disengaging personality attributes that are detrimental to interpersonal relationships (loneliness, neuroticism, aggression-hostility, impulsive sensation seeking). The study included 666 Jefferson Medical College students who graduated in 2011-2013. Students used a peer nomination instrument to identify classmates who had a positive influence on their professional and personal development. At matriculation, these students had completed a survey that included the Jefferson Scale of Empathy and Zuckerman-Kuhlman Personality Questionnaire short form and abridged versions of the Rosenberg Self-Esteem Scale and UCLA Loneliness Scale. In multivariate analyses of variance, the method of contrasted groups was used to compare the personality attributes of students nominated most frequently by their peers as positive influencers (top influencers [top 25% in their class distribution], n = 176) with those of students nominated least frequently (bottom influencers [bottom 25%], n = 171). The top influencers scored significantly higher on empathy, sociability, and activity and significantly lower on loneliness compared with the bottom influencers. However, the effect size estimates of the differences were moderate at best. The research hypotheses were partially confirmed. Positive social influencers appear to possess personality attributes conducive to relationship building, which is an important feature of effective leadership. The findings have implications for identifying and training potential leaders in medicine.

  7. Current studies on bacterospermia the leading cause of male infertility: a protégé and potential threat towards mans extinction

    Science.gov (United States)

    Isaiah, Ibeh Nnana; Nche, Bikwe Thomas; Nwagu, Ibeh Georgina; Nnanna, Ibeh Isaiah

    2011-01-01

    Background: The current rise of male infertility associated with bacterospermia and urogenital infection has been on the increase amongst adult married males in Benin metropolis and a major cause of concern to male fertility and reproduction in Nigeria. Aim: To microbiologically isolate and study the infectious agent that has led to male infertility and also to study the percentage occurrence of bacteropsermia and urogenital caused infertility in adult married males in Benin metropolis Material and Method: using standard microbiological methods of isolating and identifying the organism, specimen was collected and processed which includes the susceptibility profile of isolates and sperm quality. In this study a total of 140 sperm samples was collected from patient who were referred from the consultant outpatient department of the University of Benin Teaching Hospital and then evaluated bacteriologically using standard bacterial cultural methods Results: Among the total cases, 92 (65.7%) showed at least one pathogen. Staphylococcus aureus (28.3%), Staphylococcus Saprophyticus (13.0%), Pseudomonas aerouginosa (6.5%), Escherichia Coli (19.6%) Proteus mirabilis (10.8%) Klebsiella spp (10.8%) and Proteus vulgaris (10.8%). Conclusion: There was an outstanding significant relationship between bacteriospermia and the rate of total motility and morphologically abnormal sperms, The percentage of morphologically normal sperm was lower in this study. Staphylococcus aureus Staphylococcus saprohyticus and Escherichia coli were the most common pathogen having negative effects on sperm motility and morphology in this study. PMID:22363079

  8. Current studies on bacterospermia the leading cause of male infertility: a protégé and potential threat towards mans extinction.

    Science.gov (United States)

    Isaiah, Ibeh Nnana; Nche, Bikwe Thomas; Nwagu, Ibeh Georgina; Nnanna, Ibeh Isaiah

    2011-12-01

    The current rise of male infertility associated with bacterospermia and urogenital infection has been on the increase amongst adult married males in Benin metropolis and a major cause of concern to male fertility and reproduction in Nigeria. To microbiologically isolate and study the infectious agent that has led to male infertility and also to study the percentage occurrence of bacteropsermia and urogenital caused infertility in adult married males in Benin metropolis using standard microbiological methods of isolating and identifying the organism, specimen was collected and processed which includes the susceptibility profile of isolates and sperm quality. In this study a total of 140 sperm samples was collected from patient who were referred from the consultant outpatient department of the University of Benin Teaching Hospital and then evaluated bacteriologically using standard bacterial cultural methods Among the total cases, 92 (65.7%) showed at least one pathogen. Staphylococcus aureus (28.3%), Staphylococcus Saprophyticus (13.0%), Pseudomonas aerouginosa (6.5%), Escherichia Coli (19.6%) Proteus mirabilis (10.8%) Klebsiella spp (10.8%) and Proteus vulgaris (10.8%). There was an outstanding significant relationship between bacteriospermia and the rate of total motility and morphologically abnormal sperms, The percentage of morphologically normal sperm was lower in this study. Staphylococcus aureus Staphylococcus saprohyticus and Escherichia coli were the most common pathogen having negative effects on sperm motility and morphology in this study.

  9. Identifying potential effects of climate change on the development of water resources in Pinios River Basin, Central Greece

    Science.gov (United States)

    Arampatzis, G.; Panagopoulos, A.; Pisinaras, V.; Tziritis, E.; Wendland, F.

    2018-05-01

    The aim of the present study is to assess the future spatial and temporal distribution of precipitation and temperature, and relate the corresponding change to water resources' quantitative status in Pinios River Basin (PRB), Thessaly, Greece. For this purpose, data from four Regional Climate Models (RCMs) for the periods 2021-2100 driven by several General Circulation Models (GCMs) were collected and bias-correction was performed based on linear scaling method. The bias-correction was made based on monthly precipitation and temperature data collected for the period 1981-2000 from 57 meteorological stations in total. The results indicate a general trend according to which precipitation is decreasing whilst temperature is increasing to an extent that varies depending on each particular RCM-GCM output. On the average, annual precipitation change for the period 2021-2100 was about - 80 mm, ranging between - 149 and + 35 mm, while the corresponding change for temperature was 2.81 °C, ranging between 1.48 and 3.72 °C. The investigation of potential impacts to the water resources demonstrates that water availability is expected to be significantly decreased in the already water-stressed PRB. The water stresses identified are related to the potential decreasing trend in groundwater recharge and the increasing trend in irrigation demand, which constitutes the major water consumer in PRB.

  10. Queen Quality and the Impact of Honey Bee Diseases on Queen Health: Potential for Interactions between Two Major Threats to Colony Health

    Directory of Open Access Journals (Sweden)

    Esmaeil Amiri

    2017-05-01

    Full Text Available Western honey bees, Apis mellifera, live in highly eusocial colonies that are each typically headed by a single queen. The queen is the sole reproductive female in a healthy colony, and because long-term colony survival depends on her ability to produce a large number of offspring, queen health is essential for colony success. Honey bees have recently been experiencing considerable declines in colony health. Among a number of biotic and abiotic factors known to impact colony health, disease and queen failure are repeatedly reported as important factors underlying colony losses. Surprisingly, there are relatively few studies on the relationship and interaction between honey bee diseases and queen quality. It is critical to understand the negative impacts of pests and pathogens on queen health, how queen problems might enable disease, and how both factors influence colony health. Here, we review the current literature on queen reproductive potential and the impacts of honey bee parasites and pathogens on queens. We conclude by highlighting gaps in our knowledge on the combination of disease and queen failure to provide a perspective and prioritize further research to mitigate disease, improve queen quality, and ensure colony health.

  11. Landfills in Jiangsu province, China, and potential threats for public health: Leachate appraisal and spatial analysis using geographic information system and remote sensing

    International Nuclear Information System (INIS)

    Yang Kun; Zhou Xiaonong; Yan Weian; Hang Derong; Steinmann, Peter

    2008-01-01

    Waste disposal is of growing environmental and public health concern in China where landfilling is the predominant method of disposal. The assessment of potential health hazards posed by existing landfills requires sound information, and processing of a significant amount of spatial data. Geographical information system (GIS) and remote sensing (RS) are valuable tools for assessing health impacts due to landfills. The aims of this study were: (i) to analyze the leachate and gas emissions from landfills used for domestic waste disposal in a metropolitan area of Jiangsu province, China, (ii) to investigate remotely-sensed environmental features in close proximity to landfills, and (iii) to evaluate the compliance of their location and leachate quality with the relevant national regulations. We randomly selected five landfills in the metropolitan areas of Wuxi and Suzhou city, Jiangsu province, established a GIS database and examined whether data were in compliance with national environmental and public health regulations. The leachates of the sampled landfills contained heavy metals (Pb, As, Cr 6+ and Hg) and organic compounds in concentrations considered harmful to human health. Measured methane concentrations on landfill surfaces were low. Spatial analysis of the location of landfills with regard to distance from major water bodies, sensible infrastructure and environmental conditions according to current national legislation resulted in the rejection of four of the five sites as inappropriate for landfills. Our results call for rigorous evaluation of the spatial location of landfills in China that must take into consideration environmental and public health criteria

  12. Gene expression profiling of prostate tissue identifies chromatin regulation as a potential link between obesity and lethal prostate cancer.

    Science.gov (United States)

    Ebot, Ericka M; Gerke, Travis; Labbé, David P; Sinnott, Jennifer A; Zadra, Giorgia; Rider, Jennifer R; Tyekucheva, Svitlana; Wilson, Kathryn M; Kelly, Rachel S; Shui, Irene M; Loda, Massimo; Kantoff, Philip W; Finn, Stephen; Vander Heiden, Matthew G; Brown, Myles; Giovannucci, Edward L; Mucci, Lorelei A

    2017-11-01

    Obese men are at higher risk of advanced prostate cancer and cancer-specific mortality; however, the biology underlying this association remains unclear. This study examined gene expression profiles of prostate tissue to identify biological processes differentially expressed by obesity status and lethal prostate cancer. Gene expression profiling was performed on tumor (n = 402) and adjacent normal (n = 200) prostate tissue from participants in 2 prospective cohorts who had been diagnosed with prostate cancer from 1982 to 2005. Body mass index (BMI) was calculated from the questionnaire immediately preceding cancer diagnosis. Men were followed for metastases or prostate cancer-specific death (lethal disease) through 2011. Gene Ontology biological processes differentially expressed by BMI were identified using gene set enrichment analysis. Pathway scores were computed by averaging the signal intensities of member genes. Odds ratios (ORs) for lethal prostate cancer were estimated with logistic regression. Among 402 men, 48% were healthy weight, 31% were overweight, and 21% were very overweight/obese. Fifteen gene sets were enriched in tumor tissue, but not normal tissue, of very overweight/obese men versus healthy-weight men; 5 of these were related to chromatin modification and remodeling (false-discovery rate 7, 41% vs 17%; P = 2 × 10 -4 ) and an increased risk of lethal disease that was independent of grade and stage (OR, 5.26; 95% confidence interval, 2.37-12.25). This study improves our understanding of the biology of aggressive prostate cancer and identifies a potential mechanistic link between obesity and prostate cancer death that warrants further study. Cancer 2017;123:4130-4138. © 2017 American Cancer Society. © 2017 American Cancer Society.

  13. Experimental antibiotic treatment identifies potential pathogens of white band disease in the endangered Caribbean coral Acropora cervicornis.

    Science.gov (United States)

    Sweet, M J; Croquer, A; Bythell, J C

    2014-08-07

    of the other potential pathogens identified in this study.

  14. Beyond Extinction: Prolonged Conditioning and Repeated Threat Exposure Abolish Contextual Renewal of Fear-Potentiated Startle Discrimination but Leave Expectancy Ratings Intact.

    Science.gov (United States)

    Leer, Arne; Haesen, Kim; Vervliet, Bram

    2018-01-01

    Extinction treatments decrease fear via repeated exposures to the conditioned stimulus (CS) and are associated with a return of fear. Alternatively, fear can be reduced via reductions in the perceived intensity of the unconditioned stimulus (US), e.g., through repeated exposures to the US. Promisingly, the few available studies show that repeated US exposures outperform standard extinction. US exposure treatments can decrease fear via two routes: (1) by weakening the CS-US association (extinction-like mechanism), and/or (2) by weakening the subjective US aversiveness (habituation-like mechanism). The current study further investigated the conditions under which US exposure treatment may reduce renewal, by adding a group in which CS-US pairings continued following fear acquisition. During acquisition, participants learned that one of two visual stimuli (CS+/CS-) predicted the occurrence of an aversive electrocutaneous stimulus (US). Next, the background context changed and participants received one of three interventions: repeated CS exposures, (2) repeated US exposures, or (3) continued CS-US pairings. Following repeated CS exposures, test presentations of the CSs in the original conditioning context revealed intact CS+/CS- differentiation in the fear-potentiated startle reflex, while the differentiation was abolished in the other two groups. Differential US expectancy ratings, on the other hand, were intact in all groups. Skin conductance data were inconclusive because standard context renewal following CS exposures did not occur. Unexpectedly, there was no evidence for a habituation-like process having taken place during US exposures or continued CS-US pairings. The results provide further evidence that US exposures outperform the standard extinction treatment and show that effects are similar when US exposures are part of CS-US pairings.

  15. Energy Rebound as a Potential Threat to a Low-Carbon Future: Findings from a New Exergy-Based National-Level Rebound Approach

    Directory of Open Access Journals (Sweden)

    Paul E. Brockway

    2017-01-01

    Full Text Available 150 years ago, Stanley Jevons introduced the concept of energy rebound: that anticipated energy efficiency savings may be “taken back” by behavioural responses. This is an important issue today because, if energy rebound is significant, this would hamper the effectiveness of energy efficiency policies aimed at reducing energy use and associated carbon emissions. However, empirical studies which estimate national energy rebound are rare and, perhaps as a result, rebound is largely ignored in energy-economy models and associated policy. A significant difficulty lies in the components of energy rebound assessed in empirical studies: most examine direct and indirect rebound in the static economy, excluding potentially significant rebound of the longer term structural response of the national economy. In response, we develop a novel exergy-based approach to estimate national energy rebound for the UK and US (1980–2010 and China (1981–2010. Exergy—as “available energy”—allows a consistent, thermodynamic-based metric for national-level energy efficiency. We find large energy rebound in China, suggesting that improvements in China’s energy efficiency may be associated with increased energy consumption (“backfire”. Conversely, we find much lower (partial energy rebound for the case of the UK and US. These findings support the hypothesis that producer-sided economies (such as China may exhibit large energy rebound, reducing the effectiveness of energy efficiency, unless other policy measures (e.g., carbon taxes are implemented. It also raises the prospect we need to deploy renewable energy sources faster than currently planned, if (due to rebound energy efficiency policies cannot deliver the scale of energy reduction envisaged to meet climate targets.

  16. Genomic locus modulating corneal thickness in the mouse identifies POU6F2 as a potential risk of developing glaucoma.

    Directory of Open Access Journals (Sweden)

    Rebecca King

    2018-01-01

    Full Text Available Central corneal thickness (CCT is one of the most heritable ocular traits and it is also a phenotypic risk factor for primary open angle glaucoma (POAG. The present study uses the BXD Recombinant Inbred (RI strains to identify novel quantitative trait loci (QTLs modulating CCT in the mouse with the potential of identifying a molecular link between CCT and risk of developing POAG. The BXD RI strain set was used to define mammalian genomic loci modulating CCT, with a total of 818 corneas measured from 61 BXD RI strains (between 60-100 days of age. The mice were anesthetized and the eyes were positioned in front of the lens of the Phoenix Micron IV Image-Guided OCT system or the Bioptigen OCT system. CCT data for each strain was averaged and used to QTLs modulating this phenotype using the bioinformatics tools on GeneNetwork (www.genenetwork.org. The candidate genes and genomic loci identified in the mouse were then directly compared with the summary data from a human POAG genome wide association study (NEIGHBORHOOD to determine if any genomic elements modulating mouse CCT are also risk factors for POAG.This analysis revealed one significant QTL on Chr 13 and a suggestive QTL on Chr 7. The significant locus on Chr 13 (13 to 19 Mb was examined further to define candidate genes modulating this eye phenotype. For the Chr 13 QTL in the mouse, only one gene in the region (Pou6f2 contained nonsynonymous SNPs. Of these five nonsynonymous SNPs in Pou6f2, two resulted in changes in the amino acid proline which could result in altered secondary structure affecting protein function. The 7 Mb region under the mouse Chr 13 peak distributes over 2 chromosomes in the human: Chr 1 and Chr 7. These genomic loci were examined in the NEIGHBORHOOD database to determine if they are potential risk factors for human glaucoma identified using meta-data from human GWAS. The top 50 hits all resided within one gene (POU6F2, with the highest significance level of p = 10-6 for

  17. Are ranger patrols effective in reducing poaching-related threats within protected areas?

    Science.gov (United States)

    Moore, Jennnifer F.; Mulindahabi, Felix; Masozera, Michel K.; Nichols, James; Hines, James; Turikunkiko, Ezechiel; Oli, Madan K.

    2018-01-01

    Poaching is one of the greatest threats to wildlife conservation world-wide. However, the spatial and temporal patterns of poaching activities within protected areas, and the effectiveness of ranger patrols and ranger posts in mitigating these threats, are relatively unknown.We used 10 years (2006–2015) of ranger-based monitoring data and dynamic multi-season occupancy models to quantify poaching-related threats, to examine factors influencing the spatio-temporal dynamics of these threats and to test the efficiency of management actions to combat poaching in Nyungwe National Park (NNP), Rwanda.The probability of occurrence of poaching-related threats was highest at lower elevations (1,801–2,200 m), especially in areas that were close to roads and tourist trails; conversely, occurrence probability was lowest at high elevation sites (2,601–3,000 m), and near the park boundary and ranger posts. The number of ranger patrols substantially increased the probability that poaching-related threats disappear at a site if threats were originally present (i.e. probability of extinction of threats). Without ranger visits, the annual probability of extinction of poaching-related threats was an estimated 7%; this probability would increase to 20% and 57% with 20 and 50 ranger visits per year, respectively.Our results suggest that poaching-related threats can be effectively reduced in NNP by adding ranger posts in areas where they do not currently exist, and by increasing the number of patrols to sites where the probability of poaching activities is high.Synthesis and applications. Our application of dynamic occupancy models to predict the probability of presence of poaching-related threats is novel, and explicitly considers imperfect detection of illegal activities. Based on the modelled relationships, we identify areas that are most vulnerable to poaching, and offer insights regarding how ranger patrols can be optimally deployed to reduce poaching-related threats and

  18. What's down below? Current and potential future applications of geophysical techniques to identify subsurface permafrost conditions (Invited)

    Science.gov (United States)

    Douglas, T. A.; Bjella, K.; Campbell, S. W.

    2013-12-01

    For infrastructure design, operations, and maintenance requirements in the North the ability to accurately and efficiently detect the presence (or absence) of ground ice in permafrost terrains is a serious challenge. Ground ice features including ice wedges, thermokarst cave-ice, and segregation ice are present in a variety of spatial scales and patterns. Currently, most engineering applications use borehole logging and sampling to extrapolate conditions at the point scale. However, there is high risk of over or under estimating the presence of frozen or unfrozen features when relying on borehole information alone. In addition, boreholes are costly, especially for planning linear structures like roads or runways. Predicted climate warming will provide further challenges for infrastructure development and transportation operations where permafrost degradation occurs. Accurately identifying the subsurface character in permafrost terrains will allow engineers and planners to cost effectively create novel infrastructure designs to withstand the changing environment. There is thus a great need for a low cost rapidly deployable, spatially extensive means of 'measuring' subsurface conditions. Geophysical measurements, both terrestrial and airborne, have strong potential to revolutionize our way of mapping subsurface conditions. Many studies in continuous and discontinuous permafrost have used geophysical measurements to identify discrete features and repeatable patterns in the subsurface. The most common measurements include galvanic and capacitive coupled resistivity, ground penetrating radar, and multi frequency electromagnetic induction techniques. Each of these measurements has strengths, weaknesses, and limitations. By combining horizontal geophysical measurements, downhole geophysics, multispectral remote sensing images, LiDAR measurements, and soil and vegetation mapping we can start to assemble a holistic view of how surface conditions and standoff measurements

  19. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    International Nuclear Information System (INIS)

    Upadhyayula, Venkata K.K.

    2012-01-01

    Highlights: ► Smart sensors are needed for detection of chemical and biological threat agents. ► Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. ► Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. ► Functionalized GNPs support multiple analytical methods for sensing threat agents. ► Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and

  20. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyayula, Venkata K.K., E-mail: Upadhyayula.Venkata@epa.gov [Oak Ridge Institute of Science and Education (ORISE), MC-100-44, PO Box 117, Oak Ridge, TN 37831 (United States)

    2012-02-17

    Highlights: Black-Right-Pointing-Pointer Smart sensors are needed for detection of chemical and biological threat agents. Black-Right-Pointing-Pointer Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. Black-Right-Pointing-Pointer Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. Black-Right-Pointing-Pointer Functionalized GNPs support multiple analytical methods for sensing threat agents. Black-Right-Pointing-Pointer Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad

  1. Planting sentinel European trees in eastern Asia as a novel method to identify potential insect pest invaders.

    Directory of Open Access Journals (Sweden)

    Alain Roques

    Full Text Available Quarantine measures to prevent insect invasions tend to focus on well-known pests but a large proportion of the recent invaders were not known to cause significant damage in their native range, or were not even known to science before their introduction. A novel method is proposed to detect new potential pests of woody plants in their region of origin before they are introduced to a new continent. Since Asia is currently considered to be the main supplier of insect invaders to Europe, sentinel trees were planted in China during 2007-2011 as an early warning tool to identify the potential for additional Asian insect species to colonize European trees. Seedlings (1-1.5 m tall of five broadleaved (Quercus petraea, Q. suber, Q. ilex, Fagus sylvatica, and Carpinus betulus and two conifer species (Abies alba and Cupressus sempervirens were planted in blocks of 100 seedlings at two widely separated sites (one in a nursery near Beijing and the other in a forest environment near Fuyang in eastern China, and then regularly surveyed for colonization by insects. A total of 104 insect species, mostly defoliators, were observed on these new hosts, and at least six species were capable of larval development. Although a number of the insects observed were probably incidental feeders, 38 species had more than five colonization events, mostly infesting Q. petraea, and could be considered as being capable of switching to European trees if introduced to Europe. Three years was shown to be an appropriate duration for the experiment, since the rate of colonization then tended to plateau. A majority of the identified species appeared to have switched from agricultural crops and fruit trees rather than from forest trees. Although these results are promising, the method is not appropriate for xylophagous pests and other groups developing on larger trees. Apart from the logistical problems, the identification to species level of the specimens collected was a major

  2. Using Satellite Data to Identify the Causes of and Potential Solutions for Yield Gaps in India's Wheat Belt

    Science.gov (United States)

    Jain, M.; Singh, B.; Srivastava, A.; Malik, R. K.; McDonald, A.; Lobell, D. B.

    2017-12-01

    Food security will be increasingly challenged by climate change, natural resource degradation, and population growth. Wheat yields, in particular, have already stagnated in many regions and will be further affected by warming temperatures. Despite these challenges, wheat yields can be increased by improving management practices in regions with existing yield gaps. We present two studies that are using satellite data to better understand the factors contributing to yield gaps and potential interventions to close yield gaps in India's main wheat belt, the Indo-Gangetic Plains (IGP). To identify the magnitude and causes of current yield gaps, we produced 30 meter resolution yield maps from 2001 to 2015 using Landsat sallite data and a new method that translates satellite vegetation indices to yield estimates using crop model simulations, bypassing the need for ground calibration data. This is one of the first attempts to apply this method to a smallholder agriculture system, where ground calibration data are rarely available. We find that yields can be increased by 11% on average and up to 32% in the eastern IGP by improving management to current best practices within a given district. Additionally, if current best practices from the highest-yielding state of Punjab are implemented in the eastern IGP, yields could increase by almost 110%. Considering the factors that most influence yields, later sow dates and warmer temperatures are most associated with low yields across the IGP. This suggests that strategies to reduce the negative effects of heat stress, like earlier sowing and planting heat-tolerant wheat varieties, are critical to increasing wheat yields in this globally-important agricultural region. We also apply this method to high-resolution micro-satellite data (impacts of a new fertilizer spreader technology and identify whether satellite data can be used to appropriately target this intervention.

  3. Kinase Gene Expression Profiling of Metastatic Clear Cell Renal Cell Carcinoma Tissue Identifies Potential New Therapeutic Targets.

    Directory of Open Access Journals (Sweden)

    Pooja Ghatalia

    Full Text Available Kinases are therapeutically actionable targets. Kinase inhibitors targeting vascular endothelial growth factor receptors (VEGFR and mammalian target of rapamycin (mTOR improve outcomes in metastatic clear cell renal cell carcinoma (ccRCC, but are not curative. Metastatic tumor tissue has not been comprehensively studied for kinase gene expression. Paired intra-patient kinase gene expression analysis in primary tumor (T, matched normal kidney (N and metastatic tumor tissue (M may assist in identifying drivers of metastasis and prioritizing therapeutic targets. We compared the expression of 519 kinase genes using NanoString in T, N and M in 35 patients to discover genes over-expressed in M compared to T and N tissue. RNA-seq data derived from ccRCC tumors in The Cancer Genome Atlas (TCGA were used to demonstrate differential expression of genes in primary tumor tissue from patients that had metastasis at baseline (n = 79 compared to those that did not develop metastasis for at least 2 years (n = 187. Functional analysis was conducted to identify key signaling pathways by using Ingenuity Pathway Analysis. Of 10 kinase genes overexpressed in metastases compared to primary tumor in the discovery cohort, 9 genes were also differentially expressed in TCGA primary tumors with metastasis at baseline compared to primary tumors without metastasis for at least 2 years: EPHB2, AURKA, GSG2, IKBKE, MELK, CSK, CHEK2, CDC7 and MAP3K8; p<0.001. The top pathways overexpressed in M tissue were pyridoxal 5'-phosphate salvage, salvage pathways of pyrimidine ribonucleotides, NF-kB signaling, NGF signaling and cell cycle control of chromosomal replication. The 9 kinase genes validated to be over-expressed in metastatic ccRCC may represent currently unrecognized but potentially actionable therapeutic targets that warrant functional validation.

  4. Identifying Faults Associated with the 2001 Avoca Induced(?) Seismicity Sequence of Western New York State Using Potential Field Wavelets.

    Science.gov (United States)

    Horowitz, F. G.; Ebinger, C.; Jordan, T. E.

    2017-12-01

    Results from recent DOE and USGS sponsored projects in the (intraplate) northeastern portions of the US and southeastern portions of Canada have identified locations of steeply dipping structures - many previously unknown - from a Poisson wavelet multiscale edge ('worm') analysis of gravity and magnetic fields. The Avoca sequence of induced(?) seismicity in western New York state occurred during January and February of 2001. The Avoca earthquake sequence is associated with industrial hydraulic fracturing activity "related to a proposed natural gas storage facility near Avoca to be constructed by solution mining" (Kim, 2001). The main Avoca event was a felt Mb = 3.2 earthquake on Feb. 3, 2001 recorded by the Lamont Cooperative Seismic Network. Earlier, smaller events were located by the Canadian Geological Survey's seismic network north of the Canadian border - implying that the event locations might be biased because they occurred off the southern edge of the array. Some of these events were also felt locally, according to local newspaper reports. By plotting the location of the seismic events and that of the injection well - reported via it's API number - we find a strong correlation with structures detected via our potential field worms. The injection occurred near a NE-SW striking structure that was not activated. All but one of the earthquakes occurred about 5 km north of the injection well on or nearby to an E-W striking structure that appears to intersect the NE-SW structure. The final, small (MN=2.2) earthquake was located on a different complex structure about 10 km north of the other events. We suggest that potential field methods such as ours might be appropriate to locating structures of concern for induced seismic activity in association with industrial activity. Reference: Kim, W.-Y. (2001). The Lamont cooperative seismic network and the national seismic system: Earthquake hazard studies in the northeastern United States. Tech. Rep. 98-01, Lamont

  5. Identifying and Mitigating Potential Nutrient and Sediment Hot Spots under a Future Scenario in the Missouri River Basin

    Energy Technology Data Exchange (ETDEWEB)

    Wu, May [Argonne National Lab. (ANL), Argonne, IL (United States); Zhang, Zhonglong [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-09-01

    Using the Soil and Water Assessment Tool (SWAT) for large-scale watershed modeling could be useful for evaluating the quality of the water in regions that are dominated by nonpoint sources in order to identify potential “hot spots” for which mitigating strategies could be further developed. An analysis of water quality under future scenarios in which changes in land use would be made to accommodate increased biofuel production was developed for the Missouri River Basin (MoRB) based on a SWAT model application. The analysis covered major agricultural crops and biofuel feedstock in the MoRB, including pasture land, hay, corn, soybeans, wheat, and switchgrass. The analysis examined, at multiple temporal and spatial scales, how nitrate, organic nitrogen, and total nitrogen; phosphorus, organic phosphorus, inorganic phosphorus, and total phosphorus; suspended sediments; and water flow (water yield) would respond to the shifts in land use that would occur under proposed future scenarios. The analysis was conducted at three geospatial scales: (1) large tributary basin scale (two: Upper MoRB and Lower MoRB); (2) regional watershed scale (seven: Upper Missouri River, Middle Missouri River, Middle Lower Missouri River, Lower Missouri River, Yellowstone River, Platte River, and Kansas River); and (3) eight-digit hydrologic unit (HUC-8) subbasin scale (307 subbasins). Results showed that subbasin-level variations were substantial. Nitrogen loadings decreased across the entire Upper MoRB, and they increased in several subbasins in the Lower MoRB. Most nitrate reductions occurred in lateral flow. Also at the subbasin level, phosphorus in organic, sediment, and soluble forms was reduced by 35%, 45%, and 65%, respectively. Suspended sediments increased in 68% of the subbasins. The water yield decreased in 62% of the subbasins. In the Kansas River watershed, the water quality improved significantly with regard to every nitrogen and phosphorus compound. The improvement was

  6. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    Science.gov (United States)

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd E.; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  7. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  8. Three newly identified galectin homologues from triangle sail mussel (Hyriopsis cumingii) function as potential pattern-recognition receptors.

    Science.gov (United States)

    Zhao, Ling-Ling; Hui, Kaimin; Wang, Yu-Qing; Wang, Yue; Ren, Qian; Li, Xin-Cang

    2018-05-01

    Galactoside-binding lectins, also known as galectins, play crucial roles in innate immune response in invertebrates. In this study, three cDNA sequences from Hyriopsis cumingii were identified and collectively called HcGalec genes. Each of the three deduced HcGalec proteins contained a galactose-binding lectin domain or a GLECT domain. All the three HcGalec genes are mainly present in the hepatopancreas and gills, and their expression is induced at 24 h after bacterial challenge. Three recombinant HcGalec proteins can bind and agglutinate (Ca 2+ -dependent) various microorganisms, including Gram-positive and Gram-negative bacteria. These proteins can attach to mannan and peptidoglycan. Meanwhile, the expression of the three HcGalec genes in the gills were significantly down-regulated after dsRNA interference (HcGalec1-RNAi, HcGalec2-RNAi, and HcGalec3-RNAi) and Vibrio parahaemolyticus injection. The expression levels of some antimicrobial peptides, including lysozyme 1 and lysozyme 2, were also markedly decreased after dsRNA interference. Overall, these results suggested that these three HcGalec proteins may function as potential receptors participating in the innate immune responses of H. cumingii against bacterial infection. Copyright © 2018 Elsevier Ltd. All rights reserved.

  9. Next Generation Sequencing Identifies Five Major Classes of Potentially Therapeutic Enzymes Secreted by Lucilia sericata Medical Maggots.

    Science.gov (United States)

    Franta, Zdeněk; Vogel, Heiko; Lehmann, Rüdiger; Rupp, Oliver; Goesmann, Alexander; Vilcinskas, Andreas

    2016-01-01

    Lucilia sericata larvae are used as an alternative treatment for recalcitrant and chronic wounds. Their excretions/secretions contain molecules that facilitate tissue debridement, disinfect, or accelerate wound healing and have therefore been recognized as a potential source of novel therapeutic compounds. Among the substances present in excretions/secretions various peptidase activities promoting the wound healing processes have been detected but the peptidases responsible for these activities remain mostly unidentified. To explore these enzymes we applied next generation sequencing to analyze the transcriptomes of different maggot tissues (salivary glands, gut, and crop) associated with the production of excretions/secretions and/or with digestion as well as the rest of the larval body. As a result we obtained more than 123.8 million paired-end reads, which were assembled de novo using Trinity and Oases assemblers, yielding 41,421 contigs with an N50 contig length of 2.22 kb and a total length of 67.79 Mb. BLASTp analysis against the MEROPS database identified 1729 contigs in 577 clusters encoding five peptidase classes (serine, cysteine, aspartic, threonine, and metallopeptidases), which were assigned to 26 clans, 48 families, and 185 peptidase species. The individual enzymes were differentially expressed among maggot tissues and included peptidase activities related to the therapeutic effects of maggot excretions/secretions.

  10. Genome characterization of Turkey Rotavirus G strains from the United States identifies potential recombination events with human Rotavirus B strains.

    Science.gov (United States)

    Chen, Fangzhou; Knutson, Todd P; Porter, Robert E; Ciarlet, Max; Mor, Sunil Kumar; Marthaler, Douglas G

    2017-12-01

    Rotavirus G (RVG) strains have been detected in a variety of avian species, but RVG genomes have been published from only a single pigeon and two chicken strains. Two turkey RVG strains were identified and characterized, one in a hatchery with no reported health issues and the other in a hatchery with high embryo/poult mortality. The two turkey RVG strains shared only an 85.3 % nucleotide sequence identity in the VP7 gene while the other genes possessed high nucleotide identity among them (96.3-99.9 %). Low nucleotide percentage identities (31.6-87.3 %) occurred among the pigeon and chicken RVG strains. Interestingly, potential recombination events were detected between our RVG strains and a human RVB strain, in the VP6 and NSP3 segments. The epidemiology of RVG in avian flocks and the pathogenicity of the two different RVG strains should be further investigated to understand the ecology and impact of RVG in commercial poultry flocks.

  11. Threats during sex work and association with mental health among young female sex workers in Hong Kong.

    Science.gov (United States)

    Mo, Phoenix K H; Mak, Winnie W S; Kwok, Yvonne T Y; Xin, Meiqi; Chan, Charlie W L; Yip, Louise W M

    2018-08-01

    Young female sex workers (YFSWs) are confronted with significant threats during sex work. The present cross-sectional study examined different levels of threats (i.e., threats to life and health, threats to humanity, threats to control of work and financial security, and the threats to future) experienced by 87 YFSWs (age 16-25) in Hong Kong, and identified their association with mental health (i.e., psychological well-being) together with other factors, including childhood trauma, self-efficacy, hope, and social support. Results showed that the participants encountered a significant number of threats. More than half reported that they had a condom removed by clients during sex (51.7%); or have been humililated by clients (51.7%). Because of sex work, about a quarter (25.3%) have had sexually transmitted disease, and respectively 10.3% and 12.6% have had abortion and unplanned pregnancy. The majority have had friends found out that they engaged in sex work (72.4%). They also showed a high level of worry about the various threats. Multiple linear regression analysis showed that childhood trauma (β = -.26) and worry about threats during sex work (β = -.22) were significantly negative predictors, while self-efficacy (β = .20) and hope (β = .27) were significantly positive predictors of mental health. Future services should improve YFSWs' skills to minimize potential threats during female sex work, address the structural correlates and relieve their worries, and empower them with more hope and self-efficacy in choosing clients.

  12. A Literature Survey to Identify Potentially Volatile Iodine-Bearing Species Present in Off-Gas Streams

    Energy Technology Data Exchange (ETDEWEB)

    Bruffey, S. H. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Spencer, B. B. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Strachan, D. M. [Strata-G, Knoxville, TN (United States); Jubin, R. T. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Soelberg, N. R. [Idaho National Lab. (INL), Idaho Falls, ID (United States); Riley, B. J. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2015-06-30

    Four radionuclides have been identified as being sufficiently volatile in the reprocessing of nuclear fuel that their gaseous release needs to be controlled to meet regulatory requirements (Jubin et al. 2011, 2012). These radionuclides are 3H, 14C, 85Kr, and 129I. Of these, 129I has the longest half-life and potentially high biological impact. Accordingly, control of the release of 129I is most critical with respect to the regulations for the release of radioactive material in stack emissions. It is estimated that current EPA regulations (EPA 2010) would require any reprocessing plant in the United States to limit 129I release to less than 0.05 Ci/MTIHM for a typical fuel burnup of 55 gigawatt days per metric tonne (GWd/t) (Jubin 2011). The study of inorganic iodide in off-gas systems has been almost exclusively limited to I2 and the focus of organic iodide studies has been CH3I. In this document, we provide the results of an examination of publically available literature that is relevant to the presence and sources of both inorganic and organic iodine-bearing species in reprocessing plants. We especially focus on those that have the potential to be poorly sequestered with traditional capture methodologies. Based on the results of the literature survey and some limited thermodynamic modeling, the inorganic iodine species hypoiodous acid (HOI) and iodine monochloride (ICl) were identified as potentially low-sorbing iodine species that could present in off-gas systems. Organic species of interest included both short chain alkyl iodides such as methyl iodide (CH3I) and longer alkyl iodides up to iodododecane (C10H21I). It was found that fuel dissolution may provide conditions conducive to HOI formation and has been shown to result in volatile long-chain alkyl iodides, though these may not volatilize until later in the reprocessing sequence. Solvent extraction processes were found to be significant sources of various organic iodine-bearing species; formation of these

  13. Potential risks and threats to international security

    Directory of Open Access Journals (Sweden)

    Iurie RICHICINSCHI

    2016-12-01

    Full Text Available Today we can ascertain with certainty that in the early part of the 21st century, the challenges addressed to the current security environment tend to become increasingly diffuse, less predictable and multidimensional, being both a feature of external security, as well as an internal one and, of course, becoming an indispensable part of security policies and strategies. Therefore, the need for international cooperation as a foundation for the stability of the security environment has increased. It should provide a sense of trust and peace by ensuring the absence of danger both for the individual and for the community to which he belongs.

  14. Detecting Potential Insider Threats Through Email Datamining

    Science.gov (United States)

    2006-03-01

    2.1% Mime 1.1% Hotmail 1.0% Version 0.9% Return 0.7% SMTP 0.7% Type 0.7% MSN 0.7% Mailer 0.8...September 11 attacks and one on the last days of Enron prior to the bankruptcy. An additional topic that emerges is focused on AOL, Yahoo, and Hotmail ...0.0039039999 thought 0.0026032187 22 23 yahoo 0.0109859817 yahoo 0.0209943801 mime 0.0109363170 tm 0.0069047296 hotmail 0.0097741578 sponsor 0.0065174312

  15. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  16. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Stienstra, S.

    2007-01-01

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  17. A metagenomic viral discovery approach identifies potential zoonotic and novel mammalian viruses in Neoromicia bats within South Africa.

    Science.gov (United States)

    Geldenhuys, Marike; Mortlock, Marinda; Weyer, Jacqueline; Bezuidt, Oliver; Seamark, Ernest C J; Kearney, Teresa; Gleasner, Cheryl; Erkkila, Tracy H; Cui, Helen; Markotter, Wanda

    2018-01-01

    Species within the Neoromicia bat genus are abundant and widely distributed in Africa. It is common for these insectivorous bats to roost in anthropogenic structures in urban regions. Additionally, Neoromicia capensis have previously been identified as potential hosts for Middle East respiratory syndrome (MERS)-related coronaviruses. This study aimed to ascertain the gastrointestinal virome of these bats, as viruses excreted in fecal material or which may be replicating in rectal or intestinal tissues have the greatest opportunities of coming into contact with other hosts. Samples were collected in five regions of South Africa over eight years. Initial virome composition was determined by viral metagenomic sequencing by pooling samples and enriching for viral particles. Libraries were sequenced on the Illumina MiSeq and NextSeq500 platforms, producing a combined 37 million reads. Bioinformatics analysis of the high throughput sequencing data detected the full genome of a novel species of the Circoviridae family, and also identified sequence data from the Adenoviridae, Coronaviridae, Herpesviridae, Parvoviridae, Papillomaviridae, Phenuiviridae, and Picornaviridae families. Metagenomic sequencing data was insufficient to determine the viral diversity of certain families due to the fragmented coverage of genomes and lack of suitable sequencing depth, as some viruses were detected from the analysis of reads-data only. Follow up conventional PCR assays targeting conserved gene regions for the Adenoviridae, Coronaviridae, and Herpesviridae families were used to confirm metagenomic data and generate additional sequences to determine genetic diversity. The complete coding genome of a MERS-related coronavirus was recovered with additional amplicon sequencing on the MiSeq platform. The new genome shared 97.2% overall nucleotide identity to a previous Neoromicia-associated MERS-related virus, also from South Africa. Conventional PCR analysis detected diverse adenovirus and

  18. Identifying areas of high economic-potential copper mineralization using ASTER data in the Urumieh-Dokhtar Volcanic Belt, Iran

    Science.gov (United States)

    Pour, Amin Beiranvand; Hashim, Mazlan

    2012-02-01

    This study investigates the application of spectral image processing methods to ASTER data for mapping hydrothermal alteration zones associated with porphyry copper mineralization and related host rock. The study area is located in the southeastern segment of the Urumieh-Dokhtar Volcanic Belt of Iran. This area has been selected because it is a potential zone for exploration of new porphyry copper deposits. Spectral transform approaches, namely principal component analysis, band ratio and minimum noise fraction were used for mapping hydrothermally altered rocks and lithological units at regional scale. Spectral mapping methods, including spectral angle mapper, linear spectral unmixing, matched filtering and mixture tuned matched filtering were applied to differentiate hydrothermal alteration zones associated with porphyry copper mineralization such as phyllic, argillic and propylitic mineral assemblages.Spectral transform methods enhanced hydrothermally altered rocks associated with the known porphyry copper deposits and new identified prospects using shortwave infrared (SWIR) bands of ASTER. These methods showed the discrimination of quartz rich igneous rocks from the magmatic background and the boundary between igneous and sedimentary rocks using the thermal infrared (TIR) bands of ASTER at regional scale. Spectral mapping methods distinguished the sericitically- and argillically-altered rocks (the phyllic and argillic alteration zones) that surrounded by discontinuous to extensive zones of propylitized rocks (the propylitic alteration zone) using SWIR bands of ASTER at both regional and district scales. Linear spectral unmixing method can be best suited for distinguishing specific high economic-potential hydrothermal alteration zone (the phyllic zone) and mineral assemblages using SWIR bands of ASTER. Results have proven to be effective, and in accordance with the results of field surveying, spectral reflectance measurements and X-ray diffraction (XRD) analysis

  19. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  20. Early T Cell Recognition of B Cells following Epstein-Barr Virus Infection: Identifying Potential Targets for Prophylactic Vaccination.

    Directory of Open Access Journals (Sweden)

    Jill M Brooks

    2016-04-01

    Full Text Available Epstein-Barr virus, a B-lymphotropic herpesvirus, is the cause of infectious mononucleosis, has strong aetiologic links with several malignancies and has been implicated in certain autoimmune diseases. Efforts to develop a prophylactic vaccine to prevent or reduce EBV-associated disease have, to date, focused on the induction of neutralising antibody responses. However, such vaccines might be further improved by inducing T cell responses capable of recognising and killing recently-infected B cells. In that context, EBNA2, EBNA-LP and BHRF1 are the first viral antigens expressed during the initial stage of B cell growth transformation, yet have been poorly characterised as CD8+ T cell targets. Here we describe CD8+ T cell responses against each of these three "first wave" proteins, identifying target epitopes and HLA restricting alleles. While EBNA-LP and BHRF1 each contained one strong CD8 epitope, epitopes within EBNA2 induced immunodominant responses through several less common HLA class I alleles (e.g. B*3801 and B*5501, as well as subdominant responses through common class I alleles (e.g. B7 and C*0304. Importantly, such EBNA2-specific CD8+ T cells recognised B cells within the first day post-infection, prior to CD8+ T cells against well-characterised latent target antigens such as EBNA3B or LMP2, and effectively inhibited outgrowth of EBV-transformed B cell lines. We infer that "first wave" antigens of the growth-transforming infection, especially EBNA2, constitute potential CD8+ T cell immunogens for inclusion in prophylactic EBV vaccine design.

  1. Global analysis of WRKY transcription factor superfamily in Setaria identifies potential candidates involved in abiotic stress signalling

    Directory of Open Access Journals (Sweden)

    Mehanathan eMuthamilarasan

    2015-10-01

    Full Text Available Transcription factors (TFs are major players in stress signalling and constitute an integral part of signalling networks. Among the major TFs, WRKY proteins play pivotal roles in regulation of transcriptional reprogramming associated with stress responses. In view of this, genome- and transcriptome-wide identification of WRKY TF family was performed in the C4 model plants, Setaria italica (SiWRKY and S. viridis (SvWRKY, respectively. The study identified 105 SiWRKY and 44 SvWRKY proteins that were computationally analysed for their physicochemical properties. Sequence alignment and phylogenetic analysis classified these proteins into three major groups, namely I, II and III with majority of WRKY proteins belonging to group II (53 SiWRKY and 23 SvWRKY, followed by group III (39 SiWRKY and 11 SvWRKY and group I (10 SiWRKY and 6 SvWRKY. Group II proteins were further classified into 5 subgroups (IIa to IIe based on their phylogeny. Domain analysis showed the presence of WRKY motif and zinc finger-like structures in these proteins along with additional domains in a few proteins. All SiWRKY genes were physically mapped on the S. italica genome and their duplication analysis revealed that 10 and 8 gene pairs underwent tandem and segmental duplications, respectively. Comparative mapping of SiWRKY and SvWRKY genes in related C4 panicoid genomes demonstrated the orthologous relationships between these genomes. In silico expression analysis of SiWRKY and SvWRKY genes showed their differential expression patterns in different tissues and stress conditions. Expression profiling of candidate SiWRKY genes in response to stress (dehydration and salinity and hormone treatments (abscisic acid, salicylic acid and methyl jasmonate suggested the putative involvement of SiWRKY066 and SiWRKY082 in stress and hormone signalling. These genes could be potential candidates for further characterization to delineate their functional roles in abiotic stress signalling.

  2. Global analysis of WRKY transcription factor superfamily in Setaria identifies potential candidates involved in abiotic stress signaling.

    Science.gov (United States)

    Muthamilarasan, Mehanathan; Bonthala, Venkata S; Khandelwal, Rohit; Jaishankar, Jananee; Shweta, Shweta; Nawaz, Kashif; Prasad, Manoj

    2015-01-01

    Transcription factors (TFs) are major players in stress signaling and constitute an integral part of signaling networks. Among the major TFs, WRKY proteins play pivotal roles in regulation of transcriptional reprogramming associated with stress responses. In view of this, genome- and transcriptome-wide identification of WRKY TF family was performed in the C4model plants, Setaria italica (SiWRKY) and S. viridis (SvWRKY), respectively. The study identified 105 SiWRKY and 44 SvWRKY proteins that were computationally analyzed for their physicochemical properties. Sequence alignment and phylogenetic analysis classified these proteins into three major groups, namely I, II, and III with majority of WRKY proteins belonging to group II (53 SiWRKY and 23 SvWRKY), followed by group III (39 SiWRKY and 11 SvWRKY) and group I (10 SiWRKY and 6 SvWRKY). Group II proteins were further classified into 5 subgroups (IIa to IIe) based on their phylogeny. Domain analysis showed the presence of WRKY motif and zinc finger-like structures in these proteins along with additional domains in a few proteins. All SiWRKY genes were physically mapped on the S. italica genome and their duplication analysis revealed that 10 and 8 gene pairs underwent tandem and segmental duplications, respectively. Comparative mapping of SiWRKY and SvWRKY genes in related C4 panicoid genomes demonstrated the orthologous relationships between these genomes. In silico expression analysis of SiWRKY and SvWRKY genes showed their differential expression patterns in different tissues and stress conditions. Expression profiling of candidate SiWRKY genes in response to stress (dehydration and salinity) and hormone treatments (abscisic acid, salicylic acid, and methyl jasmonate) suggested the putative involvement of SiWRKY066 and SiWRKY082 in stress and hormone signaling. These genes could be potential candidates for further characterization to delineate their functional roles in abiotic stress signaling.

  3. Post Mortem Validation of MRI-Identified Veins on the Surface of the Cerebral Cortex as Potential Landmarks for Neurosurgery

    Directory of Open Access Journals (Sweden)

    Günther Grabner

    2017-06-01

    Full Text Available Background and Objective: Image-guided neurosurgery uses information from a wide spectrum of methods to inform the neurosurgeon's judgement about which tissue to resect and which to spare. Imaging data are registered to the patient's skull so that they correspond to the intraoperative macro- and microscopic view. The correspondence between imaging and optical systems breaks down during surgery, however, as a result of cerebro-spinal fluid drain age, tissue resection, and gravity-based brain shift. In this work we investigate whether a map of surface veins, automatically segmented from MRI, could serve as additional reference system.Methods: Gradient-echo based T2*-weighted imaging was performed on two human cadavers heads using a 7 Tesla MRI scanner. Automatic vessel segmentation was performed using the Frangi vesselness filter, and surface renderings of vessels compared with photographs of the surface of the brain following craniotomy.Results: A high level of correspondence was established between vessel maps and the post autopsy photographs. Corresponding veins, including the prominent superior anastomotic veins, could be identified in all brain lobes.Conclusion: Automatic surface vessel segmentation is feasible and the high correspondence to post autopsy photographs indicates that they could be used as an additional reference system for image-guided neurosurgery in order to maintain the correspondence between imaging and optical systems.This has the advantage over a skull-based reference system that veins are clearly visible to the surgeon and move and deform with the underlying tissue, potentially making this surface net of landmarks robust to brain shift.

  4. Global analysis of WRKY transcription factor superfamily in Setaria identifies potential candidates involved in abiotic stress signaling

    Science.gov (United States)

    Muthamilarasan, Mehanathan; Bonthala, Venkata S.; Khandelwal, Rohit; Jaishankar, Jananee; Shweta, Shweta; Nawaz, Kashif; Prasad, Manoj

    2015-01-01

    Transcription factors (TFs) are major players in stress signaling and constitute an integral part of signaling networks. Among the major TFs, WRKY proteins play pivotal roles in regulation of transcriptional reprogramming associated with stress responses. In view of this, genome- and transcriptome-wide identification of WRKY TF family was performed in the C4model plants, Setaria italica (SiWRKY) and S. viridis (SvWRKY), respectively. The study identified 105 SiWRKY and 44 SvWRKY proteins that were computationally analyzed for their physicochemical properties. Sequence alignment and phylogenetic analysis classified these proteins into three major groups, namely I, II, and III with majority of WRKY proteins belonging to group II (53 SiWRKY and 23 SvWRKY), followed by group III (39 SiWRKY and 11 SvWRKY) and group I (10 SiWRKY and 6 SvWRKY). Group II proteins were further classified into 5 subgroups (IIa to IIe) based on their phylogeny. Domain analysis showed the presence of WRKY motif and zinc finger-like structures in these proteins along with additional domains in a few proteins. All SiWRKY genes were physically mapped on the S. italica genome and their duplication analysis revealed that 10 and 8 gene pairs underwent tandem and segmental duplications, respectively. Comparative mapping of SiWRKY and SvWRKY genes in related C4 panicoid genomes demonstrated the orthologous relationships between these genomes. In silico expression analysis of SiWRKY and SvWRKY genes showed their differential expression patterns in different tissues and stress conditions. Expression profiling of candidate SiWRKY genes in response to stress (dehydration and salinity) and hormone treatments (abscisic acid, salicylic acid, and methyl jasmonate) suggested the putative involvement of SiWRKY066 and SiWRKY082 in stress and hormone signaling. These genes could be potential candidates for further characterization to delineate their functional roles in abiotic stress signaling. PMID:26635818

  5. MALDI-TOF and SELDI-TOF analysis: “tandem” techniques to identify potential biomarker in fibromyalgia

    Directory of Open Access Journals (Sweden)

    A. Lucacchini

    2011-11-01

    Full Text Available Fibromyalgia (FM is characterized by the presence of chronic widespread pain throughout the musculoskeletal system and diffuse tenderness. Unfortunately, no laboratory tests have been appropriately validated for FM and correlated with the subsets and activity. The aim of this study was to apply a proteomic technique in saliva of FM patients: the Surface Enhance Laser Desorption/Ionization Time-of-Flight (SELDI-TOF. For this study, 57 FM patients and 35 HC patients were enrolled. The proteomic analysis of saliva was carried out using SELDI-TOF. The analysis was performed using different chip arrays with different characteristics of binding. The statistical analysis was performed using cluster analysis and the difference between two groups was underlined using Student’s t-test. Spectra analysis highlighted the presence of several peaks differently expressed in FM patients compared with controls. The preliminary results obtained by SELDI-TOF analysis were compared with those obtained in our previous study performed on whole saliva of FM patients by using electrophoresis. The m/z of two peaks, increased in FM patients, seem to overlap well with the molecular weight of calgranulin A and C and Rho GDP-dissociation inhibitor 2, which we had found up-regulated in our previous study. These preliminary results showed the possibility of identifying potential salivary biomarker through salivary proteomic analysis with MALDI-TOF and SELDI-TOF in FM patients. The peaks observed allow us to focus on some of the particular pathogenic aspects of FM, the oxidative stress which contradistinguishes this condition, the involvement of proteins related to the cytoskeletal arrangements, and central sensibilization.

  6. THP-1 monocytes but not macrophages as a potential alternative for CD34+ dendritic cells to identify chemical skin sensitizers

    International Nuclear Information System (INIS)

    Lambrechts, Nathalie; Verstraelen, Sandra; Lodewyckx, Hanne; Felicio, Ana; Hooyberghs, Jef; Witters, Hilda; Tendeloo, Viggo van; Cauwenberge, Paul van; Nelissen, Inge; Heuvel, Rosette van den; Schoeters, Greet

    2009-01-01

    Early detection of the sensitizing potential of chemicals is an emerging issue for chemical, pharmaceutical and cosmetic industries. In our institute, an in vitro classification model for prediction of chemical-induced skin sensitization based on gene expression signatures in human CD34 + progenitor-derived dendritic cells (DC) has been developed. This primary cell model is able to closely mimic the induction phase of sensitization by Langerhans cells in the skin, but it has drawbacks, such as the availability of cord blood. The aim of this study was to investigate whether human in vitro cultured THP-1 monocytes or macrophages display a similar expression profile for 13 predictive gene markers previously identified in DC and whether they also possess a discriminating capacity towards skin sensitizers and non-sensitizers based on these marker genes. To this end, the cell models were exposed to 5 skin sensitizers (ammonium hexachloroplatinate IV, 1-chloro-2,4-dinitrobenzene, eugenol, para-phenylenediamine, and tetramethylthiuram disulfide) and 5 non-sensitizers (L-glutamic acid, methyl salicylate, sodium dodecyl sulfate, tributyltin chloride, and zinc sulfate) for 6, 10, and 24 h, and mRNA expression of the 13 genes was analyzed using real-time RT-PCR. The transcriptional response of 7 out of 13 genes in THP-1 monocytes was significantly correlated with DC, whereas only 2 out of 13 genes in THP-1 macrophages. After a cross-validation of a discriminant analysis of the gene expression profiles in the THP-1 monocytes, this cell model demonstrated to also have a capacity to distinguish skin sensitizers from non-sensitizers. However, the DC model was superior to the monocyte model for discrimination of (non-)sensitizing chemicals.

  7. Safety Regulations in organizations and enterprises under supervision of Federal environmental, industrial and nuclear supervision service of Russia (Rostechnadzor), Central Region. Short overview of sites which potentially are dangerous for terrorist threat

    International Nuclear Information System (INIS)

    Gasselblat, A.D.

    2010-01-01

    on the territory of 19 sites of Russian Federation - basically, these are central regions of Russia's Europe part on the territory of Central Federal region of Russian Federation (with exceptions, indicated in Central interregional territory administration). The region territory is 650, 7 thousands square kilometers, which increases the territory of such country as France. This is the most industrially developed region of Russia, where the third part of whole country's population is living and 40% of industrial enterprises are focused. 600 (592) organizations (enterprises, institutions), dealing with radionuclides are under the control of Central inter regional territory administration, where 1,5 thousands (1514) radiation - dangerous sites are included. The total number of sealed sources in controlled organizations is 21425 pieces with activity 4,2 E +17 Bq. 6250 sources from this amount has activity approximately 9,8 E +15 Bq worked off its period - 29% from total amount, most of them were disposed in specialized organizations dealing with radioactive wastes. According to the activity approximately 50% are industrial enterprises, 30% research organizations, 10% medical institutions, 5% education and others belong to agricultural, transport and service organizations. Among mentioned enterprises, there are sites which belong to potentially radiation-dangerous. Their danger was identified in agreement with Rospotrebnadzor authorities' category according to potential radiation hazard (in accordance with rules on ensuring the radiation safety OSPORB - 99): 5 organizations - 1 category; 4 organizations - 2 category. These organizations require specific measures and efforts on ensuring physical protection of sites and measures on terrorist threat prevention. The control of indicated activity is carried out by 10 inspections departments located within the jurisdiction of territories (with group of inspectors or separate inspector in each region of Russian Federation, in

  8. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  9. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  10. Social identity threat motivates science-discrediting online comments.

    Science.gov (United States)

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as "gamers") were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition.

  11. Assessing the potential of genotyping-by-sequencing-derived single nucleotide polymorphisms to identify the geographic origins of intercepted gypsy moth (Lymantria dispar) specimens: A proof-of-concept study

    Science.gov (United States)

    Sandrine Picq; Melody Keena; Nathan Havill; Don Stewart; Esther Pouliot; Brian Boyle; Roger C. Levesque; Richard C. Hamelin; Michel Cusson

    2018-01-01

    Forest invasive alien species are a major threat to ecosystem stability and can have enormous economic and social impacts. For this reason, preventing the introduction of Asian gypsy moths (AGM; Lymantria dispar asiatica and L. d. japonica) into North America has been identified as a top priority by North American authorities....

  12. Novel peptide marker corresponding to salivary protein gSG6 potentially identifies exposure to Anopheles bites.

    Directory of Open Access Journals (Sweden)

    Anne Poinsignon

    2008-06-01

    Full Text Available In order to improve malaria control, and under the aegis of WHO recommendations, many efforts are being devoted to developing new tools for identifying geographic areas with high risk of parasite transmission. Evaluation of the human antibody response to arthropod salivary proteins could be an epidemiological indicator of exposure to vector bites, and therefore to risk of pathogen transmission. In the case of malaria, which is transmitted only by anopheline mosquitoes, maximal specificity could be achieved through identification of immunogenic proteins specific to the Anopheles genus. The objective of the present study was to determine whether the IgG response to the Anopheles gambiae gSG6 protein, from its recombinant form to derived synthetic peptides, could be an immunological marker of exposure specific to Anopheles gambiae bites.Specific IgG antibodies to recombinant gSG6 protein were observed in children living in a Senegalese area exposed to malaria. With the objective of optimizing Anopheles specificity and reproducibility, we designed five gSG6-based peptide sequences using a bioinformatic approach, taking into consideration i their potential antigenic properties and ii the absence of cross-reactivity with protein sequences of other arthropods/organisms. The specific anti-peptide IgG antibody response was evaluated in exposed children. The five gSG6 peptides showed differing antigenic properties, with gSG6-P1 and gSG6-P2 exhibiting the highest antigenicity. However, a significant increase in the specific IgG response during the rainy season and a positive association between the IgG level and the level of exposure to Anopheles gambiae bites was significant only for gSG6-P1.This step-by-step approach suggests that gSG6-P1 could be an optimal candidate marker for evaluating exposure to Anopheles gambiae bites. This marker could be employed as a geographic indicator, like remote sensing techniques, for mapping the risk of malaria. It could

  13. Potential hazards to embryo implantation: A human endometrial in vitro model to identify unwanted antigestagenic actions of chemicals

    International Nuclear Information System (INIS)

    Fischer, L.; Deppert, W.R.; Pfeifer, D.; Stanzel, S.; Weimer, M.; Hanjalic-Beck, A.; Stein, A.; Straßer, M.; Zahradnik, H.P.; Schaefer, W.R.

    2012-01-01

    Embryo implantation is a crucial step in human reproduction and depends on the timely development of a receptive endometrium. The human endometrium is unique among adult tissues due to its dynamic alterations during each menstrual cycle. It hosts the implantation process which is governed by progesterone, whereas 17β-estradiol regulates the preceding proliferation of the endometrium. The receptors for both steroids are targets for drugs and endocrine disrupting chemicals. Chemicals with unwanted antigestagenic actions are potentially hazardous to embryo implantation since many pharmaceutical antiprogestins adversely affect endometrial receptivity. This risk can be addressed by human tissue-specific in vitro assays. As working basis we compiled data on chemicals interacting with the PR. In our experimental work, we developed a flexible in vitro model based on human endometrial Ishikawa cells. Effects of antiprogestin compounds on pre-selected target genes were characterized by sigmoidal concentration–response curves obtained by RT-qPCR. The estrogen sulfotransferase (SULT1E1) was identified as the most responsive target gene by microarray analysis. The agonistic effect of progesterone on SULT1E1 mRNA was concentration-dependently antagonized by RU486 (mifepristone) and ZK137316 and, with lower potency, by 4-nonylphenol, bisphenol A and apigenin. The negative control methyl acetoacetate showed no effect. The effects of progesterone and RU486 were confirmed on the protein level by Western blotting. We demonstrated proof of principle that our Ishikawa model is suitable to study quantitatively effects of antiprogestin-like chemicals on endometrial target genes in comparison to pharmaceutical reference compounds. This test is useful for hazard identification and may contribute to reduce animal studies. -- Highlights: ► We compare progesterone receptor-mediated endometrial effects of chemicals and drugs. ► 4-Nonylphenol, bisphenol A and apigenin exert weak

  14. Potential hazards to embryo implantation: A human endometrial in vitro model to identify unwanted antigestagenic actions of chemicals

    Energy Technology Data Exchange (ETDEWEB)

    Fischer, L.; Deppert, W.R. [Department of Obstetrics and Gynecology, University Hospital Freiburg (Germany); Pfeifer, D. [Department of Hematology and Oncology, University Hospital Freiburg (Germany); Stanzel, S.; Weimer, M. [Department of Biostatistics, German Cancer Research Center, Heidelberg (Germany); Hanjalic-Beck, A.; Stein, A.; Straßer, M.; Zahradnik, H.P. [Department of Obstetrics and Gynecology, University Hospital Freiburg (Germany); Schaefer, W.R., E-mail: wolfgang.schaefer@uniklinik-freiburg.de [Department of Obstetrics and Gynecology, University Hospital Freiburg (Germany)

    2012-05-01

    Embryo implantation is a crucial step in human reproduction and depends on the timely development of a receptive endometrium. The human endometrium is unique among adult tissues due to its dynamic alterations during each menstrual cycle. It hosts the implantation process which is governed by progesterone, whereas 17β-estradiol regulates the preceding proliferation of the endometrium. The receptors for both steroids are targets for drugs and endocrine disrupting chemicals. Chemicals with unwanted antigestagenic actions are potentially hazardous to embryo implantation since many pharmaceutical antiprogestins adversely affect endometrial receptivity. This risk can be addressed by human tissue-specific in vitro assays. As working basis we compiled data on chemicals interacting with the PR. In our experimental work, we developed a flexible in vitro model based on human endometrial Ishikawa cells. Effects of antiprogestin compounds on pre-selected target genes were characterized by sigmoidal concentration–response curves obtained by RT-qPCR. The estrogen sulfotransferase (SULT1E1) was identified as the most responsive target gene by microarray analysis. The agonistic effect of progesterone on SULT1E1 mRNA was concentration-dependently antagonized by RU486 (mifepristone) and ZK137316 and, with lower potency, by 4-nonylphenol, bisphenol A and apigenin. The negative control methyl acetoacetate showed no effect. The effects of progesterone and RU486 were confirmed on the protein level by Western blotting. We demonstrated proof of principle that our Ishikawa model is suitable to study quantitatively effects of antiprogestin-like chemicals on endometrial target genes in comparison to pharmaceutical reference compounds. This test is useful for hazard identification and may contribute to reduce animal studies. -- Highlights: ► We compare progesterone receptor-mediated endometrial effects of chemicals and drugs. ► 4-Nonylphenol, bisphenol A and apigenin exert weak

  15. RUSSIA'S ECONOMIC SECURITY: THREATS TO NATIONAL INTERESTS AND THEIR REFLECTION

    Directory of Open Access Journals (Sweden)

    M. N. Dudin

    2014-01-01

    Full Text Available The relevance of this study due to the fact that at the present time the situation inRussiais complemented by the negative consequences of market reforms in the economy. According to statistical studies in the country with infl ation of about 10% per year among the total population of more than 20% of people with incomes below the subsistence minimum, and the income gap between the highest-income populations and low-income groups more than 12 times. The inequitable distribution of material and spiritual wealth, unemployment (over 9%, ignoring the legitimate rights and interests of a particular person and their direct violation, corruption, alcoholism, drug addiction largely led to the reproduction of aggression, violence in the country. The recession has limited the ability of the material support of the institutions of culture, education, health. The majority of the population is a feeling of uncertainty, future uncertainty, anxiety, loss of landmarks.Objectives The purpose of this work is the identifi cation and characterization of threats to economic security of theRussian Federationat the present time, and to develop recommendations for the prevention of threats to the national interests ofRussia.Method’s. The methodological basis of this article was legal, comparative and economic-statistical methods of analysis. Results. In the framework of the submitted article, the authors found that threats to the economic security ofRussiaare potential dangers that can occur when inept and ineffi cient use of economic resources ofRussiaon the domestic and foreign markets. Major threats to the economic security of theRussian Federationare: bankruptcy, weak absorption lines; corruption; threats to small business development; investment crisis, the massive outfl ow of capital; the crisis in the social sphere; food addiction; the crisis of industrial policy, as well as strengthening the role and place of TNCs.Conclusions and Relevance. The practical

  16. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  17. Identifying Potential Mediators and Moderators of the Association between Child Maltreatment and Bullying Perpetration and Victimization in School

    Science.gov (United States)

    Hong, Jun Sung; Espelage, Dorothy L.; Grogan-Kaylor, Andrew; Allen-Meares, Paula

    2012-01-01

    A growing body of literature is demonstrating associations between childhood maltreatment and bullying involvement at school. In this literature review, four potential mediators (explanatory) and three potential moderators (mitigates or exacerbates) of the association between childhood maltreatment and school bullying are proposed. Mediators…

  18. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  19. A horizon scan of future threats and opportunities for pollinators and pollination

    Directory of Open Access Journals (Sweden)

    Mark J.F. Brown

    2016-08-01

    Full Text Available Background. Pollinators, which provide the agriculturally and ecologically essential service of pollination, are under threat at a global scale. Habitat loss and homogenisation, pesticides, parasites and pathogens, invasive species, and climate change have been identified as past and current threats to pollinators. Actions to mitigate these threats, e.g., agri-environment schemes and pesticide-use moratoriums, exist, but have largely been applied post-hoc. However, future sustainability of pollinators and the service they provide requires anticipation of potential threats and opportunities before they occur, enabling timely implementation of policy and practice to prevent, rather than mitigate, further pollinator declines. Methods.Using a horizon scanning approach we identified issues that are likely to impact pollinators, either positively or negatively, over the coming three decades. Results.Our analysis highlights six high priority, and nine secondary issues. High priorities are: (1 corporate control of global agriculture, (2 novel systemic pesticides, (3 novel RNA viruses, (4 the development of new managed pollinators, (5 more frequent heatwaves and drought under climate change, and (6 the potential positive impact of reduced chemical use on pollinators in non-agricultural settings. Discussion. While current pollinator management approaches are largely driven by mitigating past impacts, we present opportunities for pre-emptive practice, legislation, and policy to sustainably manage pollinators for future generations.

  20. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  1. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  2. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  3. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  4. Identifying potential heirs properties in the Southeastern United States: a new GIS methodology utilizing mass appraisal data

    Science.gov (United States)

    Scott Pippin; Shana Jones; Cassandra. Johnson Gaither

    2017-01-01

    This report presents a methodology for identifying land parcels that have an increased probability of being heirs property. Heirs property is inherited land passed to successive generations intestate, without clear title, typically to family members. This land ownership type is widespread among rural, African-American populations and is also thought to be pervasive in...

  5. Point to a Referent, and Say, "What Is This?" Gesture as a Potential Cue to Identify Referents in a Discourse

    Science.gov (United States)

    So, Wing Chee; Lim, Jia Yi

    2012-01-01

    This study explored whether caregivers' gestures followed the discourse-pragmatic principle of information status of referents (given vs. new) and how their children responded to those gestures when identifying referents. Ten Chinese-speaking and eight English-speaking caregivers were videotaped while interacting spontaneously with their children.…

  6. Virtual Reality and Its Potential Use in Special Education. Identifying Emerging Issues and Trends in Technology for Special Education.

    Science.gov (United States)

    Woodward, John

    As part of a 3-year study to identify emerging issues and trends in technology for special education, this paper addresses the possible contributions of virtual reality technology to educational services for students with disabilities. An example of the use of virtual reality in medical imaging introduces the paper and leads to a brief review of…

  7. Identifying potential types of guidance for supporting student inquiry when using virtual and remote labs in science: a literature review

    NARCIS (Netherlands)

    Zacharia, Zacharias C.; Manoli, Constantinos; Xenofontos, Nikoletta; de Jong, Anthonius J.M.; Pedaste, Margus; van Riesen, Siswa; Kamp, E.T.; Kamp, Ellen T.; Mäeots, Mario; Siiman, Leo; Tsourlidaki, Eleftheria

    2015-01-01

    The aim of this review is to identify specific types of guidance for supporting student use of online labs, that is, virtual and remote labs, in an inquiry context. To do so, we reviewed the literature on providing guidance within computer supported inquiry learning (CoSIL) environments in science

  8. Identifying deliberate attempts to fake memory impairment through the combined use of reaction time and event-related potential measures

    NARCIS (Netherlands)

    van Hooff, Johanna C.; Sargeant, Elizabeth; Foster, Jonathan K.; Schmand, Ben A.

    2009-01-01

    The central aim of this study was to evaluate the value of reaction time (RT) measures and event-related potentials (ERPs) for the assessment of simulated memory impairment. In two identical experiments (N = 24), healthy volunteers carried out an adapted version of the Amsterdam Short-Term Memory

  9. Global analysis of WRKY transcription factor superfamily in Setaria identifies potential candidates involved in abiotic stress signaling

    OpenAIRE

    Muthamilarasan, Mehanathan; Bonthala, Venkata S.; Khandelwal, Rohit; Jaishankar, Jananee; Shweta, Shweta; Nawaz, Kashif; Prasad, Manoj

    2015-01-01

    Transcription factors (TFs) are major players in stress signalling and constitute an integral part of signalling networks. Among the major TFs, WRKY proteins play pivotal roles in regulation of transcriptional reprogramming associated with stress responses. In view of this, genome- and transcriptome-wide identification of WRKY TF family was performed in the C4 model plants, Setaria italica (SiWRKY) and S. viridis (SvWRKY), respectively. The study identified 105 SiWRKY and 44 SvWRKY proteins t...

  10. Genome-wide association study to identify potential genetic modifiers in a canine model for Duchenne muscular dystrophy.

    Science.gov (United States)

    Brinkmeyer-Langford, Candice; Balog-Alvarez, Cynthia; Cai, James J; Davis, Brian W; Kornegay, Joe N

    2016-08-22

    Duchenne muscular dystrophy (DMD) causes progressive muscle degeneration, cardiomyopathy and respiratory failure in approximately 1/5,000 boys. Golden Retriever muscular dystrophy (GRMD) resembles DMD both clinically and pathologically. Like DMD, GRMD exhibits remarkable phenotypic variation among affected dogs, suggesting the influence of modifiers. Understanding the role(s) of genetic modifiers of GRMD may identify genes and pathways that also modify phenotypes in DMD and reveal novel therapies. Therefore, our objective in this study was to identify genetic modifiers that affect discrete GRMD phenotypes. We performed a linear mixed-model (LMM) analysis using 16 variably-affected dogs from our GRMD colony (8 dystrophic, 8 non-dystrophic). All of these dogs were either full or half-siblings, and phenotyped for 19 objective, quantitative biomarkers at ages 6 and 12 months. Each biomarker was individually assessed. Gene expression profiles of 59 possible candidate genes were generated for two muscle types: the cranial tibialis and medial head of the gastrocnemius. SNPs significantly associated with GRMD biomarkers were identified on multiple chromosomes (including the X chromosome). Gene expression levels for candidate genes located near these SNPs correlated with biomarker values, suggesting possible roles as GRMD modifiers. The results of this study enhance our understanding of GRMD pathology and represent a first step toward the characterization of GRMD modifiers that may be relevant to DMD pathology. Such modifiers are likely to be useful for DMD treatment development based on their relationships to GRMD phenotypes.

  11. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  12. Puerto Rico Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  13. USVI Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  14. Benefits of Photosimulation and Sensor Fusion for Threat Detection

    National Research Council Canada - National Science Library

    Bankowski, E; Bednarz, D; Bryk, D; Jozwiak, R; Lane, K; Meitzler, T; Sohn, E. J

    2003-01-01

    .... Detecting potential threats that are camouflaged or difficult to see is important not only for military acquisition problems but, also for crowd surveillance as well as tactical use such as on border patrols...

  15. Computer security threats faced by small businesses in Australia

    OpenAIRE

    Hutchings, Alice

    2012-01-01

    In this paper, an overview is provided of computer security threats faced by small businesses. Having identified the threats, the implications for small business owners are described, along with countermeasures that can be adopted to prevent incidents from occurring. The results of the Australian Business Assessment of Computer User Security (ABACUS) survey, commissioned by the Australian Institute of Criminology (AIC), are drawn upon to identify key risks (Challice 2009; Richards 2009). Addi...

  16. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  17. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  18. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  19. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  20. Crowd-sourced Ontology for Photoleukocoria: Identifying Common Internet Search Terms for a Potentially Important Pediatric Ophthalmic Sign.

    Science.gov (United States)

    Staffieri, Sandra E; Kearns, Lisa S; Sanfilippo, Paul G; Craig, Jamie E; Mackey, David A; Hewitt, Alex W

    2018-02-01

    Leukocoria is the most common presenting sign for pediatric eye disease including retinoblastoma and cataract, with worse outcomes if diagnosis is delayed. We investigated whether individuals could identify leukocoria in photographs (photoleukocoria) and examined their subsequent Internet search behavior. Using a web-based questionnaire, in this cross-sectional study we invited adults aged over 18 years to view two photographs of a child with photoleukocoria, and then search the Internet to determine a possible diagnosis and action plan. The most commonly used search terms and websites accessed were recorded. The questionnaire was completed by 1639 individuals. Facebook advertisement was the most effective recruitment strategy. The mean age of all respondents was 38.95 ± 14.59 years (range, 18-83), 94% were female, and 59.3% had children. An abnormality in the images presented was identified by 1613 (98.4%) participants. The most commonly used search terms were: "white," "pupil," "photo," and "eye" reaching a variety of appropriate websites or links to print or social media articles. Different words or phrases were used to describe the same observation of photoleukocoria leading to a range of websites. Variations in the description of observed signs and search words influenced the sites reached, information obtained, and subsequent help-seeking intentions. Identifying the most commonly used search terms for photoleukocoria is an important step for search engine optimization. Being directed to the most appropriate websites informing of the significance of photoleukocoria and the appropriate actions to take could improve delays in diagnosis of important pediatric eye disease such as retinoblastoma or cataract.

  1. Kennecott Utah Copper Corporation: Facility Utilizes Energy Assessments to Identify $930,000 in Potential Annual Savings

    Energy Technology Data Exchange (ETDEWEB)

    2004-07-01

    Kennecott Utah Copper Corporation (KUCC) used targeted energy assessments in the smelter and refinery at its Bingham Canyon Mine, near Salt Lake City, Utah. The assessment focused mainly on the energy-intensive processes of copper smelting and refining. By implementing the projects identified, KUCC could realize annual cost savings of $930,000 and annual energy savings of 452,000 MMBtu. The projects would also reduce maintenance, repair costs, waste, and environmental emissions. One project would use methane gas from an adjacent municipal dump to replace natural gas currently used to heat the refinery electrolyte.

  2. Proteomic profiling of mammary carcinomas identifies C7orf24, a gamma-glutamyl cyclotransferase, as a potential cancer biomarker

    DEFF Research Database (Denmark)

    Gromov, Pavel; Gromova, Irina; Friis, Esbern

    2010-01-01

    Breast cancer is the leading cause of cancer deaths in women today and is the most common cancer (excluding skin cancers) among women in the Western world. Although cancers detected by screening mammography are significantly smaller than nonscreening ones, noninvasive biomarkers for detection......, and a novel protein, C7orf24, was identified as being upregulated in cancer cells. Protein expression levels of C7orf24 were evaluated by immunohistochemical assays to qualify deregulation of this protein. Analysis of C7orf24 expression showed up-regulation in 36.4 and 23.4% of cases present in the discovery...

  3. The sound of danger: threat sensitivity to predator vocalizations, alarm calls, and novelty in gulls.

    Directory of Open Access Journals (Sweden)

    Sarah A MacLean

    Full Text Available The threat sensitivity hypothesis predicts that organisms will evaluate the relative danger of and respond differentially to varying degrees of predation threat. Doing so allows potential prey to balance the costs and benefits of anti-predator behaviors. Threat sensitivity has undergone limited testing in the auditory modality, and the relative threat level of auditory cues from different sources is difficult to infer across populations when variables such as background risk and experience are not properly controlled. We experimentally exposed a single population of two sympatric gull species to auditory stimuli representing a range of potential threats in order to compare the relative threat of heterospecific alarm calls, conspecific alarms calls, predator vocalizations, and novel auditory cues. Gulls were able to discriminate among a diverse set of threat indicators and respond in a graded manner commensurate with the level of threat. Vocalizations of two potential predators, the human voice and bald eagle call, differed in their threat level compared to each other and to alarm calls. Conspecific alarm calls were more threatening than heterospecfic alarm calls to the larger great black-backed gull, but the smaller herring gull weighed both equally. A novel cue elicited a response intermediate between known threats and a known non-threat in herring gulls, but not great black-backed gulls. Our results show that the relative threat level of auditory cues from different sources is highly species-dependent, and that caution should be exercised when comparing graded and threshold threat sensitive responses.

  4. An in silico high-throughput screen identifies potential selective inhibitors for the non-receptor tyrosine kinase Pyk2

    Directory of Open Access Journals (Sweden)

    Meirson T

    2017-05-01

    Full Text Available Tomer Meirson, Abraham O Samson, Hava Gil-Henn Faculty of Medicine in the Galilee, Bar-Ilan University, Safed, Israel Abstract: The non-receptor tyrosine kinase proline-rich tyrosine kinase 2 (Pyk2 is a critical mediator of signaling from cell surface growth factor and adhesion receptors to cell migration, proliferation, and survival. Emerging evidence indicates that signaling by Pyk2 regulates hematopoietic cell response, bone density, neuronal degeneration, angiogenesis, and cancer. These physiological and pathological roles of Pyk2 warrant it as a valuable therapeutic target for invasive cancers, osteoporosis, Alzheimer’s disease, and inflammatory cellular response. Despite its potential as a therapeutic target, no potent and selective inhibitor of Pyk2 is available at present. As a first step toward discovering specific potential inhibitors of Pyk2, we used an in silico high-throughput screening approach. A virtual library of six million lead-like compounds was docked against four different high-resolution Pyk2 kinase domain crystal structures and further selected for predicted potency and ligand efficiency. Ligand selectivity for Pyk2 over focal adhesion kinase (FAK was evaluated by comparative docking of ligands and measurement of binding free energy so as to obtain 40 potential candidates. Finally, the structural flexibility of a subset of the docking complexes was evaluated by molecular dynamics simulation, followed by intermolecular interaction analysis. These compounds may be considered as promising leads for further development of highly selective Pyk2 inhibitors. Keywords: virtual screen, efficiency metrics, MM-GBSA, molecular dynamics

  5. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  6. Proteomic profiling of mammary carcinomas identifies C7orf24, a gamma-glutamyl cyclotransferase, as a potential cancer biomarker

    DEFF Research Database (Denmark)

    Gromov, Pavel; Gromova, Irina; Friis, Esbern

    2010-01-01

    Breast cancer is the leading cause of cancer deaths in women today and is the most common cancer (excluding skin cancers) among women in the Western world. Although cancers detected by screening mammography are significantly smaller than nonscreening ones, noninvasive biomarkers for detection...... in different types of cancer suggests deregulation of C7orf24 to be a general event in epithelial carcinogenesis, indicating that this protein may play an important role in cancer cell biology and thus constitute a novel therapeutic target. Furthermore, as C7orf24 is externalized to the tissue extracellular...... fluid and can be detected in serum, this protein also represents a potential serological marker....

  7. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  8. Kinome expression profiling of human neuroblastoma tumors identifies potential drug targets for ultra high-risk patients.

    Science.gov (United States)

    Russo, Roberta; Cimmino, Flora; Pezone, Lucia; Manna, Francesco; Avitabile, Marianna; Langella, Concetta; Koster, Jan; Casale, Fiorina; Raia, Maddalena; Viola, Giampietro; Fischer, Matthias; Iolascon, Achille; Capasso, Mario

    2017-10-01

    Neuroblastoma (NBL) accounts for >7% of malignancies in patients younger than 15 years. Low- and intermediate-risk patients exhibit excellent or good prognosis after treatment, whereas for high-risk (HR) patients, the estimated 5-year survival rates is still <40%. The ability to stratify HR patients that will not respond to standard treatment strategies is critical for informed treatment decisions. In this study, we have generated a specific kinome gene signature, named Kinome-27, which is able to identify a subset of HR-NBL tumors, named ultra-HR NBL, with highly aggressive clinical behavior that not adequately respond to standard treatments. We have demonstrated that NBL cell lines expressing the same kinome signature of ultra-HR tumors (ultra-HR-like cell lines) may be selectively targeted by the use of two drugs [suberoylanilide hydroxamic acid (SAHA) and Radicicol], and that the synergic combination of these drugs is able to block the ultra-HR-like cells in G2/M phase of cell cycle. The use of our signature in clinical practice will allow identifying patients with negative outcome, which would benefit from new and more personalized treatments. Preclinical in vivo studies are needed to consolidate the SAHA and Radicicol treatment in ultra-HR NBL patients. © The Author 2017. Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  9. cDNA Library Screening Identifies Protein Interactors Potentially Involved in Non-telomeric Roles of Arabidopsis Telomerase

    Directory of Open Access Journals (Sweden)

    Ladislav eDokládal

    2015-11-01

    Full Text Available Telomerase-reverse transcriptase (TERT plays an essential catalytic role in maintaining telomeres. However, in animal systems telomerase plays additional non-telomeric functional roles. We previously screened an Arabidopsis cDNA library for proteins that interact with the C-terminal extension (CTE TERT domain and identified a nuclear-localized protein that contains a RNA recognition motif (RRM. This RRM-protein forms homodimers in both plants and yeast. Mutation of the gene encoding the RRM-protein had no detectable effect on plant growth and development, nor did it affect telomerase activity or telomere length in vivo, suggesting a non-telomeric role for TERT/RRM-protein complexes. The gene encoding the RRM-protein is highly expressed in leaf and reproductive tissues. We further screened an Arabidopsis cDNA library for proteins that interact with the RRM-protein and identified five interactors. These proteins are involved in numerous non-telomere-associated cellular activities. In plants, the RRM-protein, both alone and in a complex with its interactors, localizes to nuclear speckles. Transcriptional analyses in wild-type and rrm mutant plants, as well as transcriptional co-analyses, suggest that TERT, the RRM-protein, and the RRM-protein interactors may play important roles in non-telomeric cellular functions.

  10. Decentralised bioenergy systems: A review of opportunities and threats

    International Nuclear Information System (INIS)

    Mangoyana, Robert B.; Smith, Timothy F.

    2011-01-01

    Decentralised bioenergy systems are receiving increasing attention due to the potential ability to support local development, create local employment, and contribute to climate change mitigation. These issues, along with other bioenergy sustainability issues, are reviewed through eighteen international case studies with the objective of identifying opportunities and threats to decentralised bioenergy systems. The case studies were selected based on feedstock type, bioenergy type, production capacity, synergistic alliances, ownership structure and physical locations. This variation was used to provide a basis for evaluating opportunities and threats from different contexts. Commercial viability remains the primary concern for the sustainability of decentralised bioenergy systems. There are, however, opportunities for compounding benefits through integrating small scale decentralised bioenergy systems with other production systems. Integrated production, including closed loop models, allow waste materials from one process to be used as inputs in other production processes, and thereby increasing economic, social and environmental outcomes. Synergistic opportunities along the bioenergy production chain, which include feedstock production, bioenergy marketing and distribution could also be exploited by communities and other investors to minimise decentralised production risk. - Research Highlights: → Small scale decentralised bioenergy production is a potentially sustainable energy system. →Economic viability limits small scale decentralised bioenergy production. → Synergistic alliances along the bioenergy production chain could enhance viability.

  11. Environmental metabolomics: a SWOT analysis (strengths, weaknesses, opportunities, and threats).

    Science.gov (United States)

    Miller, Marion G

    2007-02-01

    Metabolomic approaches have the potential to make an exceptional contribution to understanding how chemicals and other environmental stressors can affect both human and environmental health. However, the application of metabolomics to environmental exposures, although getting underway, has not yet been extensively explored. This review will use a SWOT analysis model to discuss some of the strengths, weaknesses, opportunities, and threats that are apparent to an investigator venturing into this relatively new field. SWOT has been used extensively in business settings to uncover new outlooks and identify problems that would impede progress. The field of environmental metabolomics provides great opportunities for discovery, and this is recognized by a high level of interest in potential applications. However, understanding the biological consequence of environmental exposures can be confounded by inter- and intra-individual differences. Metabolomic profiles can yield a plethora of data, the interpretation of which is complex and still being evaluated and researched. The development of the field will depend on the availability of technologies for data handling and that permit ready access metabolomic databases. Understanding the relevance of metabolomic endpoints to organism health vs adaptation vs variation is an important step in understanding what constitutes a substantive environmental threat. Metabolomic applications in reproductive research are discussed. Overall, the development of a comprehensive mechanistic-based interpretation of metabolomic changes offers the possibility of providing information that will significantly contribute to the protection of human health and the environment.

  12. Potential use of multispectral imaging technology to identify moisture content and water-holding capacity in cooked pork sausages.

    Science.gov (United States)

    Ma, Fei; Zhang, Bin; Wang, Wu; Li, Peijun; Niu, Xiangli; Chen, Conggui; Zheng, Lei

    2018-03-01

    The traditional detection methods for moisture content (MC) and water-holding capacity (WHC) in cooked pork sausages (CPS) are destructive, time consuming, require skilled personnel and are not suitable for online industry applications. The goal of this work was to explore the potential of multispectral imaging (MSI) in combination with multivariate analysis for the identification of MC and WHC in CPS. Spectra and textures of 156 CPS treated by six salt concentrations (0-2.5%) were analyzed using different calibration models to find the most optimal results of predicting MC and WHC in CPS. By using the fused data of spectra and textures, partial least squares regression models performed well for determining the MC and WHC, with a correlation coefficient (r) of 0.949 and 0.832, respectively. Additionally, their spatial distribution in CPS could be visualized via applying prediction equations to transfer each pixel in the image. Results of satisfactory detection and visualization of the MC and WHC showed that MSI has the potential to serve as a rapid and non-destructive method for use in sausage industry. © 2017 Society of Chemical Industry. © 2017 Society of Chemical Industry.

  13. Towards Quantitative Optical Cross Sections in Entomological Laser Radar - Potential of Temporal and Spherical Parameterizations for Identifying Atmospheric Fauna.

    Directory of Open Access Journals (Sweden)

    Mikkel Brydegaard

    Full Text Available In recent years, the field of remote sensing of birds and insects in the atmosphere (the aerial fauna has advanced considerably, and modern electro-optic methods now allow the assessment of the abundance and fluxes of pests and beneficials on a landscape scale. These techniques have the potential to significantly increase our understanding of, and ability to quantify and manage, the ecological environment. This paper presents a concept whereby laser radar observations of atmospheric fauna can be parameterized and table values for absolute cross sections can be catalogued to allow for the study of focal species such as disease vectors and pests. Wing-beat oscillations are parameterized with a discrete set of harmonics and the spherical scatter function is parameterized by a reduced set of symmetrical spherical harmonics. A first order spherical model for insect scatter is presented and supported experimentally, showing angular dependence of wing beat harmonic content. The presented method promises to give insights into the flight heading directions of species in the atmosphere and has the potential to shed light onto the km-range spread of pests and disease vectors.

  14. High-protein goat's milk diet identified through newborn screening: clinical warning of a potentially dangerous dietetic practice.

    Science.gov (United States)

    Maines, Evelina; Gugelmo, Giorgia; Tadiotto, Elisa; Pietrobelli, Angelo; Campostrini, Natascia; Pasini, Andrea; Ion-Popa, Florina; Vincenzi, Monica; Teofoli, Francesca; Camilot, Marta; Bordugo, Andrea

    2017-10-01

    Breast-feeding is an unequalled way of providing optimal food for infants' healthy growth and development and the WHO recommends that infants should be exclusively breast-fed for the first 6 months of life. For mothers who are unable to breast-feed or who decide not to, infant formulas are the safest alternative. Despite recommendations, it is possible that parents make potentially harmful nutritional choices for their children because of cultural beliefs or misinformation on infant nutrition. We describe a possible health risk of not breast-feeding, highlighting a potentially dangerous dietetic practice. Design/Setting/Subjects We report the case of a newborn who was fed with undiluted goat's milk because her mother could not breast-feed and was not aware of infant formulas. The dietary mistake was detected because of a positive expanded newborn screening result, characterized by severe hypertyrosinaemia with high methionine and phenylalanine levels, a pattern suggestive of severe liver impairment. The pattern of plasma amino acids was related to a goat's milk diet, because of its very different composition compared with human milk and infant formula. Our experience demonstrates that, when breast-feeding is not possible or is not exclusive, infants may be at risk of dangerous nutritional practices, including diets with very high protein content, such as a goat's milk diet. Families of not breast-fed infants may need appropriate advice on safe alternatives for infant nutrition to avoid the risks of inappropriate diets.

  15. Genome-wide analysis of gene expression and protein secretion of Babesia canis during virulent infection identifies potential pathogenicity factors.

    Science.gov (United States)

    Eichenberger, Ramon M; Ramakrishnan, Chandra; Russo, Giancarlo; Deplazes, Peter; Hehl, Adrian B

    2017-06-13

    Infections of dogs with virulent strains of Babesia canis are characterized by rapid onset and high mortality, comparable to complicated human malaria. As in other apicomplexan parasites, most Babesia virulence factors responsible for survival and pathogenicity are secreted to the host cell surface and beyond where they remodel and biochemically modify the infected cell interacting with host proteins in a very specific manner. Here, we investigated factors secreted by B. canis during acute infections in dogs and report on in silico predictions and experimental analysis of the parasite's exportome. As a backdrop, we generated a fully annotated B. canis genome sequence of a virulent Hungarian field isolate (strain BcH-CHIPZ) underpinned by extensive genome-wide RNA-seq analysis. We find evidence for conserved factors in apicomplexan hemoparasites involved in immune-evasion (e.g. VESA-protein family), proteins secreted across the iRBC membrane into the host bloodstream (e.g. SA- and Bc28 protein families), potential moonlighting proteins (e.g. profilin and histones), and uncharacterized antigens present during acute crisis in dogs. The combined data provides a first predicted and partially validated set of potential virulence factors exported during fatal infections, which can be exploited for urgently needed innovative intervention strategies aimed at facilitating diagnosis and management of canine babesiosis.

  16. The Health Informatics Trial Enhancement Project (HITE: Using routinely collected primary care data to identify potential participants for a depression trial

    Directory of Open Access Journals (Sweden)

    Lyons Ronan A

    2010-04-01

    Full Text Available Abstract Background Recruitment to clinical trials can be challenging. We identified anonymous potential participants to an existing pragmatic randomised controlled depression trial to assess the feasibility of using routinely collected data to identify potential trial participants. We discuss the strengths and limitations of this approach, assess its potential value, report challenges and ethical issues encountered. Methods Swansea University's Health Information Research Unit's Secure Anonymised Information Linkage (SAIL database of routinely collected health records was interrogated, using Structured Query Language (SQL. Read codes were used to create an algorithm of inclusion/exclusion criteria with which to identify suitable anonymous participants. Two independent clinicians rated the eligibility of the potential participants' identified. Inter-rater reliability was assessed using the kappa statistic and inter-class correlation. Results The study population (N = 37263 comprised all adults registered at five general practices in Swansea UK. Using the algorithm 867 anonymous potential participants were identified. The sensitivity and specificity results > 0.9 suggested a high degree of accuracy from the algorithm. The inter-rater reliability results indicated strong agreement between the confirming raters. The Intra Class Correlation Coefficient (Cronbach's Alpha > 0.9, suggested excellent agreement and Kappa coefficient > 0.8; almost perfect agreement. Conclusions This proof of concept study showed that routinely collected primary care data can be used to identify potential participants for a pragmatic randomised controlled trial of folate augmentation of antidepressant therapy for the treatment of depression. Further work will be needed to assess generalisability to other conditions and settings and the inclusion of this approach to support Electronic Enhanced Recruitment (EER.

  17. Identifying potential differences in ontogentic ages between modern and archaeological Nacella deaurata shells, Tierra del Fuego, Argentina

    Science.gov (United States)

    Surge, D. M.; Godino, I. B. I.; Álvarez, M.; López, M. B. I.

    2017-12-01

    Patelloid limpet shells are common constituents of rocky shore habitats along the eastern Atlantic basin and are often found in archaeological shell middens. Nacella deaurata is an intertidal species found in the Magellanic Province along the southern tip of South America. Recent discoveries of archaeological shell middens in Tierra del Fuego, Argentina, identify N. deaurata as one of the abundant shells in these deposits. Preliminary observations reveal that modern N. deaurata shells achieve larger sizes compared to those found in the archaeological middens. Here, we provide preliminary data to test the hypothesis that the larger, modern specimens grow to older ontogenetic ages than the smaller archaeological specimens. Our results may provide insights into harvesting pressures on this species during the time when the archaeological sites were inhabited. Understanding their annual growth patterns also has important implications for generating oxygen isotope proxy data to reconstruct seasonal variation in sea surface temperature.

  18. Analysis of copy number variations in Holstein cows identify potential mechanisms contributing to differences in residual feed intake.

    Science.gov (United States)

    Hou, Yali; Bickhart, Derek M; Chung, Hoyoung; Hutchison, Jana L; Norman, H Duane; Connor, Erin E; Liu, George E

    2012-11-01

    Genomic structural variation is an important and abundant source of genetic and phenotypic variation. In this study, we performed an initial analysis of copy number variations (CNVs) using BovineHD SNP genotyping data from 147 Holstein cows identified as having high or low feed efficiency as estimated by residual feed intake (RFI). We detected 443 candidate CNV regions (CNVRs) that represent 18.4 Mb (0.6 %) of the genome. To investigate the functional impacts of CNVs, we created two groups of 30 individual animals with extremely low or high estimated breeding values (EBVs) for RFI, and referred to these groups as low intake (LI; more efficient) or high intake (HI; less efficient), respectively. We identified 240 (~9.0 Mb) and 274 (~10.2 Mb) CNVRs from LI and HI groups, respectively. Approximately 30-40 % of the CNVRs were specific to the LI group or HI group of animals. The 240 LI CNVRs overlapped with 137 Ensembl genes. Network analyses indicated that the LI-specific genes were predominantly enriched for those functioning in the inflammatory response and immunity. By contrast, the 274 HI CNVRs contained 177 Ensembl genes. Network analyses indicated that the HI-specific genes were particularly involved in the cell cycle, and organ and bone development. These results relate CNVs to two key variables, namely immune response and organ and bone development. The data indicate that greater feed efficiency relates more closely to immune response, whereas cattle with reduced feed efficiency may have a greater capacity for organ and bone development.

  19. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  20. Water Privatization: A Threat to Human Rights?

    OpenAIRE

    Pavelich, Kelly

    2017-01-01

    In developing countries, women often have responsibilities that are water dependent, such as collecting water and tending to the sick (Sewpaul, 2008: 45) As unpolluted water supplies diminish, these tasks become increasingly difficult to accomplish. Women face greater threats to their security as they are forced to walk farther, occasionally into dangerous areas, and lose several hours of their day, potentially reducing the household income and resulting in missed economic opportunities (Sewp...

  1. Measurement of compartment elasticity using pressure related ultrasound: a method to identify patients with potential compartment syndrome.

    Science.gov (United States)

    Sellei, R M; Hingmann, S J; Kobbe, P; Weber, C; Grice, J E; Zimmerman, F; Jeromin, S; Gansslen, A; Hildebrand, F; Pape, H C

    2015-01-01

    PURPOSE OF THE STUDY Decision-making in treatment of an acute compartment syndrome is based on clinical assessment, supported by invasive monitoring. Thus, evolving compartment syndrome may require repeated pressure measurements. In suspected cases of potential compartment syndromes clinical assessment alone seems to be unreliable. The objective of this study was to investigate the feasibility of a non-invasive application estimating whole compartmental elasticity by ultrasound, which may improve accuracy of diagnostics. MATERIAL AND METHODS In an in-vitro model, using an artificial container simulating dimensions of the human anterior tibial compartment, intracompartmental pressures (p) were raised subsequently up to 80 mm Hg by infusion of saline solution. The compartmental depth (mm) in the cross-section view was measured before and after manual probe compression (100 mm Hg) upon the surface resulting in a linear compartmental displacement (Δd). This was repeated at rising compartmental pressures. The resulting displacements were related to the corresponding intra-compartmental pressures simulated in our model. A hypothesized relationship between pressures related compartmental displacement and the elasticity at elevated compartment pressures was investigated. RESULTS With rising compartmental pressures, a non-linear, reciprocal proportional relation between the displacement (mm) and the intra-compartmental pressure (mm Hg) occurred. The Pearson's coefficient showed a high correlation (r2 = -0.960). The intraobserver reliability value kappa resulted in a statistically high reliability (κ = 0.840). The inter-observer value indicated a fair reliability (κ = 0.640). CONCLUSIONS Our model reveals that a strong correlation between compartmental strain displacements assessed by ultrasound and the intra-compartmental pressure changes occurs. Further studies are required to prove whether this assessment is transferable to human muscle tissue. Determining the complete

  2. Gene expression profiling to identify potentially relevant disease outcomes and support human health risk assessment for carbon black nanoparticle exposure.

    Science.gov (United States)

    Bourdon, Julie A; Williams, Andrew; Kuo, Byron; Moffat, Ivy; White, Paul A; Halappanavar, Sabina; Vogel, Ulla; Wallin, Håkan; Yauk, Carole L

    2013-01-07

    New approaches are urgently needed to evaluate potential hazards posed by exposure to nanomaterials. Gene expression profiling provides information on potential modes of action and human relevance, and tools have recently become available for pathway-based quantitative risk assessment. The objective of this study was to use toxicogenomics in the context of human health risk assessment. We explore the utility of toxicogenomics in risk assessment, using published gene expression data from C57BL/6 mice exposed to 18, 54 and 162 μg Printex 90 carbon black nanoparticles (CBNP). Analysis of CBNP-perturbed pathways, networks and transcription factors revealed concomitant changes in predicted phenotypes (e.g., pulmonary inflammation and genotoxicity), that correlated with dose and time. Benchmark doses (BMDs) for apical endpoints were comparable to minimum BMDs for relevant pathway-specific expression changes. Comparison to inflammatory lung disease models (i.e., allergic airway inflammation, bacterial infection and tissue injury and fibrosis) and human disease profiles revealed that induced gene expression changes in Printex 90 exposed mice were similar to those typical for pulmonary injury and fibrosis. Very similar fibrotic pathways were perturbed in CBNP-exposed mice and human fibrosis disease models. Our synthesis demonstrates how toxicogenomic profiles may be used in human health risk assessment of nanoparticles and constitutes an important step forward in the ultimate recognition of toxicogenomic endpoints in human health risk. As our knowledge of molecular pathways, dose-response characteristics and relevance to human disease continues to grow, we anticipate that toxicogenomics will become increasingly useful in assessing chemical toxicities and in human health risk assessment. Crown Copyright © 2012. Published by Elsevier Ireland Ltd. All rights reserved.

  3. Identifying Threats Using Graph-based Anomaly Detection

    Science.gov (United States)

    Eberle, William; Holder, Lawrence; Cook, Diane

    Much of the data collected during the monitoring of cyber and other infrastructures is structural in nature, consisting of various types of entities and relationships between them. The detection of threatening anomalies in such data is crucial to protecting these infrastructures. We present an approach to detecting anomalies in a graph-based representation of such data that explicitly represents these entities and relationships. The approach consists of first finding normative patterns in the data using graph-based data mining and then searching for small, unexpected deviations to these normative patterns, assuming illicit behavior tries to mimic legitimate, normative behavior. The approach is evaluated using several synthetic and real-world datasets. Results show that the approach has high truepositive rates, low false-positive rates, and is capable of detecting complex structural anomalies in real-world domains including email communications, cellphone calls and network traffic.

  4. Potential sources of Triatoma infestans reinfesting peridomiciles identified by morphological characterization in Los Llanos, La Rioja, Argentina

    Directory of Open Access Journals (Sweden)

    María Laura Hernández

    2013-02-01

    Full Text Available The presence of Triatoma infestans in habitats treated with insecticides constitutes a frequent problem in endemic areas. Basing our study on the hypothesis that descendants of a residual population should be more similar to the pre-treatment population than to any other, we compared the indications of two quantitative morphological approaches. This study seeks to find the origin of 247 T. infestans from three populations found in two chicken coops and a goat corral after treatment with insecticides. The results obtained by quantitative morphology suggest that the T. infestans found between three-34 months after the application of insecticides formed mixed populations with insects derived from residual foci and neighbouring habitats. Our analyses also showed the presence of a phenotype which does not resemble neither the pre-treatment phenotype nor the one from neighbouring populations, suggesting the presence of a particular post-treatment phenotype. The heads size showed some variations in males from different populations and remained unchanged in females, which reinforces the hypothesis of an intraspecific competition for food with priority for females. This article presents, for the first time, the combined analysis of geometric morphometry of heads and antennal phenotypes to identify the composition of reinfesting populations.

  5. Global transcriptomic profiling of aspen trees under elevated [CO2] to identify potential molecular mechanisms responsible for enhanced radial growth.

    Science.gov (United States)

    Wei, Hairong; Gou, Jiqing; Yordanov, Yordan; Zhang, Huaxin; Thakur, Ramesh; Jones, Wendy; Burton, Andrew

    2013-03-01

    Aspen (Populus tremuloides) trees growing under elevated [CO(2)] at a free-air CO(2) enrichment (FACE) site produced significantly more biomass than control trees. We investigated the molecular mechanisms underlying the observed increase in biomass by producing transcriptomic profiles of the vascular cambium zone (VCZ) and leaves, and then performed a comparative study to identify significantly changed genes and pathways after 12 years exposure to elevated [CO(2)]. In leaves, elevated [CO(2)] enhanced expression of genes related to Calvin cycle activity and linked pathways. In the VCZ, the pathways involved in cell growth, cell division, hormone metabolism, and secondary cell wall formation were altered while auxin conjugation, ABA synthesis, and cytokinin glucosylation and degradation were inhibited. Similarly, the genes involved in hemicellulose and pectin biosynthesis were enhanced, but some genes that catalyze important steps in lignin biosynthesis pathway were inhibited. Evidence from systemic analysis supported the functioning of multiple molecular mechanisms that underpin the enhanced radial growth in response to elevated [CO(2)].

  6. Comprehensive Analysis of the COBRA-Like (COBL) Gene Family in Gossypium Identifies Two COBLs Potentially Associated with Fiber Quality

    Science.gov (United States)

    Niu, Erli; Shang, Xiaoguang; Cheng, Chaoze; Bao, Jianghao; Zeng, Yanda; Cai, Caiping; Du, Xiongming; Guo, Wangzhen

    2015-01-01

    COBRA-Like (COBL) genes, which encode a plant-specific glycosylphosphatidylinositol (GPI) anchored protein, have been proven to be key regulators in the orientation of cell expansion and cellulose crystallinity status. Genome-wide analysis has been performed in A. thaliana, O. sativa, Z. mays and S. lycopersicum, but little in Gossypium. Here we identified 19, 18 and 33 candidate COBL genes from three sequenced cotton species, diploid cotton G. raimondii, G. arboreum and tetraploid cotton G. hirsutum acc. TM-1, respectively. These COBL members were anchored onto 10 chromosomes in G. raimondii and could be divided into two subgroups. Expression patterns of COBL genes showed highly developmental and spatial regulation in G. hirsutum acc. TM-1. Of them, GhCOBL9 and GhCOBL13 were preferentially expressed at the secondary cell wall stage of fiber development and had significantly co-upregulated expression with cellulose synthase genes GhCESA4, GhCESA7 and GhCESA8. Besides, GhCOBL9 Dt and GhCOBL13 Dt were co-localized with previously reported cotton fiber quality quantitative trait loci (QTLs) and the favorable allele types of GhCOBL9 Dt had significantly positive correlations with fiber quality traits, indicating that these two genes might play an important role in fiber development. PMID:26710066

  7. IBT-based quantitative proteomics identifies potential regulatory proteins involved in pigmentation of purple sea cucumber, Apostichopus japonicus.

    Science.gov (United States)

    Xing, Lili; Sun, Lina; Liu, Shilin; Li, Xiaoni; Zhang, Libin; Yang, Hongsheng

    2017-09-01

    Sea cucumbers are an important economic species and exhibit high yield value among aquaculture animals. Purple sea cucumbers are very rare and beautiful and have stable hereditary patterns. In this study, isobaric tags (IBT) were first used to reveal the molecular mechanism of pigmentation in the body wall of the purple sea cucumber. We analyzed the proteomes of purple sea cucumber in early pigmentation stage (Pa), mid pigmentation stage (Pb) and late pigmentation stage (Pc), resulting in the identification of 5580 proteins, including 1099 differentially expressed proteins in Pb: Pa and 339 differentially expressed proteins in Pc: Pb. GO and KEGG analyses revealed possible differentially expressed proteins, including"melanogenesis", "melanosome", "melanoma", "pigment-biosynthetic process", "Epidermis development", "Ras-signaling pathway", "Wnt-signaling pathway", "response to UV light", and "tyrosine metabolism", involved in pigment synthesis and regulation in purple sea cucumbers. The large number of differentially expressed proteins identified here should be highly useful in further elucidating the mechanisms underlying pigmentation in sea cucumbers. Furthermore, these results may also provide the base for further identification of proteins involved in resistance mechanisms against melanoma, albinism, UV damage, and other diseases in sea cucumbers. Copyright © 2017. Published by Elsevier Inc.

  8. Gonad Transcriptome Analysis of the Pacific Oyster Crassostrea gigas Identifies Potential Genes Regulating the Sex Determination and Differentiation Process.

    Science.gov (United States)

    Yue, Chenyang; Li, Qi; Yu, Hong

    2018-04-01

    The Pacific oyster Crassostrea gigas is a commercially important bivalve in aquaculture worldwide. C. gigas has a fascinating sexual reproduction system consisting of dioecism, sex change, and occasional hermaphroditism, while knowledge of the molecular mechanisms of sex determination and differentiation is still limited. In this study, the transcriptomes of male and female gonads at different gametogenesis stages were characterized by RNA-seq. Hierarchical clustering based on genes differentially expressed revealed that 1269 genes were expressed specifically in female gonads and 817 genes were expressed increasingly over the course of spermatogenesis. Besides, we identified two and one gene modules related to female and male gonad development, respectively, using weighted gene correlation network analysis (WGCNA). Interestingly, GO and KEGG enrichment analysis showed that neurotransmitter-related terms were significantly enriched in genes related to ovary development, suggesting that the neurotransmitters were likely to regulate female sex differentiation. In addition, two hub genes related to testis development, lncRNA LOC105321313 and Cg-Sh3kbp1, and one hub gene related to ovary development, Cg-Malrd1-like, were firstly investigated. This study points out the role of neurotransmitter and non-coding RNA regulation during gonad development and produces lists of novel relevant candidate genes for further studies. All of these provided valuable information to understand the molecular mechanisms of C. gigas sex determination and differentiation.

  9. A follow-up study for left ventricular mass on chromosome 12p11 identifies potential candidate genes

    Directory of Open Access Journals (Sweden)

    Slifer Susan

    2011-07-01

    Full Text Available Abstract Background Left ventricular mass (LVM is an important risk factor for cardiovascular disease. Previously we found evidence for linkage to chromosome 12p11 in Dominican families, with a significant increase in a subset of families with high average waist circumference (WC. In the present study, we use association analysis to further study the genetic effect on LVM. Methods Association analysis with LVM was done in the one LOD critical region of the linkage peak in an independent sample of 897 Caribbean Hispanics. Genotype data were available on 7085 SNPs from 23 to 53 MB on chromosome 12p11. Adjustment was made for vascular risk factors and population substructure using an additive genetic model. Subset analysis by WC was performed to test for a difference in genetic effects between the high and low WC subsets. Results In the overall analysis, the most significant association was found to rs10743465, downstream of the SOX5 gene (p = 1.27E-05. Also, 19 additional SNPs had nominal p TMTC1. Twelve additional SNPs in or near 6 genes had p Conclusions The current study supports previously identified evidence by linkage for a genetic effect on LVM on chromosome 12p11 using association analysis in population-based Caribbean Hispanic cohort. SOX5 may play an important role in the regulation of LVM. An interaction of TMTC1 with abdominal obesity may contribute to phenotypic variation of LVM.

  10. Recombinant yeast screen for new inhibitors of human acetyl-CoA carboxylase 2 identifies potential drugs to treat obesity

    Science.gov (United States)

    Marjanovic, Jasmina; Chalupska, Dominika; Patenode, Caroline; Coster, Adam; Arnold, Evan; Ye, Alice; Anesi, George; Lu, Ying; Okun, Ilya; Tkachenko, Sergey; Haselkorn, Robert; Gornicki, Piotr

    2010-01-01

    Acetyl-CoA carboxylase (ACC) is a key enzyme of fatty acid metabolism with multiple isozymes often expressed in different eukaryotic cellular compartments. ACC-made malonyl-CoA serves as a precursor for fatty acids; it also regulates fatty acid oxidation and feeding behavior in animals. ACC provides an important target for new drugs to treat human diseases. We have developed an inexpensive nonradioactive high-throughput screening system to identify new ACC inhibitors. The screen uses yeast gene-replacement strains depending for growth on cloned human ACC1 and ACC2. In “proof of concept” experiments, growth of such strains was inhibited by compounds known to target human ACCs. The screen is sensitive and robust. Medium-size chemical libraries yielded new specific inhibitors of human ACC2. The target of the best of these inhibitors was confirmed with in vitro enzymatic assays. This compound is a new drug chemotype inhibiting human ACC2 with 2.8 μM IC50 and having no effect on human ACC1 at 100 μM. PMID:20439761

  11. Spatially extended versus frontal cerebral near-infrared spectroscopy during cardiac surgery: a case series identifying potential advantages

    Science.gov (United States)

    Rummel, Christian; Basciani, Reto; Nirkko, Arto; Schroth, Gerhard; Stucki, Monika; Reineke, David; Eberle, Balthasar; Kaiser, Heiko A.

    2018-01-01

    Stroke due to hypoperfusion or emboli is a devastating adverse event of cardiac surgery, but early detection and treatment could protect patients from an unfavorable postoperative course. Hypoperfusion and emboli can be detected with transcranial Doppler of the middle cerebral artery (MCA). The measured blood flow velocity correlates with cerebral oxygenation determined clinically by near-infrared spectroscopy (NIRS) of the frontal cortex. We tested the potential advantage of a spatially extended NIRS in detecting critical events in three cardiac surgery patients with a whole-head fiber holder of the FOIRE-3000 continuous-wave NIRS system. Principle components analysis was performed to differentiate between global and localized hypoperfusion or ischemic territories of the middle and anterior cerebral arteries. In one patient, we detected a critical hypoperfusion of the right MCA, which was not apparent in the frontal channels but was accompanied by intra- and postoperative neurological correlates of ischemia. We conclude that spatially extended NIRS of temporal and parietal vascular territories could improve the detection of critically low cerebral perfusion. Even in severe hemispheric stroke, NIRS of the frontal lobe may remain normal because the anterior cerebral artery can be supplied by the contralateral side directly or via the anterior communicating artery.

  12. Decreased Numbers of CD57+CD3- Cells Identify Potential Innate Immune Differences in Patients with Autism Spectrum Disorder.

    Science.gov (United States)

    Siniscalco, Dario; Mijatovic, Tatjana; Bosmans, Eugene; Cirillo, Alessandra; Kruzliak, Peter; Lombardi, Vincent C; De Meirleir, Kenny; Antonucci, Nicola

    2016-01-01

    Autism spectrum disorders (ASD) are complex, and severe heterogeneous neurodevelopmental pathologies with accepted but complex immune system abnormalities. Additional knowledge regarding potential immune dysfunctions may provide a greater understanding of this malady. The aim of this study was to evaluate the CD57(+)CD3(-) mature lymphocyte subpopulation of natural killer cells as a marker of immune dysfunction in ASD. Three-color flow cytometry-based analysis of fresh peripheral blood samples from children with autism was utilized to measure CD57(+)CD3(-) lymphocytes. A reduction of CD57(+)CD3(-) lymphocyte count was recorded in a significant number of patients with autism. We demonstrated that the number of peripheral CD57(+)CD3(-) cells in children with autism often falls below the clinically accepted normal range. This implies that a defect in the counter-regulatory functions necessary for balancing pro-inflammatory cytokines exists, thus opening the way to chronic inflammatory conditions associated with ASD. Copyright © 2016 International Institute of Anticancer Research (Dr. John G. Delinassios), All rights reserved.

  13. A Human Error Analysis Procedure for Identifying Potential Error Modes and Influencing Factors for Test and Maintenance Activities

    International Nuclear Information System (INIS)

    Kim, Jae Whan; Park, Jin Kyun

    2010-01-01

    Periodic or non-periodic test and maintenance (T and M) activities in large, complex systems such as nuclear power plants (NPPs) are essential for sustaining stable and safe operation of the systems. On the other hand, it also has been raised that human erroneous actions that might occur during T and M activities has the possibility of incurring unplanned reactor trips (RTs) or power derate, making safety-related systems unavailable, or making the reliability of components degraded. Contribution of human errors during normal and abnormal activities of NPPs to the unplanned RTs is known to be about 20% of the total events. This paper introduces a procedure for predictively analyzing human error potentials when maintenance personnel perform T and M tasks based on a work procedure or their work plan. This procedure helps plant maintenance team prepare for plausible human errors. The procedure to be introduced is focusing on the recurrent error forms (or modes) in execution-based errors such as wrong object, omission, too little, and wrong action

  14. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  15. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  16. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  17. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  18. Global Health Education: a cross-sectional study among German medical students to identify needs, deficits and potential benefits (Part 2 of 2: Knowledge gaps and potential benefits).

    Science.gov (United States)

    Bozorgmehr, Kayvan; Menzel-Severing, Johannes; Schubert, Kirsten; Tinnemann, Peter

    2010-10-08

    In Germany, educational deficits or potential benefits involved in global health education have not been analysed till now. We assess the importance medical students place on learning about social determinants of health (SDH) and assess their knowledge of global health topics in relation to (i) mobility patterns, their education in (ii) tropical medicine or (iii) global health. Cross-sectional study among medical students from all 36 medical schools in Germany using a web-based, semi-structured questionnaire. Participants were recruited via mailing-lists of students' unions, all medical students registered in 2007 were eligible to participate in the study. We captured international mobility patterns, exposure to global health learning opportunities and attitudes to learning about SDH. Both an objective and subjective knowledge assessment were performed. 1126 online-replies were received and analysed. International health electives in developing countries correlated significantly with a higher importance placed on all provided SDH (p ≤ 0.006). Participation in tropical medicine (p educational system' (p = 0.007) and the 'health system structure' (p = 0.007), while the item 'politics' was marginally significant (p = 0.053).In the knowledge assessment students achieved an average score of 3.6 (SD 1.5; Mdn 4.0), 75% achieved a score of 4.0 or less (Q25 = 3.0; Q75 = 4.0) from a maximum achievable score of 8.0. A better performance was associated with international health electives (p = 0.032), participation in tropical medicine (p = 0.038) and global health (p = 0.258) courses. The importance medical students in our sample placed on learning about SDH strongly interacts with students' mobility, and participation in tropical medicine and global health courses. The knowledge assessment revealed deficits and outlined needs to further analyse education gaps in global health. Developing concerted educational interventions aimed at fostering students' engagement with SDH

  19. Using satellite data to identify the causes of and potential solutions for yield gaps in India’s Wheat Belt

    Science.gov (United States)

    Jain, M.; Singh, Balwinder; Srivastava, A. A. K.; Malik, R. K.; McDonald, A. J.; Lobell, D. B.

    2017-09-01

    Food security will be increasingly challenged by climate change, natural resource degradation, and population growth. Wheat yields, in particular, have already stagnated in many regions and will be further affected by warming temperatures. Despite these challenges, wheat yields can be increased by improving management practices in regions with existing yield gaps. To identify the magnitude and causes of current yield gaps in India, one of the largest wheat producers globally, we produced 30 meter resolution yield maps from 2001 to 2015 across the Indo-Gangetic Plains (IGP), the nation’s main wheat belt. Yield maps were derived using a new method that translates satellite vegetation indices to yield estimates using crop model simulations, bypassing the need for ground calibration data. This is one of the first attempts to apply this method to a smallholder agriculture system, where ground calibration data are rarely available. We find that yields can be increased by 11% on average and up to 32% in the eastern IGP by improving management to current best practices within a given district. Additionally, if current best practices from the highest-yielding state of Punjab are implemented in the eastern IGP, yields could increase by almost 110%. Considering the factors that most influence yields, later sow dates and warmer temperatures are most associated with low yields across the IGP. This suggests that strategies to reduce the negative effects of heat stress, like earlier sowing and planting heat-tolerant wheat varieties, are critical to increasing wheat yields in this globally-important agricultural region.

  20. Plasma membrane proteomics of human breast cancer cell lines identifies potential targets for breast cancer diagnosis and treatment.

    Directory of Open Access Journals (Sweden)

    Yvonne S Ziegler

    Full Text Available The use of broad spectrum chemotherapeutic agents to treat breast cancer results in substantial and debilitating side effects, necessitating the development of targeted therapies to limit tumor proliferation and prevent metastasis. In recent years, the list of approved targeted therapies has expanded, and it includes both monoclonal antibodies and small molecule inhibitors that interfere with key proteins involved in the uncontrolled growth and migration of cancer cells. The targeting of plasma membrane proteins has been most successful to date, and this is reflected in the large representation of these proteins as targets of newer therapies. In view of these facts, experiments were designed to investigate the plasma membrane proteome of a variety of human breast cancer cell lines representing hormone-responsive, ErbB2 over-expressing and triple negative cell types, as well as a benign control. Plasma membranes were isolated by using an aqueous two-phase system, and the resulting proteins were subjected to mass spectrometry analysis. Overall, each of the cell lines expressed some unique proteins, and a number of proteins were expressed in multiple cell lines, but in patterns that did not always follow traditional clinical definitions of breast cancer type. From our data, it can be deduced that most cancer cells possess multiple strategies to promote uncontrolled growth, reflected in aberrant expression of tyrosine kinases, cellular adhesion molecules, and structural proteins. Our data set provides a very rich and complex picture of plasma membrane proteins present on breast cancer cells, and the sorting and categorizing of this data provides interesting insights into the biology, classification, and potential treatment of this prevalent and debilitating disease.

  1. Gamma-Irradiated Mannheimia (Pasteurella) Haemolytica Identified by rRNA Gene Sequencing as a Potential Vaccine in Mice

    International Nuclear Information System (INIS)

    Araby, E.

    2014-01-01

    Pneumonic pasteurellosis is a significant disease in beef production medicine. The most information suggests that this disease is a $700 million dollar per year economic burden in bovine food animal production. The current study was designed to assess the immune efficacy of whole cell killed of M. haemolytica strain from satisfactory cases (infected lung from sheep). The efficacy of gamma- irradiated M. haemolytica vaccine (GIV) was evaluated in mice in comparison to the classical aqueous formalized (AFV) one. The bacteria under study were cultivation on blood agar, purification and genetically identified. Then the bacterial cells were exposed to different doses of gamma radiation (2- 20 kGy) with 2 kGy intervals and the dose response curve of the survivors was plotted and 20 kGy was selected as the dose for the preparation of the vaccine. A total of 30 male mice (two weeks – old) were used for the further experimental investigations. Animals were divided into three equal groups each of 10 animals. The first group (group A) was given GIV . The second group (group B) received AFV. The third group (group C) was injected with sterile saline solution and represents the control. Animals were vaccinated via intraperitoneal (i.p) injection with 1x10 8 CFU per treated mouse. After vaccination, the immuno response was determined by cellular surface antigens-reactive antibodies using a modified protein- electrophoresis procedure. Antibody-antigen hybrids was visualized at molecular weight more than 225 KDa in samples represented M. haemolytica antibodies group (A, B) against both bacterial samples (M. haemolytica and Pasteurella multocida ) , while non-treated bacterial cells in which cells incubated with serum of mice group (C) revealed no hybridization reaction, this results verify that, there is shared cellular surface antigens among the two Pasteurella species. Also, the bacterial distribution with (LD 50 ) 2x10 7 CFU of a live M. heamolytica into vaccinated and non

  2. Identifying conditions for elimination and epidemic potential of methicillin-resistant Staphylococcus aureus in nursing homes

    Directory of Open Access Journals (Sweden)

    Nataliya G. Batina

    2016-09-01

    Full Text Available Abstract Background Residents of nursing homes are commonly colonized with methicillin-resistant Staphylococcus aureus (MRSA but there is a limited understanding of the dynamics and determinants of spread in this setting. To address this gap, we sought to use mathematical modeling to assess the epidemic potential of MRSA in nursing homes and to determine conditions under which non-USA300 and USA300 MRSA could be eliminated or reduced in the facilities. Methods Model parameters were estimated from data generated during a longitudinal study of MRSA in 6 Wisconsin nursing homes. The data included subject colonization status with strain-specific MRSA collected every 3 months for up to 1 year. Deterministic and stochastic co-colonization and single-strain models were developed to describe strain-specific dynamics of MRSA in these facilities. Basic reproduction numbers of strain-independent MRSA, non-USA300 and USA300 MRSA were estimated numerically. The impact of antibiotic use in the past 3 months on the prevalence of strain-specific MRSA and associated basic reproduction numbers were evaluated. Results Our models predicted that MRSA would persist in Wisconsin nursing homes, and non-USA300 would remain the dominant circulating strain. MRSA eradication was theoretically achievable by elimination of MRSA-positive admissions over the course of years. Substantial reductions in MRSA prevalence could be attained through marked increase in clearance rates or reduction in MRSA-positive admissions sustained over years. The basic reproduction number of strain-independent MRSA was 0.18 (95 % CI = 0.13–0.23. Recent antibiotic use increased the prevalence of strain-specific MRSA and associated basic reproduction numbers, but was unlikely to lead to an outbreak. Conclusions Based on our model, MRSA elimination from nursing homes, while theoretically possible, was unlikely to be achieved in practice. Decolonization therapy that can sustain higher

  3. ISD97, a computer program to analyze data from a series of in situ measurements on a grid and identify potential localized areas of elevated activity

    International Nuclear Information System (INIS)

    Reginatto, M.; Shebell, P.; Miller, K.M.

    1997-10-01

    A computer program, ISD97, was developed to analyze data from a series of in situ measurements on a grid and identify potential localized areas of elevated activity. The ISD97 code operates using a two-step process. A deconvolution of the data is carried out using the maximum entropy method, and a map of activity on the ground that fits the data within experimental error is generated. This maximum entropy map is then analyzed to determine the locations and magnitudes of potential areas of elevated activity that are consistent with the data. New deconvolutions are then carried out for each potential area of elevated activity identified by the code. Properties of the algorithm are demonstrated using data from actual field measurements

  4. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    Science.gov (United States)

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  5. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers

    Directory of Open Access Journals (Sweden)

    Rachel N. Carey

    2016-07-01

    Full Text Available Abstract Background Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These ‘threat appeals’ feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. Methods To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62 examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81 investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Results Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Conclusions Findings suggest that threat-based road safety communications that target affective (fear and cognitive (perceived efficacy mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  6. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  7. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  8. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  9. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  10. Development of computational fluid dynamics--habitat suitability (CFD-HSI) models to identify potential passage--Challenge zones for migratory fishes in the Penobscot River

    Science.gov (United States)

    Haro, Alexander J.; Dudley, Robert W.; Chelminski, Michael

    2012-01-01

    A two-dimensional computational fluid dynamics-habitat suitability (CFD–HSI) model was developed to identify potential zones of shallow depth and high water velocity that may present passage challenges for five anadromous fish species in the Penobscot River, Maine, upstream from two existing dams and as a result of the proposed future removal of the dams. Potential depth-challenge zones were predicted for larger species at the lowest flow modeled in the dam-removal scenario. Increasing flows under both scenarios increased the number and size of potential velocity-challenge zones, especially for smaller species. This application of the two-dimensional CFD–HSI model demonstrated its capabilities to estimate the potential effects of flow and hydraulic alteration on the passage of migratory fish.

  11. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  12. Maritime Threat Response

    Science.gov (United States)

    2006-06-01

    Shipments,” Congressional Budget Officer, 26 March 2006. 33 has the potential for mass casualties and the “ cinematic ” effect that Al-Qaeda and other...unknown enemy in a high traffic area. While it is still a two dimensional representation on a LCD screen, it does allow for the realism of the

  13. A Feasibility Study on Detection of Insider Threats based on Human Bio-signals

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The insider threat means that trusted workers in an organization might carry out harmful acts from the negligent use of classified data to potentially sabotage the workplace. Surveys and studies conducted over the last decade have consistently shown the critical nature of the insider threats problem, in both government and private sectors. The shortcomings of existing systems, such as mental self-assessment and peer review, are very subjective, biased-assessments and employed infrequently. To overcome these limitations, this study investigates the feasibility of detecting and predicting an insider threat by using human biodata, from smart wearable devices. This paper showed the feasibility of predicting and detecting insider threats using EEG, GSR and ECG signals. In the section 2.1, two research hypotheses were established to identify the significant difference on EEG, GSR and ECG signals when the subject decided bad action and is the placed in deceit situation. These hypotheses were tested using two kinds of pilot experiments in the form of input (stimulus) and output (checking response of physiological signals and reaction time)

  14. Survey of threat studies related to the nuclear power industry

    International Nuclear Information System (INIS)

    Wagner, N.R.

    1977-08-01

    A considerable effort has been directed toward the determination of threat characteristics, resulting in a voluminous collection of documents. This report summarizes several of the major studies in order to make the information more accessible. This summary includes only studies involving attacks on nuclear material, plus those incidents which because of their objectives, resources, or motivations may lend insight into potential threat against nuclear facilities or material

  15. Teleradiology: threat or opportunity?

    International Nuclear Information System (INIS)

    Jarvis, L.; Stanberry, B.

    2005-01-01

    The rapid advances in information technology and communication bandwidth have spawned an equally rapid development of clinical teleradiology. Current computer technology and communication capability allow easy transfer of diagnostic images, of any complexity, to any location in the world. This provides the opportunity to acquire swift primary and secondary diagnostic opinions from the remotest of locations, often at economically attractive rates, with the potential for easing the burden on hard-pressed departments of radiology. However, this comes at the potential cost of distancing the clinical radiologist from the patient, with consequent impact upon direct clinical care. As this technology advances across the world, it is vital that UK radiologists are familiar with the clinical implications, the medicolegal framework within which the field operates and the associated governance issues. This paper reviews current practice and discusses the associated risks

  16. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  17. Stereotype Threat: A Qualitative Study of the Challenges Facing Female Undergraduate Engineering Students

    Science.gov (United States)

    Entsminger, J. R., II

    From a sociocultural point of view, this qualitative case study explored how upper-level, female undergraduate engineering students perceived the possibility of or experience with stereotype threat as shaping their experiences. The study also investigated how these students explained their reasons for choosing their engineering major, the challenges they encountered in the major, and their reasons for persevering in spite of those challenges. Using Steele and Aronson's (1995) stereotype threat theory as a framework, and considering the documented underrepresentation of females in engineering, the study sought to examine how stereotype threat shaped the experiences of these students and if stereotype threat could be considered a valid reason for the underrepresentation. The study was conducted at a large, four-year public university. First, students in the College of Engineering and Engineering Technology completed the Participant Screening Survey. Based on responses from the survey, six female engineering students from the college were identified and invited to participate in the study. The participants came from the following majors: Electrical Engineering, Industrial and Systems Engineering, and Mechanical Engineering. After receiving the study consent letter and agreeing to participate, the students were involved in a 90-minute focus group meeting, a 45-minute one-on-one interview, and a 30-minute follow-up interview. After conducting the data collection methods, the data were then transcribed, analyzed, and coded for theme development. The themes that emerged coincided with each research question. The themes highlighted the complex interactions and experiences shared by the female engineering majors. The female students were enveloped in an environment where there existed an increased risk for activating stereotype threat. In addition, the female students described feeling pushed to prove to themselves and to others that the negative stereotype that 'females

  18. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  19. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  20. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Bartoszcze, M.

    2007-01-01

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  1. THREAT ENSEMBLE VULNERABILITY ASSESSMENT ...

    Science.gov (United States)

    software and manual TEVA-SPOT is used by water utilities to optimize the number and location of contamination detection sensors so that economic and/or public health consequences are minimized. TEVA-SPOT is interactive, allowing a user to specify the minimization objective (e.g., the number of people exposed, the time to detection, or the extent of pipe length contaminated). It also allows a user to specify constraints. For example, a TEVA-SPOT user can employ expert knowledge during the design process by identifying either existing or unfeasible sensor locations. Installation and maintenance costs for sensor placement can also be factored into the analysis. Python and Java are required to run TEVA-SPOT

  2. Familiarity Threat Arguement Revisited

    DEFF Research Database (Denmark)

    Warming-Rasmussen, Bent; Aschauer, Ewald

    2013-01-01

    Abstract: Trust between auditors and their clients is commonly thought to threaten auditors’ professional skepticism and thus compromise audit quality, although a systematic review of auditing literature provides an ambiguous picture. We close this gap by investigating the impact of auditors’ trust...... in their clients on the clients’ perceptions of their auditors’ professional skepticism. Further, we investigate the impact of auditor /audit firm tenure, non-audit services (NAS) and auditors’ confidence in their clients. We employ a two-study design. First, in a qualitative study conducted among auditors...... and clients, we identify their subjective theories of trust and discuss them against the backdrop of recent trust research to develop four hypotheses. In the second study, the hypotheses are tested in an OLS regression based on data from 218 auditor-client dyads in Germany. Then, our interpretations...

  3. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  4. The cyber threat landscape: Challenges and future research directions

    Science.gov (United States)

    Gil, Santiago; Kott, Alexander; Barabási, Albert-László

    2014-07-01

    While much attention has been paid to the vulnerability of computer networks to node and link failure, there is limited systematic understanding of the factors that determine the likelihood that a node (computer) is compromised. We therefore collect threat log data in a university network to study the patterns of threat activity for individual hosts. We relate this information to the properties of each host as observed through network-wide scans, establishing associations between the network services a host is running and the kinds of threats to which it is susceptible. We propose a methodology to associate services to threats inspired by the tools used in genetics to identify statistical associations between mutations and diseases. The proposed approach allows us to determine probabilities of infection directly from observation, offering an automated high-throughput strategy to develop comprehensive metrics for cyber-security.

  5. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  6. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  7. Integration analysis of quantitative proteomics and transcriptomics data identifies potential targets of frizzled-8 protein-related antiproliferative factor in vivo.

    Science.gov (United States)

    Yang, Wei; Kim, Yongsoo; Kim, Taek-Kyun; Keay, Susan K; Kim, Kwang Pyo; Steen, Hanno; Freeman, Michael R; Hwang, Daehee; Kim, Jayoung

    2012-12-01

    What's known on the subject? and What does the study add? Interstitial cystitis (IC) is a prevalent and debilitating pelvic disorder generally accompanied by chronic pain combined with chronic urinating problems. Over one million Americans are affected, especially middle-aged women. However, its aetiology or mechanism remains unclear. No efficient drug has been provided to patients. Several urinary biomarker candidates have been identified for IC; among the most promising is antiproliferative factor (APF), whose biological activity is detectable in urine specimens from >94% of patients with both ulcerative and non-ulcerative IC. The present study identified several important mediators of the effect of APF on bladder cell physiology, suggesting several candidate drug targets against IC. In an attempt to identify potential proteins and genes regulated by APF in vivo, and to possibly expand the APF-regulated network identified by stable isotope labelling by amino acids in cell culture (SILAC), we performed an integration analysis of our own SILAC data and the microarray data of Gamper et al. (2009) BMC Genomics 10: 199. Notably, two of the proteins (i.e. MAPKSP1 and GSPT1) that are down-regulated by APF are involved in the activation of mTORC1, suggesting that the mammalian target of rapamycin (mTOR) pathway is potentially a critical pathway regulated by APF in vivo. Several components of the mTOR pathway are currently being studied as potential therapeutic targets in other diseases. Our analysis suggests that this pathway might also be relevant in the design of diagnostic tools and medications targeting IC. • To enhance our understanding of the interstitial cystitis urine biomarker antiproliferative factor (APF), as well as interstitial cystitis biology more generally at the systems level, we reanalyzed recently published large-scale quantitative proteomics and in vivo transcriptomics data sets using an integration analysis tool that we have developed. • To

  8. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  9. threat or opportunity to distance education throughput at the south

    African Journals Online (AJOL)

    plt

    requirements in particular, potentially increased risk of failure. .... E-portfolios can be used as evidence of achieved ... DoD should devise innovative strategies to resolve the de facto isolation of DE .... well-prepared, hard-copy study guides. ... managing the potential threats associated.63 The free use of technology by soldier ...

  10. Criteria to identify and define territories with productive development potential to establish Special Economic Zones of Development (SEZD in Costa Rica

    Directory of Open Access Journals (Sweden)

    Rafael Arias Ramírez

    2015-07-01

    Full Text Available This study is aimed to identify, based on a series of variables and indicators, territories that have characteristics to propitiate an endogenous development, from the basis of the resource endowment they have, along with a productive policy, at the national and local level to promote it. A county´s index of productive potential is built around three components (productive, infrastructure and institutions; then a cluster analysis is applied. The outcomes of the study are not only new for the country, also they make a contribution with the elaboration of a matrix of variables and indicators, which provide criteria, empirically validated, to identify and define Special Economic Zones of Development (SEZD for Costa Rica.

  11. Pan-Genome Analysis of Human Gastric Pathogen H. pylori: Comparative Genomics and Pathogenomics Approaches to Identify Regions Associated with Pathogenicity and Prediction of Potential Core Therapeutic Targets

    DEFF Research Database (Denmark)

    Ali, Amjad; Naz, Anam; Soares, Siomar C.

    2015-01-01

    -genome approach; the predicted conserved gene families (1,193) constitute similar to 77% of the average H. pylori genome and 45% of the global gene repertoire of the species. Reverse vaccinology strategies have been adopted to identify and narrow down the potential core-immunogenic candidates. Total of 28 nonhost....... Pan-genome analyses of the global representative H. pylori isolates consisting of 39 complete genomes are presented in this paper. Phylogenetic analyses have revealed close relationships among geographically diverse strains of H. pylori. The conservation among these genomes was further analyzed by pan...

  12. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  13. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  14. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  15. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  16. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  17. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  18. Integrative analyses of miRNA and proteomics identify potential biological pathways associated with onset of pulmonary fibrosis in the bleomycin rat model

    International Nuclear Information System (INIS)

    Fukunaga, Satoki; Kakehashi, Anna; Sumida, Kayo; Kushida, Masahiko; Asano, Hiroyuki; Gi, Min; Wanibuchi, Hideki

    2015-01-01

    To determine miRNAs and their predicted target proteins regulatory networks which are potentially involved in onset of pulmonary fibrosis in the bleomycin rat model, we conducted integrative miRNA microarray and iTRAQ-coupled LC-MS/MS proteomic analyses, and evaluated the significance of altered biological functions and pathways. We observed that alterations of miRNAs and proteins are associated with the early phase of bleomycin-induced pulmonary fibrosis, and identified potential target pairs by using ingenuity pathway analysis. Using the data set of these alterations, it was demonstrated that those miRNAs, in association with their predicted target proteins, are potentially involved in canonical pathways reflective of initial epithelial injury and fibrogenic processes, and biofunctions related to induction of cellular development, movement, growth, and proliferation. Prediction of activated functions suggested that lung cells acquire proliferative, migratory, and invasive capabilities, and resistance to cell death especially in the very early phase of bleomycin-induced pulmonary fibrosis. The present study will provide new insights for understanding the molecular pathogenesis of idiopathic pulmonary fibrosis. - Highlights: • We analyzed bleomycin-induced pulmonary fibrosis in the rat. • Integrative analyses of miRNA microarray and proteomics were conducted. • We determined the alterations of miRNAs and their potential target proteins. • The alterations may control biological functions and pathways in pulmonary fibrosis. • Our result may provide new insights of pulmonary fibrosis

  19. SCS-CN and GIS-based approach for identifying potential water harvesting sites in the Kali Watershed, Mahi River Basin, India

    Science.gov (United States)

    Ramakrishnan, D.; Bandyopadhyay, A.; Kusuma, K. N.

    2009-08-01

    The Kali sub-watershed is situated in the semi-arid region of Gujarat, India and forms a part of the Mahi River Watershed. This watershed receives an average annual rainfall of 900mm mainly between July and September. Due to high runoff potential, evapo-transpiration and poor infiltration, drought like situation prevails in this area from December to June almost every year. In this paper, augmentation of water resource is proposed by construction of runoff harvesting structures like check dam, percolation pond, farm pond, well and subsurface dyke. The site suitability for different water harvesting structures is determined by considering spatially varying parameters like runoff potential, slope, fracture pattern and micro-watershed area. GIS is utilised as a tool to store, analyse and integrate spatial and attribute information pertaining to runoff, slope, drainage and fracture. The runoff derived by SCS-CN method is a function of runoff potential which can be expressed in terms of runoff coefficient (ratio between the runoff and rainfall) which can be classified into three classes, viz., high (>40%), moderate (20-40%) and low (<20%). In addition to IMSD, FAO specifications for water harvesting/recharging structures, parameters such as effective storage, rock mass permeability are herein considered to augment effective storage. Using the overlay and decision tree concepts in GIS, potential water harvesting sites are identified. The derived sites are field investigated for suitability and implementation. In all, the accuracy of the site selection at implementation level varies from 80-100%.

  20. Integrative analyses of miRNA and proteomics identify potential biological pathways associated with onset of pulmonary fibrosis in the bleomycin rat model

    Energy Technology Data Exchange (ETDEWEB)

    Fukunaga, Satoki [Department of Molecular Pathology, Osaka City University Graduate School of Medicine, 1-4-3 Asahi-machi, Abeno-ku, Osaka 545-8585 (Japan); Environmental Health Science Laboratory, Sumitomo Chemical Co., Ltd., 3-1-98 Kasugade-Naka, Konohana-ku, Osaka 554-8558 (Japan); Kakehashi, Anna [Department of Molecular Pathology, Osaka City University Graduate School of Medicine, 1-4-3 Asahi-machi, Abeno-ku, Osaka 545-8585 (Japan); Sumida, Kayo; Kushida, Masahiko; Asano, Hiroyuki [Environmental Health Science Laboratory, Sumitomo Chemical Co., Ltd., 3-1-98 Kasugade-Naka, Konohana-ku, Osaka 554-8558 (Japan); Gi, Min [Department of Molecular Pathology, Osaka City University Graduate School of Medicine, 1-4-3 Asahi-machi, Abeno-ku, Osaka 545-8585 (Japan); Wanibuchi, Hideki, E-mail: wani@med.osaka-cu.ac.jp [Department of Molecular Pathology, Osaka City University Graduate School of Medicine, 1-4-3 Asahi-machi, Abeno-ku, Osaka 545-8585 (Japan)

    2015-08-01

    To determine miRNAs and their predicted target proteins regulatory networks which are potentially involved in onset of pulmonary fibrosis in the bleomycin rat model, we conducted integrative miRNA microarray and iTRAQ-coupled LC-MS/MS proteomic analyses, and evaluated the significance of altered biological functions and pathways. We observed that alterations of miRNAs and proteins are associated with the early phase of bleomycin-induced pulmonary fibrosis, and identified potential target pairs by using ingenuity pathway analysis. Using the data set of these alterations, it was demonstrated that those miRNAs, in association with their predicted target proteins, are potentially involved in canonical pathways reflective of initial epithelial injury and fibrogenic processes, and biofunctions related to induction of cellular development, movement, growth, and proliferation. Prediction of activated functions suggested that lung cells acquire proliferative, migratory, and invasive capabilities, and resistance to cell death especially in the very early phase of bleomycin-induced pulmonary fibrosis. The present study will provide new insights for understanding the molecular pathogenesis of idiopathic pulmonary fibrosis. - Highlights: • We analyzed bleomycin-induced pulmonary fibrosis in the rat. • Integrative analyses of miRNA microarray and proteomics were conducted. • We determined the alterations of miRNAs and their potential target proteins. • The alterations may control biological functions and pathways in pulmonary fibrosis. • Our result may provide new insights of pulmonary fibrosis.

  1. Identifying and managing conflicts between forest conservation and other human interests in Europe

    NARCIS (Netherlands)

    Niemela, J.; Young, J.; Alard, D.; Askasibar, M.; Henle, K.; Johnson, R.; Kurttila, M.; Larsson, T.B.; Matouch, S.; Nowicki, P.L.; Paiva, R.Q.; Portoghesi, L.; Smulders, M.J.M.; Stevenson, A.; Tartes, U.; Watt, A.

    2005-01-01

    In this paper, circumstances where various human activities and interests clash with the conservation of forest biodiversity are examined, with particular focus on the drivers behind the conflicts. After identifying past and current human-related threats potentially leading to conflicts in forests,

  2. Threats to riparian ecosystems in western North America: An analysis of existing literature

    Science.gov (United States)

    Boris Poff; Karen A. Koestner; Dan Neary; Victoria Henderson

    2011-01-01

    A total of 453 journal articles, reports, books, and book chapters addressing threats to riparian ecosystems in western North America were analyzed to identify, quantify, and qualify the major threats to these ecosystems as represented in the existing literature. Publications were identified either as research, policy, literature review, historical comparison, or...

  3. Global Threat Reduction Initiative International Partners' Conference. Summary of the proceedings and findings of the conference

    International Nuclear Information System (INIS)

    2004-01-01

    The Global Threat Reduction Initiative (GTRI) International Partners' Conference took place in Vienna, Austria, from September 18-19, 2004. More than 590 representatives from 100 International Atomic Energy Agency (IAEA) Member States attended the GTRI International Partners' Conference on September 18-19, 2004, in Vienna, Austria. Representatives from ten non-governmental and international organizations were also present during the conference. The Governments of the United States and the Russian Federation co-sponsored the International Partners Conference, with support from the International Atomic Energy Agency. The purpose of the International Partners' Conference was to build and broaden international support for efforts by national authorities to identify, secure, recover, and/or facilitate the disposition of high-risk nuclear and radioactive materials that pose a potential threat to the international community. One of the significant outcomes of the International Partners Conference was reaching agreement on the Findings of the Conference (enclosed in this document) by participating Member States that outlined a broadly shared opinion of participating Member States on efforts to reduce the potential threat posed by vulnerable, unsecured nuclear and other radioactive material. It is hoped that this document can be used as a framework to consolidate, expand, and accelerate domestic, regional, and IAEA programs that address unsecured vulnerable nuclear and radioactive materials, as deemed necessary by Member States. As a first step, participating members states urged the international community to note additional opportunities to further build support for activities related to GTRI

  4. Social identity threat motivates science-discrediting online comments.

    Directory of Open Access Journals (Sweden)

    Peter Nauroth

    Full Text Available Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly identified group members (i.e., people who identified as "gamers" were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression. A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2. Furthermore, when participants were collectively (vs. self- affirmed, identification did no longer predict discrediting posting behavior (Study 3. These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition.

  5. Social Identity Threat Motivates Science-Discrediting Online Comments

    Science.gov (United States)

    Nauroth, Peter; Gollwitzer, Mario; Bender, Jens; Rothmund, Tobias

    2015-01-01

    Experiencing social identity threat from scientific findings can lead people to cognitively devalue the respective findings. Three studies examined whether potentially threatening scientific findings motivate group members to take action against the respective findings by publicly discrediting them on the Web. Results show that strongly (vs. weakly) identified group members (i.e., people who identified as “gamers”) were particularly likely to discredit social identity threatening findings publicly (i.e., studies that found an effect of playing violent video games on aggression). A content analytical evaluation of online comments revealed that social identification specifically predicted critiques of the methodology employed in potentially threatening, but not in non-threatening research (Study 2). Furthermore, when participants were collectively (vs. self-) affirmed, identification did no longer predict discrediting posting behavior (Study 3). These findings contribute to the understanding of the formation of online collective action and add to the burgeoning literature on the question why certain scientific findings sometimes face a broad public opposition. PMID:25646725

  6. The use of lead isotope analysis to identify potential sources of lead toxicosis in a juvenile bald eagle (Haliaeetus leucocephalus) with ventricular foreign bodies

    Science.gov (United States)

    Franzen-Klein, Dana; McRuer, David; Slabe, Vincent; Katzner, Todd

    2018-01-01

    A male juvenile bald eagle (Haliaeetus leucocephalus) was admitted to the Wildlife Center of Virginia with a left humeral fracture a large quantity of anthropogenic debris in the ventriculus, a blood lead level of 0.616 ppm, and clinical signs consistent with chronic lead toxicosis. Because of the poor prognosis for recovery and release, the eagle was euthanatized. Lead isotope analysis was performed to identify potential anthropogenic sources of lead in this bird. The lead isotope ratios in the eagle's femur (0.8773), liver (0.8761), and kidneys (0.8686) were most closely related to lead paint (0.8925), leaded gasoline (0.8450), and zinc smelting (0.8240). The lead isotope ratios were dissimilar to lead ammunition (0.8179) and the anthropogenic debris in the ventriculus. This case report documents foreign body ingestion in a free-ranging bald eagle and demonstrates the clinical utility of lead isotope analysis to potentially identify or exclude anthropogenic sources of lead poisoning in wildlife patients.

  7. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  8. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  9. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  10. The availability of hydrogeologic data associated with areas identified by the US Geological Survey as experiencing potentially induced seismicity resulting from subsurface injection

    Science.gov (United States)

    Barnes, Caitlin; Halihan, Todd

    2018-05-01

    A critical need exists for site-specific hydrogeologic data in order to determine potential hazards of induced seismicity and to manage risk. By 2015, the United States Geological Survey (USGS) had identified 17 locations in the USA that are experiencing an increase in seismicity, which may be potentially induced through industrial subsurface injection. These locations span across seven states, which vary in geological setting, industrial exposure and seismic history. Comparing the research across the 17 locations revealed patterns for addressing induced seismicity concerns, despite the differences between geographical locations. Most induced seismicity studies evaluate geologic structure and seismic data from areas experiencing changes in seismic activity levels, but the inherent triggering mechanism is the transmission of hydraulic pressure pulses. This research conducted a systematic review of whether data are available in these locations to generate accurate hydrogeologic predictions, which could aid in managing seismicity. After analyzing peer-reviewed research within the 17 locations, this research confirms a lack of site-specific hydrogeologic data availability for at-risk areas. Commonly, formation geology data are available for these sites, but hydraulic parameters for the seismically active injection and basement zones are not available to researchers conducting peer-reviewed research. Obtaining hydrogeologic data would lead to better risk management for injection areas and provide additional scientific evidential support for determining a potentially induced seismic area.

  11. Multiplex polymerase chain reaction to identify and determine the toxigenicity of Corynebacterium spp with zoonotic potential and an overview of human and animal infections

    Directory of Open Access Journals (Sweden)

    Luciene de Fátima Costa Torres

    2013-05-01

    Full Text Available Corynebacterium diphtheriae, Corynebacterium ulcerans and Corynebacterium pseudotuberculosis constitute a group of potentially toxigenic microorganisms that are related to different infectious processes in animal and human hosts. Currently, there is a lack of information on the prevalence of disease caused by these pathogens, which is partially due to a reduction in the frequency of routine laboratory testing. In this study, a multiplex polymerase chain reaction (mPCR assay that can simultaneously identify and determine the toxigenicity of these corynebacterial species with zoonotic potential was developed. This assay uses five primer pairs targeting the following genes: rpoB (Corynebacterium spp, 16S rRNA (C. ulcerans and C. pseudotuberculosis, pld (C. pseudotuberculosis, dtxR (C. diphtheriae and tox [diphtheria toxin (DT ]. In addition to describing this assay, we review the literature regarding the diseases caused by these pathogens. Of the 213 coryneform strains tested, the mPCR results for all toxigenic and non-toxigenic strains of C . diphtheriae, C. ulcerans and C. pseudotuberculosis were in 100% agreement with the results of standard biochemical tests and PCR-DT. As an alternative to conventional methods, due to its advantages of specificity and speed, the mPCR assay used in this study may successfully be applied for the diagnosis of human and/or animal diseases caused by potentially toxigenic corynebacterial species.

  12. Flash visual evoked potentials are not specific enough to identify parieto-occipital lobe involvement in term neonates after significant hypoglycaemia.

    Science.gov (United States)

    Hu, Liyuan; Gu, Qiufang; Zhu, Zhen; Yang, Chenhao; Chen, Chao; Cao, Yun; Zhou, Wenhao

    2014-08-01

    Hypoglycaemia is a significant problem in high-risk neonates and predominant parieto-occipital lobe involvement has been observed after severe hypoglycaemic insult. We explored the use of flash visual evoked potentials (FVEP) in detecting parieto-occipital lobe involvement after significant hypoglycaemia. Full-term neonates (n = 15) who underwent FVEP from January 2008 to May 2013 were compared with infants (n = 11) without hypoglycaemia or parietal-occipital lobe injury. Significant hypoglycaemia was defined as being symptomatic or needing steroids, glucagon or a glucose infusion rate of ≥12 mg/kg/min. The hypoglycaemia group exhibited delayed latency of the first positive waveform on FVEP. The initial detected time for hypoglycaemia was later in the eight subjects with seizures (median 51-h-old) than those without (median 22-h-old) (P = 0.003). Magnetic resonance imaging showed that 80% of the hypoglycaemia group exhibited occipital-lobe injuries, and they were more likely to exhibit abnormal FVEP morphology (P = 0.007) than the controls. FVEP exhibited 100% sensitivity, but only 25% specificity, for detecting injuries to the parieto-occipital lobes. Flash visual evoked potential (FVEP) was sensitive, but not sufficiently specific, in identifying parieto-occipital lobe injuries among term neonates exposed to significant hypoglycaemia. Larger studies exploring the potential role of FVEP in neonatal hypoglycaemia are required. ©2014 Foundation Acta Paediatrica. Published by John Wiley & Sons Ltd.

  13. Simulating the Adaptive Mechanisms to Reduce the Risks of Occurence of Threats to the Economic Security of Enterprise

    Directory of Open Access Journals (Sweden)

    Glushchevsky Vyacheslav V.

    2017-09-01

    Full Text Available The article is concerned with addressing the topical problem of effectively countering real and potential threats to economic security of enterprises and reducing the risks of their occurrence. The article is aimed at simulating the adaptive mechanisms