WorldWideScience

Sample records for particulate threat assessment

  1. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  2. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  3. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  4. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  5. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  6. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  7. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  8. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  9. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  10. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  11. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  12. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  13. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  14. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  15. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  16. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  17. Assessment of wind erosion threat for soils in cadastral area of Hajske

    International Nuclear Information System (INIS)

    Muchova, Z.; Stredanska, A.

    2008-01-01

    This contribution illustrates the application of methods of erosion threat assessment in lan adaptation projects. Calculations of the soil erosion index of particular soil blocks are demonstrated for the cadastral area of Hajske. Two methods for assessment of erosion threat have been applied. First the assessment based on the ecological soil-quality units (ESQU) has been performed. Next, the Pasak method for a detailed analysis of the soil erosion threat was applied. Both of the mentioned approaches are recommended for the land adaption projects. Based on the results, the soil blocks have been ranked by their soil erosion threat. (authors)

  18. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  19. TANDI: threat assessment of network data and information

    Science.gov (United States)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  20. Development, Evaluation, and Future Directions of the Virginia Student Threat Assessment Guidelines

    Science.gov (United States)

    Cornell, Dewey; Allen, Korrie

    2011-01-01

    The Virginia Student Threat Assessment Guidelines were developed in response to studies of school shootings conducted by the U.S. Federal Bureau of Investigation, U.S. Secret Service, and U.S. Department of Education that recommended schools should adopt a threat assessment approach to prevent targeted violence. This article reviews the…

  1. Conservation physiology can inform threat assessment and recovery planning processes for threatened species

    DEFF Research Database (Denmark)

    Birnie-Gauvin, Kim; Walton, Sarah; Delle Palme, Caleigh A.

    2017-01-01

    threat assessments and work with partners to develop recovery plans. Here we argue that conservation physiology has much to offer for the threat assessment process and outline the ways in which this can be operationalized. For instance, conservation physiology is effective at revealing causal...... role in the conservation activities of bodies like the IUCN that are engaged in threat assessment and recovery of endangered organisms. Although we focus on activities at the international scale, these same concepts are relevant and applicable to national and regional bodies...

  2. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  3. Rapid Assessment of Protected area Pressures and Threats in ...

    African Journals Online (AJOL)

    Regular evaluation of protected area operations can enable policy makers develop strategic responses to pervasive management problems. Pressures and threats in seven National Parks of the National Park Service (NPS) were therefore assessed using the Rapid Assessment and Prioritization of Protected Area ...

  4. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  5. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  6. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  7. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  8. Herbaceous plants as filters: Immobilization of particulates along urban street corridors

    International Nuclear Information System (INIS)

    Weber, Frauke; Kowarik, Ingo; Säumel, Ina

    2014-01-01

    Among air pollutants, particulate matter (PM) is considered to be the most serious threat to human health. Plants provide ecosystem services in urban areas, including reducing levels of PM by providing a surface for deposition and immobilization. While previous studies have mostly addressed woody species, we focus on herbaceous roadside vegetation and assess the role of species traits such as leaf surface roughness or hairiness for the immobilization of PM. We found that PM deposition patterns on plant surfaces reflect site-specific traffic densities and that strong differences in particulate deposition are present among species. The amount of immobilized PM differed according to particle type and size and was related to specific plant species traits. Our study suggests that herbaceous vegetation immobilizes a significant amount of the air pollutants relevant to human health and that increasing biodiversity of roadside vegetation supports air filtration and thus healthier conditions along street corridors. -- Highlights: • We assessed PM immobilization by common urban herbaceous roadside species. • PM deposition was related to traffic density and plant species traits. • Amount of PM deposited differed according to particle type and size. • Increasing biodiversity of roadside vegetation supports air filtration. -- Herbaceous urban roadside vegetation immobilizes particulate matter relevant to human health, thus supporting healthier conditions next to busy roads

  9. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  10. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  11. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  12. Including threat actor capability and motivation in risk assessment for Smart GRIDs

    NARCIS (Netherlands)

    Rossebo, J.E.Y.; Fransen, F.; Luiijf, H.A.M.

    2016-01-01

    The SEGRID (Security for Smart Electricity GRIDs) collaboration project, funded by the EU under the FP7 program investigates risk assessment methodologies and their possible need for enhancement. In this paper we discuss the need to include threat actor analysis in threat, vulnerability and risk

  13. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  14. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Hyun Doo [KINAC, Daejeon (Korea, Republic of)

    2016-05-15

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats.

  15. Current Status of the Cyber Threat Assessment for Nuclear Facilities

    International Nuclear Information System (INIS)

    Kim, Hyun Doo

    2016-01-01

    In December 2014, unknown hackers hacked internal documents sourced from Korea Hydro and Nuclear Power (KHNP) and those electronic documents were posted five times on a Social Network Service (SNS). The data included personal profiles, flow charts, manuals and blueprints for installing pipes in the nuclear power plant. Although the data were not critical to operation or sabotage of the plant, it threatened people and caused social unrest in Korea and neighboring countries. In December 2015, cyber attack on power grid caused a blackout for hundreds of thousands of people in Ukraine. The power outage was caused by a sophisticated attack using destructive malware called 'BlackEnergy'. Cyber attacks are reality in today's world and critical infrastructures are increasingly targeted. Critical infrastructures, such as the nuclear power plant, need to be proactive and protect the nuclear materials, assets and facilities from potential cyber attacks. The threat assessment document and its detailed procedure are confidential for the State. Nevertheless, it is easy to find cooperation on assessing and evaluating the threats of nuclear materials and facilities with other government departments or agencies including the national police. The NSSC and KINAC also cooperated with the National Intelligence Service (NIS) and National Security Research Institute (NSR). However, robust cyber threat assessment system and regular consultative group should be established with domestic and overseas organization including NIS, NSR, the National Police Agency and the military force to protect and ensure to safety of people, public and environment from rapidly changing and upgrading cyber threats

  16. Modeling threat assessments of water supply systems using markov latent effects methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  17. Worldwide Threat Assessment of the US Intelligence Community

    Science.gov (United States)

    2014-01-29

    the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition ( SCADA ) systems used in water management, oil and gas pipelines ...Statement for the Record Worldwide Threat Assessment of the US Intelligence Community Senate Select Committee on Intelligence...reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions

  18. An integrated approach to risk assessment and mitigating the CBRN threat

    International Nuclear Information System (INIS)

    Bokan, S.

    2009-01-01

    CBRN mass casualty events threat mitigation remains today the highest international priority. Although significant progress has been made, the national security requirements for efforts to combat Weapons of Mass Destruction and Weapons of Mass Disruption will be of the highest national priority in the near future. An integration of a number of approaches is essential in the risk assessment and mitigating the CBRN treat. Preparedness measures and procedures, engineering, science and technology, policy, medical, and emergency response are essential to reduce the threat from the proliferation and use of weapons of mass destruction (WMD). Improved coordination between international, public and private security entities is also essential task to hopefully prevent the terrorist attacks. In this lecture, it will be presented very important scientific approach to risk assessment of potential use of nuclear, radiological, biological or chemical weapons in terrorist actions. An integrated approach for mitigating the CBRN threat, crisis management and preparedness measures for prevention and reduction of potential consequences, will be presented.(author)

  19. The role of warning behaviors in threat assessment: an exploration and suggested typology.

    Science.gov (United States)

    Reid Meloy, J; Hoffmann, Jens; Guldimann, Angela; James, David

    2012-01-01

    The concept of warning behaviors offers an additional perspective in threat assessment. Warning behaviors are acts which constitute evidence of increasing or accelerating risk. They are acute, dynamic, and particularly toxic changes in patterns of behavior which may aid in structuring a professional's judgment that an individual of concern now poses a threat - whether the actual target has been identified or not. They require an operational response. A typology of eight warning behaviors for assessing the threat of intended violence is proposed: pathway, fixation, identification, novel aggression, energy burst, leakage, directly communicated threat, and last resort warning behaviors. Previous research on risk factors associated with such warning behaviors is reviewed, and examples of each warning behavior from various intended violence cases are presented, including public figure assassination, adolescent and adult mass murder, corporate celebrity stalking, and both domestic and foreign acts of terrorism. Practical applications and future research into warning behaviors are suggested. Copyright © 2011 John Wiley & Sons, Ltd.

  20. Law Enforcement Use of Threat Assessments to Predict Violence

    Science.gov (United States)

    Wood, Tracey Michelle

    2016-01-01

    The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass…

  1. The Legal Side of Campus Threat Assessment and Management: What Student Counselors Need to Know

    Science.gov (United States)

    Nolan, Jeffrey J.; Moncure, Thomas M., Jr.

    2012-01-01

    This article identifies what student mental health professionals need to know about legal issues of relevance to threat assessment and management. The article summarizes the common law duties and the common law and statutory standards of care that are likely to apply to the work of college and university threat assessment and management teams. The…

  2. A Cyber Security Risk Assessment of Hospital Infrastructure including TLS/SSL and other Threats

    OpenAIRE

    Millar, Stuart

    2016-01-01

    Cyber threats traditionally target governments, financial institutions and businesses. However, of growing concern is the threat to healthcare organizations. This study conducts a cyber security risk assessment of a theoretical hospital environment, to include TLS/SSL, which is an encryption protocol for network communications, plus other physical, logical and human threats. Despite significant budgets in the UK for the NHS, the spend on cyber security appears worryingly low and many hospital...

  3. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  4. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  5. Cyber Threat Assessment of Uplink and Commanding System for Mission Operation

    Science.gov (United States)

    Ko, Adans Y.; Tan, Kymie M. C.; Cilloniz-Bicchi, Ferner; Faris, Grant

    2014-01-01

    Most of today's Mission Operations Systems (MOS) rely on Ground Data System (GDS) segment to mitigate cyber security risks. Unfortunately, IT security design is done separately from the design of GDS' mission operational capabilities. This incoherent practice leaves many security vulnerabilities in the system without any notice. This paper describes a new way to system engineering MOS, to include cyber threat risk assessments throughout the MOS development cycle, without this, it is impossible to design a dependable and reliable MOS to meet today's rapid changing cyber threat environment.

  6. Assessment of impact distances for particulate matter dispersion: A stochastic approach

    Energy Technology Data Exchange (ETDEWEB)

    Godoy, S.M.; Mores, P.L.; Santa Cruz, A.S.M. [CAIMI - Centro de Aplicaciones Informaticas y Modelado en Ingenieria, Universidad Tecnologica Nacional-Facultad Regional Rosario, Zeballos 1341-S2000 BQA Rosario, Santa Fe (Argentina); Scenna, N.J. [CAIMI - Centro de Aplicaciones Informaticas y Modelado en Ingenieria, Universidad Tecnologica Nacional-Facultad Regional Rosario, Zeballos 1341-S2000 BQA Rosario, Santa Fe (Argentina); INGAR - Instituto de Desarrollo y Diseno (Fundacion ARCIEN - CONICET), Avellaneda 3657, S3002 GJC Santa Fe (Argentina)], E-mail: nscenna@santafe-conicet.gov.ar

    2009-10-15

    It is known that pollutants can be dispersed from the emission sources by the wind, or settled on the ground. Particle size, stack height, topography and meteorological conditions strongly affect particulate matter (PM) dispersion. In this work, an impact distance calculation methodology considering different particulate sizes is presented. A Gaussian-type dispersion model for PM that handles size particles larger than 0.1 {mu}m is used. The model considers primary particles and continuous emissions. PM concentration distribution at every affected geographical point defined by a grid is computed. Stochastic uncertainty caused by the natural variability of atmospheric parameters is taken into consideration in the dispersion model by applying a Monte Carlo methodology. The prototype package (STRRAP) that takes into account the stochastic behaviour of atmospheric variables, developed for risk assessment and safe distances calculation [Godoy SM, Santa Cruz ASM, Scenna NJ. STRRAP SYSTEM - A software for hazardous materials risk assessment and safe distances calculation. Reliability Engineering and System Safety 2007;92(7):847-57] is enlarged for the analysis of the PM air dispersion. STRRAP computes distances from the source to every affected receptor in each trial and generates the impact distance distribution for each particulate size. In addition, a representative impact distance value to delimit the affected area can be obtained. Fuel oil stack effluents dispersion in Rosario city is simulated as a case study. Mass concentration distributions and impact distances are computed for the range of interest in environmental air quality evaluations (PM{sub 2.5}-PM{sub 10})

  7. Assessment of impact distances for particulate matter dispersion: A stochastic approach

    International Nuclear Information System (INIS)

    Godoy, S.M.; Mores, P.L.; Santa Cruz, A.S.M.; Scenna, N.J.

    2009-01-01

    It is known that pollutants can be dispersed from the emission sources by the wind, or settled on the ground. Particle size, stack height, topography and meteorological conditions strongly affect particulate matter (PM) dispersion. In this work, an impact distance calculation methodology considering different particulate sizes is presented. A Gaussian-type dispersion model for PM that handles size particles larger than 0.1 μm is used. The model considers primary particles and continuous emissions. PM concentration distribution at every affected geographical point defined by a grid is computed. Stochastic uncertainty caused by the natural variability of atmospheric parameters is taken into consideration in the dispersion model by applying a Monte Carlo methodology. The prototype package (STRRAP) that takes into account the stochastic behaviour of atmospheric variables, developed for risk assessment and safe distances calculation [Godoy SM, Santa Cruz ASM, Scenna NJ. STRRAP SYSTEM - A software for hazardous materials risk assessment and safe distances calculation. Reliability Engineering and System Safety 2007;92(7):847-57] is enlarged for the analysis of the PM air dispersion. STRRAP computes distances from the source to every affected receptor in each trial and generates the impact distance distribution for each particulate size. In addition, a representative impact distance value to delimit the affected area can be obtained. Fuel oil stack effluents dispersion in Rosario city is simulated as a case study. Mass concentration distributions and impact distances are computed for the range of interest in environmental air quality evaluations (PM 2.5 -PM 10 ).

  8. Evaluation of particulate filtration efficiency of retrofit particulate filters for light duty vehicles

    International Nuclear Information System (INIS)

    Van Asch, R.; Verbeek, R.

    2009-10-01

    In the light of the currently running subsidy programme for particulate filters in the Netherlands, the Dutch ministry of spatial planning and environment (VROM) asked TNO to execute a desk study to evaluate the particulates filtration efficiency of retrofit particulate filters for light duty vehicles (passenger cars and vans). The typical retrofit particulate filters for light duty vehicles are also called 'open' or 'half-open' filters, because a part of the exhaust gas can pass through the particulate filter unfiltered. From design point they are very different from the majority of the factory installed particulate filters, which are also called wall-flow or 'closed' particulate filters. Due to these differences there is a large difference in filtration efficiency. Whereas the 'dosed' particulate filters show a filtration efficiency of larger than 90%, the filtration efficiency of 'open' particulate filters is generally lower (type approval minimum 30%), and strongly dependent on the conditions of use. The objective of the current project was to assess the average filtration efficiency of retrofit (open) particulate fillters on light duty vehicles in real world day to day driving, based on available literature data. Also, the reasons of a possible deviation with the type approval test results (minimum filtration efficiency of 30%) was investigated.

  9. On the Impact of Particulate Matter Distribution on Pressure Drop of Wall-Flow Particulate Filters

    Directory of Open Access Journals (Sweden)

    Vicente Bermúdez

    2017-03-01

    Full Text Available Wall-flow particulate filters are a required exhaust aftertreatment system to abate particulate matter emissions and meet current and incoming regulations applying worldwide to new generations of diesel and gasoline internal combustion engines. Despite the high filtration efficiency covering the whole range of emitted particle sizes, the porous substrate constitutes a flow restriction especially relevant as particulate matter, both soot and ash, is collected. The dependence of the resulting pressure drop, and hence the fuel consumption penalty, on the particulate matter distribution along the inlet channels is discussed in this paper taking as reference experimental data obtained in water injection tests before the particulate filter. This technique is demonstrated to reduce the particulate filter pressure drop without negative effects on filtration performance. In order to justify these experimental data, the characteristics of the particulate layer are diagnosed applying modeling techniques. Different soot mass distributions along the inlet channels are analyzed combined with porosity change to assess the new properties after water injection. Their influence on the subsequent soot loading process and regeneration is assessed. The results evidence the main mechanisms of the water injection at the filter inlet to reduce pressure drop and boost the interest for control strategies able to force the re-entrainment of most of the particulate matter towards the inlet channels’ end.

  10. Exposure to Particulate Hexavalent Chromium Exacerbates Allergic Asthma Pathology

    Science.gov (United States)

    Schneider, Brent C.; Constant, Stephanie L.; Patierno, Steven R.; Jurjus, Rosalyn A.; Ceryak, Susan M.

    2011-01-01

    Airborne hexavalent chromate, Cr(VI), has been identified by the Environmental Protection Agency as a possible health threat in urban areas, due to the carcinogenic potential of some of its forms. Particulate chromates are produced in many different industrial settings, with high levels of aerosolized forms historically documented. Along with an increased risk of lung cancer, a high incidence of allergic asthma has been reported in workers exposed to certain inhaled particulate Cr(VI) compounds. However, a direct causal association between Cr(VI) and allergic asthma has not been established. We recently showed that inhaled particulate Cr(VI) induces an innate neutrophilic inflammatory response in BALB/c mice. In the current studies we investigated how the inflammation induced by inhaled particulate Cr(VI) might alter the pathology of an allergic asthmatic response. We used a well-established mouse model of allergic asthma. Groups of ovalbumin protein (OVA)-primed mice were challenged either with OVA alone, or with a combination of OVA and particulate zinc chromate, and various parameters associated with asthmatic responses were measured. Co-exposure to particulate Cr(VI) and OVA mediated a mixed form of asthma in which both eosinophils and neutrophils are present in airways, tissue pathology is markedly exacerbated, and airway hyperresponsiveness is significantly increased. Taken together these findings suggest that inhalation of particulate forms of Cr(VI) may augment the severity of ongoing allergic asthma, as well as alter its phenotype. Such findings may have implications for asthmatics in settings in which airborne particulate Cr(VI) compounds are present at high levels. PMID:22178736

  11. Algae Assessment of Threats to Freshwater Ecosystems: Trends, Challenges, and Opportunities

    Science.gov (United States)

    As human populations continue to grow, the demands for freshwater resources and ecosystem services are increasing along with concomitant threats to their quality and sustainability. Algal communities in streams, lakes, and wetlands offer powerful insight into assessing and managi...

  12. Is there a difference in treatment outcomes between epidural injections with particulate versus non-particulate steroids?

    Energy Technology Data Exchange (ETDEWEB)

    Bensler, Susanne; Sutter, Reto; Pfirrmann, Christian W.A.; Peterson, Cynthia K. [Orthopedic University Hospital Balgrist, Department of Radiology, Zurich (Switzerland); University of Zurich, Faculty of Medicine, Zurich (Switzerland)

    2017-04-15

    To compare the outcomes of patients after interlaminar computed tomography (CT)-guided epidural injections of the lumbar spine with particulate vs. non-particulate steroids. 531 consecutive patients were treated with CT-guided lumbar interlaminar epidural injections with steroids and local anaesthetics. 411 patients received a particulate steroid and 120 patients received a non-particulate steroid. Pain levels were assessed using the 11-point numerical rating scale (NRS) and overall reported 'improvement' was assessed using the Patients Global Impression of Change (PGIC) at 1 day, 1 week and 1 month post-injection. Descriptive and inferential statistics were applied. Patients receiving particulate steroids had statistically significantly higher NRS change scores (p = 0.0001 at 1 week; p = 0.0001 at 1 month). A significantly higher proportion of patients receiving particulate steroids reported relevant improvement (PGIC) at both 1 week and 1 month post injection (p = 0.0001) and they were significantly less likely to report worsening at 1 week (p = 0.0001) and 1 month (p = 0.017). Patients treated with particulate steroids had significantly greater pain relief and were much more likely to report clinically relevant overall 'improvement' at 1 week and 1 month compared to the patients treated with non-particulate steroids. (orig.)

  13. Is there a difference in treatment outcomes between epidural injections with particulate versus non-particulate steroids?

    International Nuclear Information System (INIS)

    Bensler, Susanne; Sutter, Reto; Pfirrmann, Christian W.A.; Peterson, Cynthia K.

    2017-01-01

    To compare the outcomes of patients after interlaminar computed tomography (CT)-guided epidural injections of the lumbar spine with particulate vs. non-particulate steroids. 531 consecutive patients were treated with CT-guided lumbar interlaminar epidural injections with steroids and local anaesthetics. 411 patients received a particulate steroid and 120 patients received a non-particulate steroid. Pain levels were assessed using the 11-point numerical rating scale (NRS) and overall reported 'improvement' was assessed using the Patients Global Impression of Change (PGIC) at 1 day, 1 week and 1 month post-injection. Descriptive and inferential statistics were applied. Patients receiving particulate steroids had statistically significantly higher NRS change scores (p = 0.0001 at 1 week; p = 0.0001 at 1 month). A significantly higher proportion of patients receiving particulate steroids reported relevant improvement (PGIC) at both 1 week and 1 month post injection (p = 0.0001) and they were significantly less likely to report worsening at 1 week (p = 0.0001) and 1 month (p = 0.017). Patients treated with particulate steroids had significantly greater pain relief and were much more likely to report clinically relevant overall 'improvement' at 1 week and 1 month compared to the patients treated with non-particulate steroids. (orig.)

  14. Advances in exposure and toxicity assessment of particulate matter: An overview of presentations at the 2009 Toxicology and Risk Assessment Conference

    International Nuclear Information System (INIS)

    Gunasekar, Palur G.; Stanek, Lindsay W.

    2011-01-01

    The 2009 Toxicology and Risk Assessment Conference (TRAC) session on 'Advances in Exposure and Toxicity Assessment of Particulate Matter' was held in April 2009 in West Chester, OH. The goal of this session was to bring together toxicology, geology and risk assessment experts from the Department of Defense and academia to examine issues in exposure assessment and report on recent epidemiological findings of health effects associated with particulate matter (PM) exposure. Important aspects of PM exposure research are to detect and monitor low levels of PM with various chemical compositions and to assess the health risks associated with these exposures. As part of the overall theme, some presenters discussed collection methods for sand and dust from Iraqi and Afghanistan regions, health issues among deployed personnel, and future directions for risk assessment research among these populations. The remaining speakers focused on the toxicity of ultrafine PM and the characterization of aerosols generated during ballistic impacts of tungsten heavy alloys.

  15. Exposure to particulate hexavalent chromium exacerbates allergic asthma pathology

    International Nuclear Information System (INIS)

    Schneider, Brent C.; Constant, Stephanie L.; Patierno, Steven R.; Jurjus, Rosalyn A.; Ceryak, Susan M.

    2012-01-01

    Airborne hexavalent chromate, Cr(VI), has been identified by the Environmental Protection Agency as a possible health threat in urban areas, due to the carcinogenic potential of some of its forms. Particulate chromates are produced in many different industrial settings, with high levels of aerosolized forms historically documented. Along with an increased risk of lung cancer, a high incidence of allergic asthma has been reported in workers exposed to certain inhaled particulate Cr(VI) compounds. However, a direct causal association between Cr(VI) and allergic asthma has not been established. We recently showed that inhaled particulate Cr(VI) induces an innate neutrophilic inflammatory response in BALB/c mice. In the current studies we investigated how the inflammation induced by inhaled particulate Cr(VI) might alter the pathology of an allergic asthmatic response. We used a well-established mouse model of allergic asthma. Groups of ovalbumin protein (OVA)-primed mice were challenged either with OVA alone, or with a combination of OVA and particulate zinc chromate, and various parameters associated with asthmatic responses were measured. Co-exposure to particulate Cr(VI) and OVA mediated a mixed form of asthma in which both eosinophils and neutrophils are present in airways, tissue pathology is markedly exacerbated, and airway hyperresponsiveness is significantly increased. Taken together these findings suggest that inhalation of particulate forms of Cr(VI) may augment the severity of ongoing allergic asthma, as well as alter its phenotype. Such findings may have implications for asthmatics in settings in which airborne particulate Cr(VI) compounds are present at high levels. -- Highlights: ► Allergic asthma correlated with exposure to certain inhaled particulate chromates. ► Direct causal association between Cr(VI) and allergic asthma not established. ► Cr exacerbated pathology and airway hyperresponsiveness in an OVA-challenged mouse. ► Particulate Cr

  16. Exposure to particulate hexavalent chromium exacerbates allergic asthma pathology

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, Brent C. [Department of Microbiology, Immunology and Tropical Medicine, The George Washington University, Washington, DC 20037 (United States); Department of Pharmacology and Physiology, The George Washington University, Washington, DC 20037 (United States); Constant, Stephanie L. [Department of Microbiology, Immunology and Tropical Medicine, The George Washington University, Washington, DC 20037 (United States); Patierno, Steven R. [Department of Pharmacology and Physiology, The George Washington University, Washington, DC 20037 (United States); GW Cancer Institute, The George Washington University, Washington, DC 20037 (United States); Jurjus, Rosalyn A. [Department of Anatomy and Regenerative Biology, The George Washington University, Washington, DC 20037 (United States); Ceryak, Susan M., E-mail: phmsmc@gwumc.edu [Department of Pharmacology and Physiology, The George Washington University, Washington, DC 20037 (United States)

    2012-02-15

    Airborne hexavalent chromate, Cr(VI), has been identified by the Environmental Protection Agency as a possible health threat in urban areas, due to the carcinogenic potential of some of its forms. Particulate chromates are produced in many different industrial settings, with high levels of aerosolized forms historically documented. Along with an increased risk of lung cancer, a high incidence of allergic asthma has been reported in workers exposed to certain inhaled particulate Cr(VI) compounds. However, a direct causal association between Cr(VI) and allergic asthma has not been established. We recently showed that inhaled particulate Cr(VI) induces an innate neutrophilic inflammatory response in BALB/c mice. In the current studies we investigated how the inflammation induced by inhaled particulate Cr(VI) might alter the pathology of an allergic asthmatic response. We used a well-established mouse model of allergic asthma. Groups of ovalbumin protein (OVA)-primed mice were challenged either with OVA alone, or with a combination of OVA and particulate zinc chromate, and various parameters associated with asthmatic responses were measured. Co-exposure to particulate Cr(VI) and OVA mediated a mixed form of asthma in which both eosinophils and neutrophils are present in airways, tissue pathology is markedly exacerbated, and airway hyperresponsiveness is significantly increased. Taken together these findings suggest that inhalation of particulate forms of Cr(VI) may augment the severity of ongoing allergic asthma, as well as alter its phenotype. Such findings may have implications for asthmatics in settings in which airborne particulate Cr(VI) compounds are present at high levels. -- Highlights: ► Allergic asthma correlated with exposure to certain inhaled particulate chromates. ► Direct causal association between Cr(VI) and allergic asthma not established. ► Cr exacerbated pathology and airway hyperresponsiveness in an OVA-challenged mouse. ► Particulate Cr

  17. Assessment of inhalation dose sensitivity by physicochemical properties of airborne particulates containing naturally occurring radioactive materials

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Si Young; Choi, Cheol Kyu; Kim, Yong Geon; Choi, Won Chul; Kim, Kwang Pyo [Kyung Hee University, Seoul (Korea, Republic of)

    2015-12-15

    Facilities processing raw materials containing naturally occurring radioactive materials (NORM) may give rise to enhanced radiation dose to workers due to chronic inhalation of airborne particulates. Internal radiation dose due to particulate inhalation varies depending on particulate properties, including size, shape, density, and absorption type. The objective of the present study was to assess inhalation dose sensitivity to physicochemical properties of airborne particulates. Committed effective doses to workers resulting from inhalation of airborne particulates were calculated based on International Commission on Radiological Protection 66 human respiratory tract model. Inhalation dose generally increased with decreasing particulate size. Committed effective doses due to inhalation of 0.01μm sized particulates were higher than doses due to 100μm sized particulates by factors of about 100 and 50 for {sup 238}U and {sup 230}Th, respectively. Inhalation dose increased with decreasing shape factor. Shape factors of 1 and 2 resulted in dose difference by about 18 %. Inhalation dose increased with particulate mass density. Particulate mass densities of 11 g·cm{sup -3} and 0.7 g·cm{sup -3} resulted in dose difference by about 60 %. For {sup 238}U, inhalation doses were higher for absorption type of S, M, and F in that sequence. Committed effective dose for absorption type S of {sup 238}U was about 9 times higher than dose for absorption F. For {sup 230}Th, inhalation doses were higher for absorption type of F, M, and S in that sequence. Committed effective dose for absorption type F of {sup 230}Th was about 16 times higher than dose for absorption S. Consequently, use of default values for particulate properties without consideration of site specific physiochemical properties may potentially skew radiation dose estimates to unrealistic values up to 1-2 orders of magnitude. For this reason, it is highly recommended to consider site specific working materials and

  18. Dual-Use Threat Assessment Framework - An Attempt to Quantify the Risk

    International Nuclear Information System (INIS)

    Stephen, E. R.; Lavigne, J. J.; Colton, B.

    2007-01-01

    Advances in the biosciences over the past decade have been rapid and transformative. While these advances offer significant benefit to society, they also provide very significant challenges in terms of security. Concerns over misuse and/or accidental use/release (dual use) although not new, are now being viewed through the security lens. There is a wide-spread view that public or private sector scientists, supported through investments by pharmaceutical, environmental and agricultural interests working in the fields that comprise biotechnology, posses the ability to assess the implications of their own work and work within a regime of self-control that is for the most part self-governing (codes of practice). On the other end of the spectrum are those that would codify or legislative control. All this is being done in the absence of a mechanism for quantifying the threat. This presentation will discuss the development of an assessment framework that addresses both actual and potential threats. The framework was developed based on available intelligence and other open source information along with interviews with those persons familiar with the concept of dual use and the multiple, sometimes competing agendas of a variety of interest groups. The framework will help to bring some clarity to the discussion and at the same time, help to inform those that are positioned to respond to the threat. (author)

  19. A robust sebum, oil, and particulate pollution model for assessing cleansing efficacy of human skin.

    Science.gov (United States)

    Peterson, G; Rapaka, S; Koski, N; Kearney, M; Ortblad, K; Tadlock, L

    2017-06-01

    With increasing concerns over the rise of atmospheric particulate pollution globally and its impact on systemic health and skin ageing, we have developed a pollution model to mimic particulate matter trapped in sebum and oils creating a robust (difficult to remove) surrogate for dirty, polluted skin. To evaluate the cleansing efficacy/protective effect of a sonic brush vs. manual cleansing against particulate pollution (trapped in grease/oil typical of human sebum). The pollution model (Sebollution; sebum pollution model; SPM) consists of atmospheric particulate matter/pollution combined with grease/oils typical of human sebum. Twenty subjects between the ages of 18-65 were enrolled in a single-centre, cleansing study comparisons between the sonic cleansing brush (normal speed) compared to manual cleansing. Equal amount of SPM was applied to the centre of each cheek (left and right). Method of cleansing (sonic vs. manual) was randomized to the side of the face (left or right) for each subject. Each side was cleansed for five-seconds using the sonic cleansing device with sensitive brush head or manually, using equal amounts of water and a gel cleanser. Photographs (VISIA-CR, Canfield Imaging, NJ, USA) were taken at baseline (before application of the SPM), after application of SPM (pre-cleansing), and following cleansing. Image analysis (ImageJ, NIH, Bethesda, MD, USA) was used to quantify colour intensity (amount of particulate pollutants on the skin) using a scale of 0 to 255 (0 = all black pixels; 255 = all white pixels). Differences between the baseline and post-cleansing values (pixels) are reported as the amount of SPM remaining following each method of cleansing. Using a robust cleansing protocol to assess removal of pollutants (SPM; atmospheric particulate matter trapped in grease/oil), the sonic brush removed significantly more SPM than manual cleansing (P pollution method easily allows assessment of efficacy through image analysis. © 2016 The Authors

  20. Health risk assessment of occupational exposure to particulate-phase polycyclic aromatic hydrocarbons associated with Chinese, Malay and Indian cooking.

    Science.gov (United States)

    Wei See, Siao; Karthikeyan, Sathrugnan; Balasubramanian, Rajasekhar

    2006-03-01

    Food cooking using liquefied petroleum gas (LPG) has received considerable attention in recent years since it is an important source of particulate air pollution in indoor environments for non-smokers. Exposure to organic compounds such as polycyclic aromatic hydrocarbons (PAHs) contained in particles is of particular health concern since some of these compounds are suspected carcinogens. It is therefore necessary to chemically characterize the airborne particles emitted from gas cooking to assess their possible health impacts. In this work, the levels of fine particulate matter (PM(2.5)) and 16 priority PAHs were determined in three different ethnic commercial kitchens, specifically Chinese, Malay and Indian food stalls, where distinctive cooking methods were employed. The mass concentrations of PM(2.5) and PAHs, and the fraction of PAHs in PM(2.5) were the highest at the Malay stall (245.3 microg m(-3), 609.0 ng m(-3), and 0.25%, respectively), followed by the Chinese stall (201.6 microg m(-3), 141.0 ng m(-3), and 0.07%), and the Indian stall (186.9 microg m(-3), 37.9 ng m(-3), and 0.02%). This difference in the levels of particulate pollution among the three stalls may be attributed to the different cooking methods employed at the food stalls, the amount of food cooked, and the cooking time, although the most sensitive parameter appears to be the predominant cooking method used. Frying processes, especially deep-frying, produce more air pollutants, possibly due to the high oil temperatures used in such operations. Furthermore, it is found that frying, be it deep-frying at the Malay stall or stir-frying at the Chinese stall, gave rise to an abundance of higher molecular weight PAHs such as benzo[b]fluoranthene, indeno[1,2,3-cd]pyrene and benzo[g,h,i]perylene whereas low-temperature cooking, such as simmering at the Indian stall, has a higher concentration of lower molecular weight PAHs. In addition, the correlation matrices and diagnostic ratios of PAHs were

  1. Assessing the integrity of local area network materials accountability systems against insider threats

    International Nuclear Information System (INIS)

    Jones, E.; Sicherman, A.

    1996-07-01

    DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems

  2. Particulate matter emission from livestock houses: measurement methods, emission levels and abatement systems

    NARCIS (Netherlands)

    Winkel, Albert

    2016-01-01

    Animal houses are extremely dusty environments. Airborne particulate matter (PM) poses a health threat not only to the farmer and the animals, but, as a result of emissions from ventilation systems, also to residents living in livestock farming areas. In relation to this problem, the objectives

  3. How Stereotype Threat Affects Healthy Older Adults' Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara; Gatz, Margaret

    2015-11-01

    Stereotype threat can impair older adults' performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments' reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat's negative effects. By using a loss-avoidance frame, stereotype threat's negative effects can be attenuated or even eliminated. © The Author 2015. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  4. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    Directory of Open Access Journals (Sweden)

    Joshua Steven Reece

    Full Text Available Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri, Key tree cactus (Pilosocereus robinii, Florida duskywing butterfly (Ephyriades brunnea floridensis, and Key deer (Odocoileus virginianus clavium. We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  5. Many Species, Many Threats: A Composite Risk Assessment of Climate Impacts for Salmonids in the Pacific Northwest

    Science.gov (United States)

    Graham, M. C.; Greene, C.; Beechie, T. J.; Raymond, C.

    2016-02-01

    The life cycles of salmonid species span freshwater, estuarine, and marine environments, exposing these economically, ecologically, and culturally important species to a wide variety of climate change threats. The diverse life histories of salmonids make them differentially vulnerable to climate change based on their use of different habitat types and the variability in climate change threats across these habitat types. Previous studies have focused mainly on assessing the vulnerability of particular life stages for a few species. Hence, we lack a broad perspective on how multiple climate threats are expected to impact the entire salmonid community, which spend much of their lives in marine waters. This lack of knowledge hampers our ability to prioritize various adaptation strategies for salmonid conservation. In order to conduct a more extensive vulnerability study of salmonids, we performed a life cycle-based risk assessment of climate change threats for nine species of salmonids (species within Oncorhynchus, Salvelinus, and Prosopium genera) inhabiting the Skagit River watershed, which is subject to an array of climate impacts. Our risk assessment integrated projections of impacts from various climate threats in freshwater, estuarine, and marine ecosystems with expert-based assessments of species-specific sensitivity and exposure. We found that projections (multiple global climate models under moderate emission scenarios) of both changes in magnitude and frequency of three flow-related freshwater impacts (flooding, low flows, and suspended sediment pulses) were more severe than threats in estuarine and marine habitats for which we could obtain projections. Combining projections with expert-based sensitivity and exposure scores revealed that these three threats exhibited the highest risk across all species. Of the nine species, the four most vulnerable were Chinook and coho salmon, steelhead, and bull trout. Even though these salmonids spend much of their lives

  6. Assessing Local and Surrounding Threats to the Protected Area Network in a Biodiversity Hotspot: The Hengduan Mountains of Southwest China.

    Science.gov (United States)

    Ye, Xin; Liu, Guohua; Li, Zongshan; Wang, Hao; Zeng, Yuan

    2015-01-01

    Protected areas (PAs) not only serve as refuges of biodiversity conservation but are also part of large ecosystems and are vulnerable to change caused by human activity from surrounding lands, especially in biodiversity hotspots. Assessing threats to PAs and surrounding areas is therefore a critical step in effective conservation planning. We apply a threat framework as a means of quantitatively assessing local and surrounding threats to different types of PAs with gradient buffers, and to main ecoregions in the Hengduan Mountain Hotspot of southwest China. Our findings show that national protected areas (NPAs) have lower and significantly lower threat values (pprotected areas (PPAs) and other protected areas (OPAs), respectively, which indicates that NPAs are lands with a lower threat level and higher levels of protection and management. PAs have clear edge effects, as the proportion of areas with low threat levels decline dramatically in the 5-kilometer buffers just outside the PAs. However, NPAs suffered greater declines (58.3%) than PPAs (34.8%) and OPAs (33.4%) in the 5-kilometer buffers. Moreover, a significant positive correlation was found between the size of PAs and the proportion of areas with low threat levels that they contained in both PAs and PA buffers (p<0.01). To control or mitigate current threats at the regional scale, PA managers often require quantitative information related to threat intensities and spatial distribution. The threat assessment in the Hengduan Mountain Hotspot will be useful to policy makers and managers in their efforts to establish effective plans and target-oriented management strategies.

  7. Including impacts of particulate emissions on marine ecosystems in life cycle assessment: the case of offshore oil and gas production.

    Science.gov (United States)

    Veltman, Karin; Huijbregts, Mark A J; Rye, Henrik; Hertwich, Edgar G

    2011-10-01

    Life cycle assessment is increasingly used to assess the environmental performance of fossil energy systems. Two of the dominant emissions of offshore oil and gas production to the marine environment are the discharge of produced water and drilling waste. Although environmental impacts of produced water are predominantly due to chemical stressors, a major concern regarding drilling waste discharge is the potential physical impact due to particles. At present, impact indicators for particulate emissions are not yet available in life cycle assessment. Here, we develop characterization factors for 2 distinct impacts of particulate emissions: an increased turbidity zone in the water column and physical burial of benthic communities. The characterization factor for turbidity is developed analogous to characterization factors for toxic impacts, and ranges from 1.4 PAF (potentially affected fraction) · m(3) /d/kg(p) (kilogram particulate) to 7.0 x 10³ [corrected] for drilling mud particles discharged from the rig. The characterization factor for burial describes the volume of sediment that is impacted by particle deposition on the seafloor and equals 2.0 × 10(-1) PAF · m(3) /d/kg(p) for cutting particles. This characterization factor is quantified on the basis of initial deposition layer characteristics, such as height and surface area, the initial benthic response, and the recovery rate. We assessed the relevance of including particulate emissions in an impact assessment of offshore oil and gas production. Accordingly, the total impact on the water column and on the sediment was quantified based on emission data of produced water and drilling waste for all oil and gas fields on the Norwegian continental shelf in 2008. Our results show that cutting particles contribute substantially to the total impact of offshore oil and gas production on marine sediments, with a relative contribution of 55% and 31% on the regional and global scale, respectively. In contrast, the

  8. Beyond the Dirty Dozen: A Proposed Methodology for Assessing Future Bioweapon Threats.

    Science.gov (United States)

    Cieslak, Theodore J; Kortepeter, Mark G; Wojtyk, Ronald J; Jansen, Hugo-Jan; Reyes, Ricardo A; Smith, James O

    2018-01-01

    Defense policy planners and countermeasure developers are often faced with vexing problems involving the prioritization of resources and efforts. This is especially true in the area of Biodefense, where each new emerging infectious disease outbreak brings with it questions regarding the causative agent's potential for weaponization. Recent experience with West Nile Virus, Severe Acute Respiratory Syndrome, Monkeypox, and H1N1 Influenza highlights this problem. Appropriately, in each of these cases, the possibility of bioterrorism was raised, although each outbreak ultimately proved to have a natural origin. In fact, determining whether an outbreak has an unnatural origin can be quite difficult. Thus, the questions remain: could the causative agents of these and other emerging infectious disease outbreaks pose a future weaponization threat? And how great is that threat? Should precious resources be diverted from other defense efforts in order to prepare for possible hostile employment of novel diseases by belligerents? Answering such critical questions requires some form of systematic threat assessment. Through extensive collaborative work conducted within NATO's Biomedical Advisory Council, we developed a scoring matrix for evaluating the weaponization potential of the causative agents of such diseases and attempted to validate our matrix by examining the reproducibility of data using known threat agents. Our matrix included 12 attributes of a potential weapon and was provided, along with detailed scoring instructions, to 12 groups of biodefense experts in 6 NATO nations. Study participants were asked to score each of these 12 attributes on a scale of 0-3: Infectivity, Infection-to-Disease Ratio (Reliability), Predictability (& Incubation Period), Morbidity & Mortality (Virulence), Ease of Large-Scale Production & Storage, Aerosol Stability, Atmospheric Stability, Ease of Dispersal, Communicability, Prophylactic Countermeasure Availability, Therapeutic

  9. Assessing loss event frequencies of smart grid cyber threats: Encoding flexibility into FAIR using Bayesian network approach

    NARCIS (Netherlands)

    Le, Anhtuan; Chen, Yue; Chai, Kok Keong; Vasenev, Alexandr; Montoya, L.

    Assessing loss event frequencies (LEF) of smart grid cyber threats is essential for planning cost-effective countermeasures. Factor Analysis of Information Risk (FAIR) is a well-known framework that can be applied to consider threats in a structured manner by using look-up tables related to a

  10. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  11. Research on simulation technology for CBRN threat assessment system. Prediction technology for atmospheric dispersion of CBRN materials

    International Nuclear Information System (INIS)

    Miura, Hiroaki; Yano, Masanori; Nakata, Mitsuhiro; Takeda, Masaki

    2013-01-01

    The technical survey is conducted on the CBRN (Chemical, Biological, Radiological and Nuclear) Threat Assessment System Simulation Technology. The dispersion property of CBRN materials is summarized, and the current simulation techniques for CBRN materials dispersion are described. The effects of advection-diffusion, sedimentation by the gravity, buoyancy and wash-out by rainfall on the dispersion property of CBRN materials should be considered in the simulation modeling. The concentration distribution of CBRN materials is predicted through the meteorological analysis, the flow analysis and the dispersion analysis, and the hazard map will be produced from that. A selection of simulation method, model, domain and number of computational grid points is necessary to perform the simulation, considering the balance between calculation cost and prediction accuracy. For construction of CBRN Threat Assessment System, it is important how to integrate the developed simulation element technologies and threat assessment technologies. (author)

  12. Assessment of occupational exposure and contamination by means of airborne particulate matter and biomonitors using k0 instrumental neutron activation analysis

    International Nuclear Information System (INIS)

    Menezes, M.A. de B.C.; Pereira Maia, E.C.; Filho, S.S.; Albinati, C.

    2002-01-01

    In order to assess the elemental concentration level in a galvanizing industry and alert for the need to assess the outcome of a long-term exposure, scalp hair and toenail samples were used as bioindicators and the industry environment was evaluated through airborne particulate matter. The elemental concentration results have pointed out a high exposure to pollutant at workplaces and a high elemental concentration in biomonitors suggesting endogenous contamination. The majority of the elements determined in airborne particulate matter were also determined in hair and toenail samples. The results evidence the efficiency of these matrixes as biomonitors and the importance to carry out the airborne particulate matter sampling in parallel to these biomonitors mainly in occupational epidemiological studies. (author)

  13. 49 CFR 192.923 - How is direct assessment used and for what threats?

    Science.gov (United States)

    2010-10-01

    ...) PIPELINE AND HAZARDOUS MATERIALS SAFETY ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) PIPELINE SAFETY TRANSPORTATION OF NATURAL AND OTHER GAS BY PIPELINE: MINIMUM FEDERAL SAFETY STANDARDS Gas Transmission Pipeline Integrity Management § 192.923 How is direct assessment used and for what threats? (a...

  14. Assessment of Population Exposure to Coarse and Fine Particulate Matter in the Urban Areas of Chennai, India

    Directory of Open Access Journals (Sweden)

    Ramachandran Prasannavenkatesh

    2015-01-01

    Full Text Available Research outcomes from the epidemiological studies have found that the course (PM10 and the fine particulate matter (PM2.5 are mainly responsible for various respiratory health effects for humans. The population-weighted exposure assessment is used as a vital decision-making tool to analyze the vulnerable areas where the population is exposed to critical concentrations of pollutants. Systemic sampling was carried out at strategic locations of Chennai to estimate the various concentration levels of particulate pollution during November 2013–January 2014. The concentration of the pollutants was classified based on the World Health Organization interim target (IT guidelines. Using geospatial information systems the pollution and the high-resolution population data were interpolated to study the extent of the pollutants at the urban scale. The results show that approximately 28% of the population resides in vulnerable locations where the coarse particulate matter exceeds the prescribed standards. Alarmingly, the results of the analysis of fine particulates show that about 94% of the inhabitants live in critical areas where the concentration of the fine particulates exceeds the IT guidelines. Results based on human exposure analysis show the vulnerability is more towards the zones which are surrounded by prominent sources of pollution.

  15. Assessment of Population Exposure to Coarse and Fine Particulate Matter in the Urban Areas of Chennai, India.

    Science.gov (United States)

    Prasannavenkatesh, Ramachandran; Andimuthu, Ramachandran; Kandasamy, Palanivelu; Rajadurai, Geetha; Kumar, Divya Subash; Radhapriya, Parthasarathy; Ponnusamy, Malini

    2015-01-01

    Research outcomes from the epidemiological studies have found that the course (PM10) and the fine particulate matter (PM2.5) are mainly responsible for various respiratory health effects for humans. The population-weighted exposure assessment is used as a vital decision-making tool to analyze the vulnerable areas where the population is exposed to critical concentrations of pollutants. Systemic sampling was carried out at strategic locations of Chennai to estimate the various concentration levels of particulate pollution during November 2013-January 2014. The concentration of the pollutants was classified based on the World Health Organization interim target (IT) guidelines. Using geospatial information systems the pollution and the high-resolution population data were interpolated to study the extent of the pollutants at the urban scale. The results show that approximately 28% of the population resides in vulnerable locations where the coarse particulate matter exceeds the prescribed standards. Alarmingly, the results of the analysis of fine particulates show that about 94% of the inhabitants live in critical areas where the concentration of the fine particulates exceeds the IT guidelines. Results based on human exposure analysis show the vulnerability is more towards the zones which are surrounded by prominent sources of pollution.

  16. Joint Improvised-Threat Defeat Agency Needs to Improve Assessment and Documentation of Counter-Improvised Explosive Device Initiatives (Redacted)

    Science.gov (United States)

    2016-08-09

    E XC E L L E N C E Joint Improvised ‑Threat Defeat Agency Needs to Improve Assessment and Documentation of Counter‑ Improvised Explosive Device...USE ONLY DODIG-2016-120 (Project No. D2015-D000AE-0222.000) │ i Results in Brief Joint Improvised ‑Threat Defeat Agency Needs to Improve Assessment and...Documentation of Counter‑ Improvised Explosive Device Initiatives Visit us at www.dodig.mil Objective Our audit objective was to determine whether

  17. An Analysis of Campus Violence Threat Assessment Policy Implementation at Michigan Community Colleges

    Science.gov (United States)

    Panico, Russell T., Jr.

    2016-01-01

    This dissertation evaluated campus violence threat assessment policy and procedure implementation at the community college level of higher education. The importance of this topic was to provide a manageable and collaborative initiative for leadership at institutions of higher learning to identify, develop, implement, and evaluate a policy that can…

  18. Canada-United States Transboundary Particulate Matter Science Assessment

    Science.gov (United States)

    This 2004 document summarizes the findings of the Canada-U.S. subcommittee on Scientific Cooperation concerning the transboundary transport of particulate matter (PM) and PM precursors between the two countries.

  19. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  20. Threat Assessment and Targeted Violence at Institutions of Higher Education: Implications for Policy and Practice Including Unique Considerations for Community Colleges

    Science.gov (United States)

    Bennett, Laura; Bates, Michael

    2015-01-01

    This article provides an overview of the research on targeted violence, including campus violence, and the implications for policy and practice at institutions of higher education. Unique challenges of threat assessment in the community college setting are explored, and an overview of an effective threat assessment policy and team at William…

  1. How Stereotype Threat Affects Healthy Older Adults’ Performance on Clinical Assessments of Cognitive Decline: The Key Role of Regulatory Fit

    Science.gov (United States)

    Mather, Mara; Gatz, Margaret

    2015-01-01

    Objectives. Stereotype threat can impair older adults’ performance on clinical assessments for cognitive decline. We examined why this occurs. Based upon the regulatory focus account of stereotype threat, we predicted that the effects of stereotype threat should depend upon the assessments’ reward structure. Stereotype threat should be associated with poor performance when the assessment emphasizes gaining correct answers, but not when it emphasizes avoiding mistakes. Method. Healthy older adults completed a series of mental status examinations. Half of the participants completed these examinations under stereotype threat about their cognitive abilities. Monetary incentives were also manipulated. For half of the participants correct responding led to gains. For the remaining participants incorrect responding/forgetting led to losses. Results. Consistent with the regulatory focus account, stereotype threat was associated with poor performance when the mental status examinations had a gains-based structure, but not when they had a losses-based structure. Discussion. Older adults respond to stereotype threat by becoming vigilant to avoid the losses that will make them their worst. Researchers and clinicians can capitalize on this motivational change to combat stereotype threat’s negative effects. By using a loss-avoidance frame, stereotype threat’s negative effects can be attenuated or even eliminated. PMID:25752896

  2. Microbiota and Particulate Matter Assessment in Portuguese Optical Shops Providing Contact Lens Services

    Directory of Open Access Journals (Sweden)

    Carla Viegas

    2017-05-01

    Full Text Available The aim of this work was to assess the microbiota (fungi and bacteria and particulate matter in optical shops, contributing to a specific protocol to ensure a proper assessment. Air samples were collected through an impaction method. Surface and equipment swab samples were also collected side-by-side. Measurements of particulate matter were performed using portable direct-reading equipment. A walkthrough survey and checklist was also applied in each shop. Regarding air sampling, eight of the 13 shops analysed were above the legal requirement and 10 from the 26 surfaces samples were overloaded. In three out of the 13 shops fungal contamination in the analysed equipment was not detected. The bacteria air load was above the threshold in one of the 13 analysed shops. However, bacterial counts were detected in all sampled equipment. Fungi and bacteria air load suggested to be influencing all of the other surface and equipment samples. These results reinforce the need to improve air quality, not only to comply with the legal requirements, but also to ensure proper hygienic conditions. Public health intervention is needed to assure the quality and safety of the rooms and equipment in optical shops that perform health interventions in patients.

  3. Particulate emissions from biodiesel fuelled CI engines

    International Nuclear Information System (INIS)

    Agarwal, Avinash Kumar; Gupta, Tarun; Shukla, Pravesh C.; Dhar, Atul

    2015-01-01

    hydrocarbons, crustal and anthropogenic trace metals, sulfates, and nitrates) in order to comprehensively assess the effects of biodiesel usage on the environment as well as on the human health. Control of particulate emissions using various engine control parameters such as intake air boosting using turbocharging, high pressure fuel injections, multiple injections, exhaust gas recirculation (EGR), and after-treatment devices in combination with the use of biodiesel has been critically assessed and included in this review article

  4. Particulate versus non-particulate corticosteroids for transforaminal nerve root blocks. Comparison of outcomes in 494 patients with lumbar radiculopathy

    Energy Technology Data Exchange (ETDEWEB)

    Bensler, Susanne; Sutter, Reto; Pfirrmann, Christian W.A.; Peterson, Cynthia K. [Orthopaedic University Hospital Balgrist, Department of Radiology, Zurich (Switzerland); University of Zurich, Faculty of Medicine, Zurich (Switzerland)

    2018-03-15

    We set out to compare outcomes in CT-guided lumbar transforaminal nerve root block patients receiving either particulate or non-particulate corticosteroids. This was a retrospective comparative effectiveness outcomes study on two cohorts of lumbar radiculopathy patients. 321 received particulate and 173 non-particulate corticosteroids at CT-guided transforaminal lumbar nerve root injections. The particulate steroid was used from October 2009 until May 2014 and the non-particulate steroid was used from May 2014. Pain levels were collected at baseline using an 11-point numerical rating scale (NRS) and at 1 day, 1 week and 1 month. Overall 'improvement' was assessed using the Patients' Global Impression of Change (PGIC) at these same time points (primary outcome). The proportions of patients 'improved' were compared between the two groups using the Chi-square test. The NRS change scores were compared using the unpaired t-test. A significantly higher proportion of patients treated with particulate steroids were improved at 1 week (43.2 % vs. 27.7 %, p = 0.001) and at 1 month (44.3 % vs. 33.1 %, p = 0.019). Patients receiving particulate steroids also had significantly higher NRS change scores at 1 week (p = 0.02) and 1 month (p = 0.007). Particulate corticosteroids have significantly better outcomes than non-particulate corticosteroids. (orig.)

  5. Characteristics of Airborne Particulates Containing Naturally Occurring Radioactive Materials in Monazite Industry

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yong Geon; Choi, Cheol Kyu; Park, Il; Kim, Min Jun; Go, A Ra; Ji, Seung Woo; Kim, Kwang Pyo [Kyunghee University, Yongin (Korea, Republic of); Koo, Bon Cheol [KINS, Daejeon (Korea, Republic of)

    2016-05-15

    The objective of this study was to characterize physicochemical properties of airborne particulates at a monazite pulverization industry. The properties included particulate size distribution, concentration, shape, density, and radioactivity concentration. Monazite is one of the minerals containing naturally occurring radioactive material (NORM). Therefore, external and internal exposure can be occurred to the workers in monazite industry. The major exposure pathway of the workers is internal exposure due to inhalation of airborne particulates. According to International Commission on Radiological Protection (ICRP), radiation dose due to inhaled particulates containing NORM depends on particulate properties. Therefore, ICRP recommended the internal dose assessment using measured physicochemical properties of the airborne particulates. In the absence of specific information, ICRP provided default reference values. In this study, we characterized physicochemical properties of airborne particulates at a monazite pulverization industry. The databases of particulate information can be used for accurate internal dose assessment of worker.

  6. Assessing Women's Responses to Sexual Threat: Validity of a Virtual Role-Play Procedure

    Science.gov (United States)

    Jouriles, Ernest N.; Rowe, Lorelei Simpson; McDonald, Renee; Platt, Cora G.; Gomez, Gabriella S.

    2011-01-01

    This study evaluated the validity of a role-play procedure that uses virtual reality technology to assess women's responses to sexual threat. Forty-eight female undergraduate students were randomly assigned to either a standard, face-to-face role-play (RP) or a virtual role-play (VRP) of a sexually coercive situation. A multimethod assessment…

  7. An approach towards risk assessment for the use of a synergistic metallic diesel particulate filter (DPF) regeneration additive

    Science.gov (United States)

    Cook, S. L.; Richards, P. J.

    The motivations for legislation to set diesel emissions limits requiring the use of diesel particulate filters (DPF) are summarised. If the DPF is to be used, demonstration of regeneration (combustion of collected carbonaceous material) without additional emission problems is important. Potential metal emissions resulting from use of a synergistic Fe/Sr fuel-borne DPF regeneration catalyst are evaluated. Measurements over legislated drive cycle estimate the metals to comprise 1-2% of the solid material emitted, and the DPF to collect >99% of such material. Diesel particulate matter is used as a marker, and from existing air quality and emission inventory measurements, maximum conceivable increases of diet. In the context of reductions of other metals, particulate matter and pollutant emissions, the overall assessment is that the use of these metals to enable use of a DPF allows significant net environmental benefit to be obtained.

  8. Transweb - real time transportation threat assessment analysis tool: look what the future may bring for energy related infrastructure?

    International Nuclear Information System (INIS)

    Dilger, F.; Ballard, J.D.

    2005-01-01

    Full text: Transweb is envisioned as a transportation threat assessment program and this real time GIS based web assessment too (a.k.a., GTA for GIS threat assessment) can be used to plan railroad or highway shipments of hazardous waste (e.g., toxic industrial chemicals - TIC's) and high-level nuclear waste materials (e.g., like those destined for Yucca Mountain - HLW) that may be used in energy production facilities. Transweb will become a vulnerability mapping and analysis tool that can be used by transportation planners, emergency response personnel, security/safety managers, and law enforcement to route such shipments, make contingency plans in the event of altered road or rail conditions, and/or to assist in the response to an accident or human initiated event like terrorism. The initial phase of the project will seek to establish the protocol on highway shipments and follow up phases will focus on rail GTA's. This paper will report on the initial development of this analytical technique, define the problems associated with such analysis, and offer examples of its analytical possibilities for threat assessment relative to energy related facilities like nuclear power generation stations. (author)

  9. Research on chromium and arsenic speciation in atmospheric particulate matter: short review

    Science.gov (United States)

    Nocoń, Katarzyna; Rogula-Kozłowska, Wioletta; Widziewicz, Kamila

    2018-01-01

    Atmospheric particulate matter (PM) plays an important role in the distribution of elements in the environment. The PM-bound elements penetrates into the other elements of the environment, in two basic forms - those dissolved in the atmospheric precipitation and those permanently bound to PM particles. Those forms differs greatly in their mobility, thus posing a potential threat to living organisms. They can also be an immediate threat, while being inhaled. Chromium (Cr) and arsenic (As) belong to the group of elements whose certain chemical states exhibit toxic properties, that is Cr(VI) and As(III). Thus, recognition of the actual threat posed by Cr and As in the environment, including those present in PM, is possible only through the in depth speciation analysis. Research on the Cr and As speciation in PM, more than the analogous studies of their presence in other compartments of the environment, have been undertaken quite rarely. Hence the knowledge on the speciation of PM-bound As and Cr is still limited. The state of knowledge in the field of PM-bound Cr and As is presented in the paper. The issues related to the characterization and occurrence of Cr and As species in PM, the share of Cr and As species mass in different PM size fractions, and in PM of different origin is also summarized. The analytical techniques used in the speciation analysis of PM-bound Cr and As are also discussed. In the existing literature there is no data on the physical characteristics of Cr and As (bound to a different PM size fractions), and thus it still lack of data needed for a comprehensive assessment of the actual environmental and health threat posed by airborne Cr and As.

  10. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  11. 49 CFR 1522.121 - Security threat assessments for personnel of TSA-approved validation firms.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Security threat assessments for personnel of TSA... FOR ALL MODES OF TRANSPORTATION TSA-APPROVED VALIDATION FIRMS AND VALIDATORS TSA-Approved Validation... for personnel of TSA-approved validation firms. Each of the following must successfully complete a...

  12. 2007 accomplishment report for the Eastern and Western forest environmental threat assessment centers

    Science.gov (United States)

    Danny C. Lee; Jerome S. Beatty

    2008-01-01

    As chance would have it, the Eastern Forest and Western Wildland Environmental Threat Assessment Centers were created the same year (2005) that the Forest Service celebrated its centennial anniversary as an agency of the U.S. Department of Agriculture. The historic birth of the Forest Service provides a nice backdrop to view our own more modest beginnings. Both events...

  13. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  14. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  15. How Threat Assessment Could Become Self-Fulfilling Prophecy: Case of U.S.-China Relations

    Directory of Open Access Journals (Sweden)

    Muhamad Arif

    2016-12-01

    Full Text Available This article tries to explain how misperception can trigger conflict between countries. The article would employ spiral model of conflict proposed by Robert Jervis as a theoretical framework to scrutinize contemporary US and Chinese contemporary competition. As a result, this paper shows how threat assessment could trigger a spiral of conflict through state’s tendency to overestimate threat level and its failure to perceive that defensive behavior can be interpreted as offensive by the belligerent. Based on this analysis, the probability of conflicts can be reduced as each country tries to comprehend motivations that drive other behavior, perceptions and reactions that might arise as a result of the strategic empathy.

  16. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  17. ITAC, an insider threat assessment computer program

    International Nuclear Information System (INIS)

    Eggers, R.F.; Giese, E.W.

    1988-01-01

    The insider threat assessment computer program, ITAC, is used to evaluate the vulnerability of nuclear material processing facilities to theft of special nuclear material by one or more authorized insider adversaries. The program includes two main parts: one is used to determine the timeliness of nuclear material accounting tests for loss of special nuclear material, and the other determines pathway aggregate detection probabilities for physical protection systems and material control procedures that could detect the theft. Useful features of ITAC include its ability to (1) evaluate and quantify the timeliness of material accounting tests, (2) analyze branching systems of physical pathways and adversary strategies, (3) analyze trickle or abrupt theft situations for combinations of insiders, (4) accept input probabilities and times in the form of ranges rather than discrete points, and (5) simulate input data using Monte Carlo methods to produce statistically distributed aggregate delay times and detection probabilities. The ITAC program was developed by the Security Applications Center of Westinghouse Hanford Comapny and Boeing Computer Services, Richland, WA

  18. Emissions of particulate-bound elements from stationary diesel engine: Characterization and risk assessment

    Science.gov (United States)

    Betha, Raghu; Balasubramanian, Rajasekhar

    2011-09-01

    There has been an increasing concern about the emissions of airborne particulate matter (PM) from diesel engines because of their close association with adverse health and environmental impacts. Among the alternative fuels being considered, biodiesel made by the transesterification of waste cooking oil has received wide attention in recent years because of its low cost and the added advantage of reducing waste oil disposal. This study was conducted to make a comparative evaluation of the particulate-bound elements emitted from ultra low sulphur diesel (ULSD) and waste cooking oil-derived biodiesel (B100) and a blend of both the fuels (B50). It was observed that the PM mass concentrations were reduced by about 36% when B100 was used. Crustal elements such as Mg, K and Al were found to be in higher concentrations compared to other elements emitted from both B100 and ULSD. Zn, Cr, Cu, Fe, Ni, Mg, Ba, K were found to be higher in the biodiesel exhaust while Co, Pb, Mn, Cd, Sr, and As were found to be higher in the ULSD exhaust. To evaluate the potential health risk due to inhalation of PM emitted from diesel engines running on ULSD and B100, health risk estimates based on exposure and dose-response assessments of particulate-bound elements were calculated assuming exposure for 24 h. The findings indicate that the exposure to PM of the B100 exhaust is relatively more hazardous and may pose adverse health effects compared to ULSD.

  19. Software Requirement Specifications For ASocial Media Threat Assessment Tool

    Science.gov (United States)

    2017-12-01

    media means a much higher volume of threats than before, which taxes law enforcement’s ability to investigate each one. Complicating the investigation...Obtaining the identity of a Twitter account holder requires court paperwork based on probable cause or exigent circumstances. Second, social media...instant connectivity of social media means a much higher number of threats than before, which taxes law enforcement’s ability to investigate each one

  20. Canada-United States Transboundary Particulate Matter Science Assessment 2013

    Science.gov (United States)

    This 2013 document summarizes the findings of the Canada-U.S. subcommittee on Scientific Cooperation concerning the transboundary transport of particulate matter (PM) and PM precursors between the two countries.

  1. Health effects of fine particulate matter in life cycle impact assessment: findings from the Basel Guidance Workshop

    DEFF Research Database (Denmark)

    Fantke, Peter; Jolliet, Olivier; Evans, John S.

    2015-01-01

    Purpose Fine particulate matter (PM2.5) is considered to be one of the most important environmental factors contributing to the global human disease burden. However, due to the lack of broad consensus and harmonization in the life cycle assessment (LCA) community, there is no clear guidance on ho...

  2. Conceptual framework for improved wind-related forest threat assessment in the Southeastern United States

    Science.gov (United States)

    Scott L. Goodrick; John A. Stanturf

    2010-01-01

    In the Southeastern United States, forests are subject to a variety of damage-causing wind phenomena that range in scale from very localized (downbursts and tornadoes) to broad spatial scales (hurricanes). Incorporating the threat of wind damage into forest management plans requires tools capable of assessing risk across this range of scales. Our conceptual approach...

  3. Exposure assessment of particulates originating from diesel and CNG fuelled engines

    Energy Technology Data Exchange (ETDEWEB)

    Oravisjaervi, K.; Pietikaeinen, M.; Keiski, R. L. (Univ. of Oulu, Dept. of Process and Environmental Engineering (Finland)). email: kati.oravisjarvi@oulu.fi; Voutilainen, A. (Univ. of Kuopio, Dept. of Physics (Finland)); Haataja, M. (Oulu Univ. of Applied Sciences (Finland); Univ. of Oulu, Dept. of Mechanical Engineering (Finland)); Ruuskanen, J. (Univ. of Kuopio, Dept. of Environmental Sciences (Finland)); Rautio, A. (Univ. of Oulu, Thule Inst. (Finland))

    2009-07-01

    Particulates emitted from combustion engines have been a great concern in past years due to their adverse health effects, such as pulmonary and cardiovascular diseases, morbidity and mortality. The source of particulates can be stationary and transient, such as gas and oil fuelled engines, turbines and boilers. Particulate matter (PM) dispersed into ambient air can be classified in many ways: the mechanism of the formation, the size and the composition. Fine particles (PM2.5) are particles with an aerodynamic diameter less than 2.5 mum and particles, greater than 2.5 mum in diameter are generally referred to as coarse particles (PM10). PM2.5 is also called the respirable fraction, because they can penetrate to the unciliated regions of the lung. Fine particles consist of so called ultrafine particles (an aerodynamic diameter less than 0.1 mum). The sizes of particulates emitted from combustion processes range between 10 nm and 100 mum, and are usually a mixture of unburned and partially burned hydrocarbons. Diesel exhaust particles have a mass median diameter of 0.05-1.0 mum. They are a complex mixture of elemental carbon, a variety of hydrocarbons, sulphur compounds, and other species. They consist of a numerous spherical primary particles, which are agglomerated into aggregates. Particles from natural gas engine emissions range from 0.01-0.7 mum. Increase in PM10 pollution has been found to be associated with a range of adverse health effects, such as increased use of medication for asthma, attacks of asthma in patients with pre-existing asthma, attacks of chronic obstructive pulmonary disease (COPD), deaths from respiratory causes, admission to hospital for cardiovascular causes, deaths from heart attacks and deaths from strokes. While it is unknown, which particulate matter component is the most hazardous for humans, a number of factors suggest that ultrafine particles may be more toxic than larger particles. Ultrafine particles have a large surface area per

  4. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  5. Assessment of the Emerging Biocruise Threat

    Science.gov (United States)

    2000-08-01

    more about Los Angeles than they do about Taiwan.”15 And obviously believing in the efficacy of their long-range nuclear missile capability in... vaccinated against anthrax. Apparently, Hussein was deterred from using his WMD by U.S. and Israeli threats of nuclear retaliation. The credibility of the...gangrene, aflatoxin, trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus , camel pox Israel Researching

  6. Use of modified threat reduction assessments to estimate success of conservation measures within and adjacent to Kruger National Park, South Africa.

    Science.gov (United States)

    Anthony, Brandon P

    2008-12-01

    The importance of biodiversity as natural capital for economic development and sustaining human welfare is well documented. Nevertheless, resource degradation rates and persistent deterioration of human welfare in developing countries is increasingly worrisome. Developing effective monitoring and evaluation schemes and measuring biodiversity loss continue to pose unique challenges, particularly when there is a paucity of historical data. Threat reduction assessment (TRA) has been proposed as a method to measure conservation success and as a proxy measurement of conservation impact, monitoring threats to resources rather than changes to biological parameters themselves. This tool is considered a quick, practical alternative to more cost- and time-intensive approaches, but has inherent weaknesses. I conducted TRAs to evaluate the effectiveness of Kruger National Park (KNP) and Limpopo Province, South Africa, in mitigating threats to biodiversity from 1994 to 2004 in 4 geographical areas. I calculated TRA index values in these TRAs by using the original scoring developed by Margoluis and Salafsky (2001)and a modified scoring system that assigned negative mitigation values to incorporate new or worsening threats. Threats were standardized to allow comparisons across the sites. Modified TRA index values were significantly lower than values derived from the original scoring exercise. Five of the 11 standardized threats were present in all 4 assessment areas, 2 were restricted to KNP, 2 to Limpopo Province, and 2 only to Malamulele municipality. These results indicate, first, the need to integrate negative mitigation values into TRA scoring. By including negative values, investigators will be afforded a more accurate picture of biodiversity threats and of temporal and spatial trends across sites. Where the original TRA scoring was used to measure conservation success, reevaluation of these cases with the modified scoring is recommended. Second, practitioners must

  7. The Armored Brigade Combat Team (ABCT) in the Future: An Assessment of Capabilities Against the Hybrid Threat in the Future Operational Environment

    Science.gov (United States)

    2013-06-13

    requirements, followed by a tactical case study assessment, and a strengths, weaknesses, opportunities, and threats ( SWOT ) analysis of the BCTs against a...strategic and operational deployment. This information further developed the case study SWOT analysis of the BCTs against a hybrid threat. The SWOT ...a SWOT analysis . The next section addressed is the analysis . The analysis is comprised of the strategic capabilities assessment and the tactical

  8. An integrative approach to threat assessment and management: security and mental health response to a threatening client.

    Science.gov (United States)

    Farkas, Gary M; Tsukayama, John K

    2012-01-01

    Workplace violence threat assessment and management practices represent an interdisciplinary approach to the diversion of potentially dangerous employees and clients. This case study illustrates such an intervention in a complex situation involving a social service agency and its client. Following a curtailment of services and an arrest, the client developed an escalating homicidal anger toward the agency administrator. Once a Tarasoff warning was received, the agency contacted a security company who organized a threat assessment and management plan involving interdisciplinary collaboration. Information developed in the course of the assessment was presented to prosecutors, who facilitated the client's arrest and involuntary psychiatric commitment until he was judged to be no longer dangerous. This case ultimately involved an integration of the services of security, law enforcement, mental health professionals, prosecutors, the courts and the state mental health system in leading to a successful diversion of the client from a path of intended violence.

  9. Trace metals concentration assessment in urban particulate matter ...

    African Journals Online (AJOL)

    This study was conducted to investigate the distribution and correlation of selected trace elements (Ca, Cd, Co, Cr, Cu, Fe, Mn, Ni, Pb, and Zn) in Yenagoa, Bayelsa State and its environs. Air particulate matter was collected gravimetrically at five stations (using a high volume portable SKC air check MTXSidekickair sampler ...

  10. An assessment of common atmospheric particulate matter sampling ...

    African Journals Online (AJOL)

    The method detection limit was also low (0.2 to 1 μg/L) for most metals, and 50% and less standard deviation to mean ratios were obtained for Ni and Pb. Key words: Toxic metals, inductively coupled plasma mass spectroscopy, scanning electron microscopy coupled with energy dispersive spectrometry, particulate matter, ...

  11. Initial threat assessment. Radiological risks associated with SevRAO facilities falling within the regulatory supervision responsibilities of FMBA[Russian Federation

    Energy Technology Data Exchange (ETDEWEB)

    Ilin, Leonid; Kochetkov, Oleg; Simakov, Anatoly; Shandala, Natalya; Savkin, Mikhail; Sneve, Malgorzata K.; Boerretzen, Peer; Jaworska, Alicja; Smith, Graham; Barraclough, Ian; Kruse, Phil

    2005-07-01

    The purpose of this initial threat assessment is to obtain a view, from the regulatory perspective of FMBA, of the most important issues which require supervision and regulatory development, regarding work which has to be carried out at the Andreeva Bay and Grcmikha. The main radiological threats have been identified and actions to reduce the threats have been proposed. Situations where regulations and procedures for workers on-site need to be developed have been identified. This will be a basis for further development of Russian regulation and procedures. (Author)

  12. The concept of leakage in threat assessment.

    Science.gov (United States)

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  13. Threat Assessment of Small Near-Earth Objects

    Science.gov (United States)

    Ryan, E.; Ryan, W.

    2010-09-01

    Researchers at the Magdalena Ridge Observatory’s (MRO) 2.4-meter telescope facility are in their third year of a program to derive physical characterization information on some of the smallest (less than 200 meters in diameter) objects in the Near-Earth Object (NEO) population. Tiny comets and asteroids are being discovered by survey programs on a routine basis, so targets available for study have been abundant. Our primary objective is to derive rotation rates for these objects, and to place the results in context with previous data to enhance our understanding of asteroid impact physics and better address the threat from NEOs having Earth-crossing orbits. Rotation rate can be used to infer internal structure, which is a physical property important to assessing the energy needed for object disruption or other forms of hazard mitigation. Since the existing database of rotational data derived from lightcurves of objects in this small size regime is sparse, collection of additional observational data is beneficial. Acquiring more knowledge about the physical nature of NEOs not only contributes to general scientific pursuits, but is important to planetary defense.

  14. Comparative Assessment of Particulate Air Pollution Exposure from Municipal Solid Waste Incinerator Emissions

    Science.gov (United States)

    Ashworth, Danielle C.; Fuller, Gary W.; Toledano, Mireille B.; Font, Anna; Elliott, Paul; Hansell, Anna L.; de Hoogh, Kees

    2013-01-01

    Background. Research to date on health effects associated with incineration has found limited evidence of health risks, but many previous studies have been constrained by poor exposure assessment. This paper provides a comparative assessment of atmospheric dispersion modelling and distance from source (a commonly used proxy for exposure) as exposure assessment methods for pollutants released from incinerators. Methods. Distance from source and the atmospheric dispersion model ADMS-Urban were used to characterise ambient exposures to particulates from two municipal solid waste incinerators (MSWIs) in the UK. Additionally an exploration of the sensitivity of the dispersion model simulations to input parameters was performed. Results. The model output indicated extremely low ground level concentrations of PM10, with maximum concentrations of incinerator characteristics, magnitude of emissions, and surrounding meteorological and topographical conditions are considered. Reducing exposure misclassification is particularly important in environmental epidemiology to aid detection of low-level risks. PMID:23935644

  15. Adapting to the Changing Climate: An Assessment of Local Health Department Preparations for Climate Change-Related Health Threats, 2008-2012.

    Science.gov (United States)

    Roser-Renouf, Connie; Maibach, Edward W; Li, Jennifer

    2016-01-01

    Climate change poses a major public health threat. A survey of U.S. local health department directors in 2008 found widespread recognition of the threat, but limited adaptive capacity, due to perceived lack of expertise and other resources. We assessed changes between 2008 and 2012 in local public health departments' preparedness for the public health threats of climate change, in light of increasing national polarization on the issue, and widespread funding cutbacks for public health. A geographically representative online survey of directors of local public health departments was conducted in 2011-2012 (N = 174; response rate = 50%), and compared to the 2008 telephone survey results (N = 133; response rate = 61%). Significant polarization had occurred: more respondents in 2012 were certain that the threat of local climate change impacts does/does not exist, and fewer were unsure. Roughly 10% said it is not a threat, compared to 1% in 2008. Adaptation capacity decreased in several areas: perceived departmental expertise in climate change risk assessment; departmental prioritization of adaptation; and the number of adaptation-related programs and services departments provided. In 2008, directors' perceptions of local impacts predicted the number of adaptation-related programs and services their departments offered, but in 2012, funding predicted programming and directors' impact perceptions did not. This suggests that budgets were constraining directors' ability to respond to local climate change-related health threats. Results also suggest that departmental expertise may mitigate funding constraints. Strategies for overcoming these obstacles to local public health departments' preparations for climate change are discussed.

  16. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  17. Ambient particulate matter as a risk factor for suicide.

    Science.gov (United States)

    Kim, Changsoo; Jung, Sang Hyuk; Kang, Dae Ryong; Kim, Hyeon Chang; Moon, Ki Tae; Hur, Nam Wook; Shin, Dong Chun; Suh, Il

    2010-09-01

    The authors assessed the relationship between exposure to ambient particulate matter and suicide in urban settings during a 1-year period. The association between particulate matter and suicide was determined using a time-stratified case-crossover approach in which subjects served as their own controls. All suicide cases (4,341) in 2004 that occurred in seven cities in the Republic of Korea were included. Hourly mean concentrations of particulate matter suicide risk associated with an interquartile range increase in particulate matter was determined by conditional logistic regression analysis after adjusting for national holidays and meteorological factors. Subgroup analysis was performed after stratification by underlying disease (cardiovascular disease, diabetes mellitus, chronic obstructive pulmonary disease, cancer, and psychiatric illness). The largest associations were a 9.0% increase (95% CI=2.4-16.1) and a 10.1% (95% CI=2.0-19.0) increase in suicide risk related to an interquartile range increase in particulate matter suicide) and particulate matter suicide), respectively. Among individuals with cardiovascular disease, a significant association between particulate matter suicide) and suicide was observed (18.9%; 95% CI=3.2-37.0). Conclusions: A transient increase in particulate matter was associated with increased suicide risk, especially for individuals with preexisting cardiovascular disease.

  18. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    Science.gov (United States)

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  19. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    Science.gov (United States)

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  20. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  1. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  2. Particulate Matter: a closer look

    NARCIS (Netherlands)

    Buijsman E; Beck JP; Bree L van; Cassee FR; Koelemeijer RBA; Matthijsen J; Thomas R; Wieringa K; LED; MGO

    2005-01-01

    The summary in booklet form 'Fijn stof nader bekeken' (Particulate Matter: a closer look) , published in Dutch by the Netherlands Environmental Assessment Agency (MNP) and the Environment and Safety Division of the National Institute for Public Health and the Environment (RIVM), has been designed to

  3. Preliminary assessment of air quality for sulphur dioxide, nitrogen dioxide, nitrogen oxides, particulate matter, and lead in the Netherlands under European legislation

    NARCIS (Netherlands)

    Breugel PB van; Buijsman E; LLO

    2001-01-01

    The current air quality in the Netherlands for sulphur dioxide, nitrogen dioxide, nitrogen oxides, particulate matter and lead has been assessed in the context of limit values, margins of tolerance and the assessment thresholds used in the first daughter directive for air quality of the European

  4. Particulate Matter (Environmental Health Student Portal)

    Science.gov (United States)

    ... that includes curriculum standards, assessments, and lesson rubrics. Sources of Particulate Matter (U.S. Environmental Protection Agency) - Information and activity on interpreting ... U.S. National Library of Medicine National Institutes of Health U.S. Department ...

  5. The Human Threat to River Ecosystems at the Watershed Scale: An Ecological Security Assessment of the Songhua River Basin, Northeast China

    Directory of Open Access Journals (Sweden)

    Yuan Shen

    2017-03-01

    Full Text Available Human disturbances impact river basins by reducing the quality of, and services provided by, aquatic ecosystems. Conducting quantitative assessments of ecological security at the watershed scale is important for enhancing the water quality of river basins and promoting environmental management. In this study, China’s Songhua River Basin was divided into 204 assessment units by combining watershed and administrative boundaries. Ten human threat factors were identified based on their significant influence on the river ecosystem. A modified ecological threat index was used to synthetically evaluate the ecological security, where frequency was weighted by flow length from the grids to the main rivers, while severity was weighted by the potential hazard of the factors on variables of river ecosystem integrity. The results showed that individual factors related to urbanization, agricultural development and facility construction presented different spatial distribution characteristics. At the center of the plain area, the provincial capital cities posed the highest level of threat, as did the municipal districts of prefecture-level cities. The spatial relationships between hot spot locations of the ecological threat index and water quality, as well as the distribution areas of critically endangered species, were analyzed. The sensitivity analysis illustrated that alteration of agricultural development largely changed the ecological security level of the basin. By offering a reference for assessing ecological security, this study can enhance water environmental planning and management.

  6. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  7. Ecologically relevant neurobehavioral assessment of the development of threat learning

    Science.gov (United States)

    Mouly, Anne-Marie

    2016-01-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor–shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10–15 d old), pups have access to both networks: odor–shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. PMID:27634146

  8. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  9. Environmental and health impacts of fine and ultrafine metallic particles: Assessment of threat scores

    Energy Technology Data Exchange (ETDEWEB)

    Goix, Sylvaine [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Lévêque, Thibaut [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); ADEME (French Agency for Environment and Energy Management), 20 Avenue du Grésillé, BP 90406, 49004 Angers Cedex 01 (France); Xiong, Tian-Tian [Université de Toulouse, INP-ENSAT, Av. Agrobiopôle, 31326 Castanet-Tolosan (France); UMR 5245 CNRS-INP-UPS, EcoLab (Laboratoire d' écologie fonctionnelle), Avenue de l' Agrobiopôle, BP 32607, 31326 Castanet-Tolosan (France); Schreck, Eva [Géosciences Environnement Toulouse (GET), Observatoire Midi Pyrénées, Université de Toulouse, CNRS, IRD, 14 Avenue E. Belin, F-31400 Toulouse (France); and others

    2014-08-15

    This study proposes global threat scores to prioritize the harmfulness of anthropogenic fine and ultrafine metallic particles (FMP) emitted into the atmosphere at the global scale. (Eco)toxicity of physicochemically characterized FMP oxides for metals currently observed in the atmosphere (CdO, CuO, PbO, PbSO{sub 4}, Sb{sub 2}O{sub 3}, and ZnO) was assessed by performing complementary in vitro tests: ecotoxicity, human bioaccessibility, cytotoxicity, and oxidative potential. Using an innovative methodology based on the combination of (eco)toxicity and physicochemical results, the following hazard classification of the particles is proposed: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}. Both cadmium compounds exhibited the highest threat score due to their high cytotoxicity and bioaccessible dose, whatever their solubility and speciation, suggesting that cadmium toxicity is due to its chemical form rather than its physical form. In contrast, the Sb{sub 2}O{sub 3} threat score was the lowest due to particles with low specific area and solubility, with no effects except a slight oxidative stress. As FMP physicochemical properties reveal differences in specific area, crystallization systems, dissolution process, and speciation, various mechanisms may influence their biological impact. Finally, this newly developed and global approach could be widely used in various contexts of pollution by complex metal particles and may improve risk management. - Highlights: • Seven micro- and nano- monometallic characterized particles were studied as references. • Bioaccessibility, eco and cytotoxicity, and oxidative potential assays were performed. • According to calculated threat scores: CdCl{sub 2}∼CdO>CuO>PbO>ZnO>PbSO{sub 4}>Sb{sub 2}O{sub 3}.

  10. Buckling-driven delamination growth in composite laminates: Guidelines for assessing the threat posed by interlaminar matrix delamination

    DEFF Research Database (Denmark)

    Bhushan, Karihaloo; Stang, Henrik

    2008-01-01

    This paper is concerned with development of a simple procedure to assess the threat posed by interlaminar matrix delaminations to the integrity of composite laminates when they are situated in a compressive stress field. Depending upon the size of the delamination, its location below the surface...

  11. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  12. Attentional bias towards health-threat information in chronic fatigue syndrome.

    Science.gov (United States)

    Hou, Ruihua; Moss-Morris, Rona; Bradley, Brendan P; Peveler, Robert; Mogg, Karin

    2008-07-01

    To investigate whether individuals with chronic fatigue syndrome (CFS) show an attentional bias towards health-threat information. Attentional bias (AB) was assessed in individuals with CFS and healthy controls using a visual probe task which presented health-threat and neutral words and pictures for 500 ms. Self-report questionnaires were used to assess CFS symptoms, depression, anxiety, and social desirability. Compared to a healthy control group, the CFS group showed an enhanced AB towards heath-threat stimuli relative to neutral stimuli. The AB was not influenced by the type of stimulus (pictures vs. words). The finding of an AB towards health-threat information in individuals with CFS is supportive of models of CFS which underlie cognitive behavior therapy.

  13. The Particulate Nature of Matter in Science Education and in Science.

    Science.gov (United States)

    Vos, Wobbe de; Verdonk, Adri H.

    1996-01-01

    Discusses ideas about the particulate nature of matter and assesses the extent to which these represent a compromise between scientific and educational considerations. Analyzes relations between the particulate nature of matter in science and science education in an attempt to understand children's inclination to attribute all kinds of macroscopic…

  14. Domestic smoke exposure is associated with alveolar macrophage particulate load.

    Science.gov (United States)

    Fullerton, Duncan G; Jere, Khuzwayo; Jambo, Kondwani; Kulkarni, Neeta S; Zijlstra, Eduard E; Grigg, Jonathan; French, Neil; Molyneux, Malcolm E; Gordon, Stephen B

    2009-03-01

    Indoor air pollution is associated with impaired respiratory health. The pre-dominant indoor air pollutant to which two billion of the world's population is exposed is biomass fuel smoke. We tested the hypothesis that reported smoke exposure in men and women is associated with increased alveolar macrophage uptake of biomass smoke particulates. Healthy volunteers attending for research bronchoscopy in Malawi completed a questionnaire assessment of smoke exposure. Particulate matter visible in alveolar macrophages (AM) was quantified using digital image analysis. The geometric mean of the percentage area of the cytoplasm occupied by particulates in 50 cover-slip adherent AM was calculated and termed particulate load. In 57 subjects (40 men and 17 women) there was a significant difference between the particulate load in groups divided according to pre-dominant lighting form used at home (ANOVA P = 0.0009) and type of cooking fuel (P = 0.0078). Particulate load observed in macrophages is associated with the reported type of biomass fuel exposure. Macrophage function in relation to respiratory health should now be investigated in biomass smoke exposed subjects.

  15. Diesel Particulate Matter Polygons, California, 2005, NATA

    Data.gov (United States)

    U.S. Environmental Protection Agency — The national-scale assessment includes 177 air pollutants (a subset of the air toxics on the Clean Air Act's list of 187 air toxics plus diesel particulate matter...

  16. Diesel Particulate Matter Polygons, Hawaii, 2005, NATA

    Data.gov (United States)

    U.S. Environmental Protection Agency — The national-scale assessment includes 177 air pollutants (a subset of the air toxics on the Clean Air Act's list of 187 air toxics plus diesel particulate matter...

  17. Diesel Particulate Matter Polygons, Arizona, 2005, NATA

    Data.gov (United States)

    U.S. Environmental Protection Agency — The national-scale assessment includes 177 air pollutants (a subset of the air toxics on the Clean Air Act's list of 187 air toxics plus diesel particulate matter...

  18. Diesel Particulate Matter Polygons, Nevada, 2005, NATA

    Data.gov (United States)

    U.S. Environmental Protection Agency — The national-scale assessment includes 177 air pollutants (a subset of the air toxics on the Clean Air Act's list of 187 air toxics plus diesel particulate matter...

  19. Comparative Cytotoxicity and Genotoxicity of Particulate and Soluble Hexavalent Chromium in Human and Sperm Whale (Physeter macrocephalus) Skin Cells

    Science.gov (United States)

    Li Chen, Tânia; LaCerte, Carolyne; Wise, Sandra S.; Holmes, Amie; Martino, Julieta; Wise, John Pierce; Thompson, W. Douglas; Wise, John Pierce

    2014-01-01

    Chromium (Cr) is a global marine pollutant, present in marine mammal tissues. Hexavalent chromium [Cr(VI)] is a known human carcinogen. In this study we compare the cytotoxic and clastogenic effects of Cr(VI) in human (Homo sapiens) and sperm whale (Physeter macrocephalus) skin fibroblasts. Our data show that increasing concentrations of both particulate and soluble Cr(VI) induce increasing amounts of cytotoxicity and clastogenicity in human and sperm whale skin cells. Furthermore, the data show that sperm whale cells are resistant to these effects exhibiting less cytotoxicity and genotoxicity than the human cells. Differences in Cr uptake accounted for some but not all of the differences in particulate and soluble Cr(VI) genotoxicity, although it did explain the differences in particulate Cr(VI) cytotoxicity. Altogether the data indicate that Cr(VI) is a genotoxic threat to whales, but also suggest that whales have evolved cellular mechanisms to protect them against the genotoxicity of environmental agents such as Cr(VI). PMID:21466859

  20. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  1. Ecologically relevant neurobehavioral assessment of the development of threat learning.

    Science.gov (United States)

    Boulanger Bertolus, Julie; Mouly, Anne-Marie; Sullivan, Regina M

    2016-10-01

    As altricial infants gradually transition to adults, their proximate environment changes. In three short weeks, pups transition from a small world with the caregiver and siblings to a complex milieu rich in dangers as their environment expands. Such contrasting environments require different learning abilities and lead to distinct responses throughout development. Here, we will review some of the learned fear conditioned responses to threats in rats during their ontogeny, including behavioral and physiological measures that permit the assessment of learning and its supporting neurobiology from infancy through adulthood. In adulthood, odor-shock conditioning produces robust fear learning to the odor that depends upon the amygdala and related circuitry. Paradoxically, this conditioning in young pups fails to support fear learning and supports approach learning to the odor previously paired with shock. This approach learning is mediated by the infant attachment network that does not include the amygdala. During the age range when pups transition from the infant to the adult circuit (10-15 d old), pups have access to both networks: odor-shock conditioning in maternal presence uses the attachment circuit but the adult amygdala-dependent circuit when alone. However, throughout development (as young as 5 d old) the attachment associated learning can be overridden and amygdala-dependent fear learning supported, if the mother expresses fear in the presence of the pup. This social modulation of the fear permits the expression of defense reactions in life threatening situations informed by the caregiver but prevents the learning of the caregiver itself as a threat. © 2016 Boulanger Bertolus et al.; Published by Cold Spring Harbor Laboratory Press.

  2. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures

    National Research Council Canada - National Science Library

    Foster, Jr., John S; Gjelde, Earl; Graham, William R; Hermann, Robert J; Kluepfel, Henry M; Lawson, Richard L; Soper, Gordon K; Wood, Lowell L; Woodard, Joan B

    2008-01-01

    ...) attack on our critical national infrastructures. An earlier report, Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP), Volume 1: Executive Report (2004...

  3. Spatial distribution assessment of particulate matter in an urban street canyon using biomagnetic leaf monitoring of tree crown deposited particles

    International Nuclear Information System (INIS)

    Hofman, Jelle; Stokkaer, Ines; Snauwaert, Lies; Samson, Roeland

    2013-01-01

    Recently, biomagnetic monitoring of tree leaves has proven to be a good estimator for ambient particulate concentration. This paper investigates the usefulness of biomagnetic leaf monitoring of crown deposited particles to assess the spatial PM distribution inside individual tree crowns and an urban street canyon in Ghent (Belgium). Results demonstrate that biomagnetic monitoring can be used to assess spatial PM variations, even within single tree crowns. SIRM values decrease exponentially with height and azimuthal effects are obtained for wind exposed sides of the street canyon. Edge and canyon trees seem to be exposed differently. As far as we know, this study is the first to present biomagnetic monitoring results of different trees within a single street canyon. The results not only give valuable insights into the spatial distribution of particulate matter inside tree crowns and a street canyon, but also offer a great potential as validation tool for air quality modelling. Highlights: ► Spatial distribution of tree crown deposited PM was evaluated. ► SIRM values decrease exponentially with height. ► Azimuthal effects were observed at wind exposed sides of the street canyon. ► Edge and canyon trees seem to be exposed differently. ► Biomagnetic monitoring offers a great potential as validation of air quality models. -- Biomagnetic leaf monitoring provides useful insights into the spatial distribution of particulates inside individual tree crowns and an urban street canyon in Ghent (Belgium)

  4. The mouse lymphoma thymidine kinase assay for the assessment and comparison of the mutagenic activity of cigarette mainstream smoke particulate phase.

    Science.gov (United States)

    Schramke, H; Meisgen, T J; Tewes, F J; Gomm, W; Roemer, E

    2006-10-29

    The mouse lymphoma thymidine kinase assay (MLA) has been optimized to quantitatively determine the in vitro mutagenicity of cigarette mainstream smoke particulate phase. To test whether the MLA is able to discriminate between different cigarette types, specially constructed cigarettes each containing a single tobacco type - Bright, Burley, or Oriental - were investigated. The mutagenic activity of the Burley cigarette was statistically significantly lower, up to approximately 40%, than that of the Bright and Oriental cigarettes. To determine the impact of two different sets of smoking conditions, American-blend cigarettes were smoked under US Federal Trade Commission/International Organisation for Standardisation conditions and under Massachusetts Department of Public Health (MDPH) conditions. Conventional cigarettes - eight from the US commercial market plus the Reference Cigarettes 1R4F and 2R4F - and an electrically heated cigarette smoking system (EHCSS) prototype were tested. There were no statistically significant differences between the two sets of smoking conditions on a per mg total particulate matter basis, although there was a consistent trend towards slightly lower mutagenic activity under MDPH conditions. The mutagenic activity of the EHCSS prototype was distinctly lower than that of the conventional cigarettes under both sets of smoking conditions. These results show that the MLA can be used to assess and compare the mutagenic activity of cigarette mainstream smoke particulate phase in the comprehensive toxicological assessment of cigarette smoke.

  5. Global chemical composition of ambient fine particulate matter for exposure assessment.

    Science.gov (United States)

    Philip, Sajeev; Martin, Randall V; van Donkelaar, Aaron; Lo, Jason Wai-Ho; Wang, Yuxuan; Chen, Dan; Zhang, Lin; Kasibhatla, Prasad S; Wang, Siwen; Zhang, Qiang; Lu, Zifeng; Streets, David G; Bittman, Shabtai; Macdonald, Douglas J

    2014-11-18

    Epidemiologic and health impact studies are inhibited by the paucity of global, long-term measurements of the chemical composition of fine particulate matter. We inferred PM2.5 chemical composition at 0.1° × 0.1° spatial resolution for 2004-2008 by combining aerosol optical depth retrieved from the MODIS and MISR satellite instruments, with coincident profile and composition information from the GEOS-Chem global chemical transport model. Evaluation of the satellite-model PM2.5 composition data set with North American in situ measurements indicated significant spatial agreement for secondary inorganic aerosol, particulate organic mass, black carbon, mineral dust, and sea salt. We found that global population-weighted PM2.5 concentrations were dominated by particulate organic mass (11.9 ± 7.3 μg/m(3)), secondary inorganic aerosol (11.1 ± 5.0 μg/m(3)), and mineral dust (11.1 ± 7.9 μg/m(3)). Secondary inorganic PM2.5 concentrations exceeded 30 μg/m(3) over East China. Sensitivity simulations suggested that population-weighted ambient PM2.5 from biofuel burning (11 μg/m(3)) could be almost as large as from fossil fuel combustion sources (17 μg/m(3)). These estimates offer information about global population exposure to the chemical components and sources of PM2.5.

  6. Patterns and biases of climate change threats in the IUCN Red List.

    Science.gov (United States)

    Trull, Nicholas; Böhm, Monika; Carr, Jamie

    2018-02-01

    International Union for Conservation of Nature (IUCN) Red List assessments rely on published data and expert inputs, and biases can be introduced where underlying definitions and concepts are ambiguous. Consideration of climate change threat is no exception, and recently numerous approaches to assessing the threat of climate change to species have been developed. We explored IUCN Red List assessments of amphibians and birds to determine whether species listed as threatened by climate change display distinct patterns in terms of habitat occupied and additional nonclimatic threats faced. We compared IUCN Red List data with a published data set of species' biological and ecological traits believed to infer high vulnerability to climate change and determined whether distributions of climate change-threatened species on the IUCN Red List concur with those of climate change-threatened species identified with the trait-based approach and whether species possessing these traits are more likely to have climate change listed as a threat on the IUCN Red List. Species in some ecosystems (e.g., grassland, shrubland) and subject to particular threats (e.g., invasive species) were more likely to have climate change as a listed threat. Geographical patterns of climate change-threatened amphibians and birds on the IUCN Red List were incongruent with patterns of global species richness and patterns identified using trait-based approaches. Certain traits were linked to increases or decreases in the likelihood of a species being threatened by climate change. Broad temperature tolerance of a species was consistently related to an increased likelihood of climate change threat, indicating counterintuitive relationships in IUCN assessments. To improve the robustness of species assessments of the vulnerability or extinction risk associated with climate change, we suggest IUCN adopt a more cohesive approach whereby specific traits highlighted by our results are considered in Red List

  7. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  8. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  9. Nondestructive Determination of Reinforcement Volume Fractions in Particulate Composites : Ultrasonic Method

    International Nuclear Information System (INIS)

    Jeong, Hyun Jo

    1998-01-01

    A nondestructive ultrasonic technique is presented for estimating the reinforcement volume fractions of particulate composites. The proposed technique employs a theoretical model which accounts for composite microstructures, together with a measurement of ultrasonic velocity to determine the reinforcement volume fractions. The approach is used for a wide range of SiC particulate reinforced Al matrix (SiC p /AI) composites. The method is considered to be reliable in determining the reinforcement volume fractions. The technique could be adopted in a production unit for the quality assessment of the metal matrix particulate composite extrusions

  10. The mechanical behaviour of packed particulates

    International Nuclear Information System (INIS)

    Dutton, R.

    1998-01-01

    and temperature. The application of these maps to particulate compaction is reviewed and recommendations are made for their utilization to assess the long-term mechanical performance of the waste container. To obtain some empirical evidence over very long timescales (measured in millions of years), we have examined the geological literature. This includes specific information on the compaction of quartz sand, together with related data on creep deformation in monolithic quartzite rocks. Based on current understanding of creep mechanisms, availability of experimental measurements and long-term inference from geological phenomena, it would appear that time-dependent compaction of quartz-like particulates at 100 deg C occurs very slowly. Recommendations for quantifying the collective mechanical behaviour of the particulate, and relating this to the expected lifetime of the waste container, are presented. (author)

  11. The mechanical behaviour of packed particulates

    Energy Technology Data Exchange (ETDEWEB)

    Dutton, R

    1998-01-01

    range of stress and temperature. The application of these maps to particulate compaction is reviewed and recommendations are made for their utilization to assess the long-term mechanical performance of the waste container. To obtain some empirical evidence over very long timescales (measured in millions of years), we have examined the geological literature. This includes specific information on the compaction of quartz sand, together with related data on creep deformation in monolithic quartzite rocks. Based on current understanding of creep mechanisms, availability of experimental measurements and long-term inference from geological phenomena, it would appear that time-dependent compaction of quartz-like particulates at 100 deg C occurs very slowly. Recommendations for quantifying the collective mechanical behaviour of the particulate, and relating this to the expected lifetime of the waste container, are presented. (author)

  12. Assessment of the Threats to the Biodiversity and Habitats in "Stara Reka" Reserve (Bulgaria and Its Adjacent Subalpine and Alpine Areas

    Directory of Open Access Journals (Sweden)

    Svetlana V. Yocheva

    2013-06-01

    Full Text Available The assessment of the threats in the “Stara Reka” reserve and its adjacent subalpine and alpine areas is important since it makes it possible the appropriate conservation measures to be taken in order to prevent or reduce the negative effects on the biodiversity and habitats. The assessment was based on systematic studies and visits in the “Stara Reka” Reserve, located within National Park “Central Balkan” (Bulgaria, during spring, summer and autumn seasons of 2010-2011. A number of threats were recorded, where those by anthropogenic origin were predominating. Tourists have negatively influenced the wild plants such as Allium ursinum, Inula helenium and Primula frondosa by picking them up. Damages were registered on the information system and signs. Waste disposal, fires, poaching and illegal fishing were also some of the recorded threats. Many natural succession changes quite dynamically vary the habitats in the reserve, but the most dangerous for the biodiversity and degradation of habitats remain fires, erosion and introduction of alien species.

  13. Cyber threat impact assessment and analysis for space vehicle architectures

    Science.gov (United States)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  14. Biomonitoring of toxic compounds of airborne particulate matter in urban and industriel areas

    DEFF Research Database (Denmark)

    Klumpp, Andreas; Ro-Poulsen, Helge

    2010-01-01

    The toxicity and ecotoxicity of airborne particulate matter is determined by its physical features, but also by its chemical composition. The standardised exposure of accumulative bioindicator plants is suggested as an efficient and reliable tool to assess and monitor effects of particulate matter...

  15. Hazard identification of particulate matter on vasomotor dysfunction and progression of atherosclerosis

    DEFF Research Database (Denmark)

    Møller, Peter; Mikkelsen, Lone; Vesterdal, Lise Kristine

    2011-01-01

    and inflammatory pathways. We have assessed the effect of exposure to particulate matter on progression of atherosclerosis and vasomotor function in humans, animals, and ex vivo experimental systems. The type of particles that have been tested in these systems encompass TiO(2), carbon black, fullerene C(60...... of particulate matter....

  16. Simple passive methods for the assessment of the directional and vertical distributions of wind-blown particulates

    International Nuclear Information System (INIS)

    Orza, J. A.G.; Cabello, M.; Mateo, J.

    2009-01-01

    We have designed and tested two types of passive collectors to study aeolian erosion in the field. The first passive sampler is a sticky pad that allows for directional particulate assessment by an automatic particle counting procedure. the second one features an omni-directional capture opening, and mass of retained particles is gravimetric ally quantified. Vertical arrays of these passive collectors have been constructed to obtain vertical profiles of the horizontal particle flux as a function of soil properties, nearby sources and wind speed. We present some first results from field campaigns. (Author) 3 refs.

  17. Kuwaiti oil fires—Particulate monitoring

    Science.gov (United States)

    Husain, Tahir; Amin, Mohamed B.

    The total suspended particulate (TSP) matters using a high-volume sampler and inhalable particulate matters using PM-10 samplers were collected at various locations in the Eastern Province of Saudi Arabia during and after the Kuwaiti oil fires. The collected samples were analysed for toxic metals and oil hydrocarbon concentrations including some carcinogenic organic compounds in addition to gravimetric analysis. The concentration values of particulate matters were determined on a daily basis at Dhahran. Abqaiq, Rahima, Tanajib and Jubail locations. The analyses of the filters show a high concentration of the inhalable particulate at various locations, especially when north or northwest winds were blowing. It was found that the inhalable particulate concentration exceeded the Meteorology and Environmental Protection Administration (MEPA) permissible limit of 340 μg m- 3 at most of these locations during May-October 1991. A trend between the total suspended particulate and inhalable particulate measured concurrently at the same locations was observed and a regression equation was developed to correlate PM-10 data with the total suspended particulate data.

  18. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  19. Final report from the NKS NordThreat seminar in Asker

    Energy Technology Data Exchange (ETDEWEB)

    Eikelmann, I M.H.; Selnaes, OE G [eds.; Norwegian Radiation Protection Authority (Norway)

    2009-11-15

    Changes in the international security environment have lead to an increased attention towards the need to revise various threat assessments in the Nordic countries. Together with recent events such as incidents at Nordic nuclear power plants, orphan sources and accidents involving nuclear powered vessels, this has given a good opportunity for an exchange of information and opinions. The NKS-B NordThreat seminar took place at Sem gjestegaard in Asker outside Oslo, Norway on 30 - 31 October 2008. Main topics in the seminar were: 1) National threat assessments 2) Potential hazards 3) Experience from previous incidents 4) Public perception of nuclear and radiological threats and information challenges 5) Challenges for future preparedness. There were about 40 participants at the seminar. These were mainly members of the NKS organisations, invited speakers and representatives from various Norwegian emergency preparedness organisations. (author)

  20. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  1. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  2. The exposure assessment of airborne particulates matter (PM10 & PM2.5) towards building occupants: A case study at KL Sentral, Kuala Lumpur, Malaysia

    Science.gov (United States)

    Mohddin, S. A.; Aminuddin, N. M.

    2014-02-01

    Airborne particulates have been recognized as a crucial pollutant of indoor air. These pollutants can contribute towards poor indoor air quality (IAQ), which may affect human health in immediate or long term. This study aims to determine the level of IAQ and the effects of particulate towards occupants of office buildings (the office buildings selected for the case study are SSM, KTMB and MRCB at KL Sentral). The objectives of study are (i) to measure the level of airborne particulates that contribute to the IAQ during working hours, (ii) to compare the level of airborne particulates with the existing guidelines and standards of IAQ in Malaysia and other Asian countries and (iii) to assess the symptoms associated with airborne particulates among the building occupants, which were achieved through primary data collection (case study or site survey, structured interview and questionnaire survey) and supported by literature reviews. The results showed that the mass concentration level of airborne particulates within the areas has exceeded the allowable limit of 0.15mg/m3 by IAQ Code of Practice, 2005 of the Department of Safety and Health (DOSH), Malaysia and 0.05mg/m3 by the Department of Environmental (DOE) (outdoor) of 8 hours continuous sampling. Based on the findings, the highest mass concentration values measured is 2.581 mg/m3 at lobby of SSM building which is the highest recorded 17 times higher from the maximum limit recommended by DOSH than the others. This is due to the nearby construction works and the high numbers of particulates are generated from various types of vehicles for transportation surrounding KL Sentral. Therefore, the development of Malaysian Ambient Air Quality Guidelines on PM2.5 as one of the crucial parameters is highly recommended.

  3. Proceedings of the Mongolian Biodiversity Databank Workshop: Assessing the Conservation Status of Mongolian Mammals and Fishes: II – Mam- mals: Assessment Results and Threats.

    Directory of Open Access Journals (Sweden)

    Emma L. Clark

    2005-12-01

    Full Text Available The Mongolian Biodiversity Databank Workshop was held at the National University of Mongolia and Hustai National Park from 1 st October to 4 th November, 2005. As part of the workshop, participants assessed the conservation status of all Mongolian mammal species using the IUCN Categories and Cri - teria. Of the 128 species assessed, 2% were Critically Endangered (CR, 11% Endangered (EN and 4% Vulnerable (VU. A further 5% were categorised as Near Threatened (NT and 36% categorised as Data Deficient (DD. Ungulates were the most highly impacted: 79% were threatened with extinction. Twelve percent of carnivore species and 12% of rodent species were threatened. No non-rodent small mammal species were listed in a threatened category. Rodents and non-rodent small mammals were less well known, with 44% and 43% respectively found to be Data Deficient. This may have affected the threat assessment of these species. Greatest species richness of Mongolian mammals was found in the northern and western part of the country. The greatest number of threatened species also inhabit the north of the country, as well as the south-west. The main threat affecting most mammals in Mongolia was hunting, with lack of enforcement of legislation also considered a problem.

  4. Effect of lubricant oil properties on the performance of gasoline particulate filter (GPF)

    Energy Technology Data Exchange (ETDEWEB)

    Shao, Huifang; Lam, William; Remias, Joseph; Roos, Joseph; Seong, HeeJe; Choi, Seungmok

    2016-10-17

    Mobile source emissions standards are becoming more stringent and particulate emissions from gasoline direct injection (GDI) engines represent a particular challenge. Gasoline particulate filter (GPF) is deemed as one possible technical solution for particulate emissions reduction. In this work, a study was conducted on eight formulations of lubricants to determine their effect on GDI engine particulate emissions and GPF performance. Accelerated ash loading tests were conducted on a 2.4L GDI engine with engine oil injection in gasoline fuel by 2%. The matrix of eight formulations was designed with changing levels of sulfated ash (SASH) level, Zinc dialkyldithiophosphates (ZDDP) level and detergent type. Comprehensive evaluations of particulates included mass, number, size distribution, composition, morphology and soot oxidation properties. GPF performance was assessed through filtration efficiency, back pressure and morphology. It was determined that oil formulation affects the particulate emission characteristics and subsequent GPF performance.

  5. Assessing the Computer Network Operations Threat of Foreign Countries(PREPRINT)

    National Research Council Canada - National Science Library

    Denning, Dorothy E

    2007-01-01

    .... Information strategy has to adapt to both of these effects, exploiting and leveraging the enabling technologies while protecting against threats to the very same technologies we come to rely upon...

  6. Small-angle light scattering by airborne particulates: Environnement S.A. continuous particulate monitor

    International Nuclear Information System (INIS)

    Renard, Jean-Baptiste; Gaubicher, Bertrand; Thaury, Claire; Mineau, Jean-Luc

    2010-01-01

    Airborne particulate matter may have an effect on human health. It is therefore necessary to determine and control in real time the evolution of the concentration and mass of particulates in the ambient air. These parameters can be obtained using optical methods. We propose here a new instrument, 'CPM' (continuous particulate monitor), for the measurement of light scattered by ambient particulates at small angles. This geometry allows simultaneous and separate detections of PM10, PM2.5 and PM1 fractions of airborne particulate matter, with no influence of their chemical nature and without using theoretical calculations. The ambient air is collected through a standard sampling head (PM10 inlet according to EN 12341, PM2.5 inlet according to EN 14907; or PM1, TSP inlets, standard US EPA inlets). The analysis of the first measurements demonstrates that this new instrument can detect, for each of the seven defined size ranges, real-time variations of particulate content in the ambient air. The measured concentrations (expressed in number per liter) can be converted into total mass concentrations (expressed in micrograms per cubic meter) of all fractions of airborne particulate matters sampled by the system. Periodic comparison with a beta-attenuation mass monitor (MP101M Beta Gauge Analyzer from Environnement S.A. company) allows the calculation of a calibration factor as a function of the mean particulate density that is used for this conversion. It is then possible to provide real-time relative variations of aerosol mass concentration

  7. Insider Threats: DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

    Science.gov (United States)

    2015-06-01

    2011). Insiders have an advantage over others who may want to harm an organization because insiders may have an awareness of their...process currently includes threat assessments, a risk-indicator matrix , and a risk assessment to prompt organizations to consider threats and risk to...is to oversee departmental capabilities and resources to counter insider threats, and make recommendations on program improvements and resources

  8. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  9. Assessment of diesel particulate matter exposure in the workplace: freight terminals†

    Science.gov (United States)

    Sheesley, Rebecca J.; Schauer, James J.; Smith, Thomas J.; Garshick, Eric; Laden, Francine; Marr, Linsey C.; Molina, Luisa T.

    2008-01-01

    A large study has been undertaken to assess the exposure to diesel exhaust within diesel trucking terminals. A critical component of this assessment is an analysis of the variation in carbonaceous particulate matter (PM) across trucking terminal locations; consistency in the primary sources can be effectively tracked by analyzing trends in elemental carbon (EC) and organic molecular marker concentrations. Ambient samples were collected at yard, dock and repair shop work stations in 7 terminals in the USA and 1 in Mexico. Concentrations of EC ranged from 0.2 to 12 μg m−3 among the terminals, which corresponds to the range seen in the concentration of summed hopanes (0.5 to 20.5 ng m−3). However, when chemical mass balance (CMB) source apportionment results were presented as percent contribution to organic carbon (OC) concentrations, the contribution of mobile sources to OC are similar among the terminals in different cities. The average mobile source percent contribution to OC was 75.3 ± 17.1% for truck repair shops, 65.4 ± 20.4% for the docks and 38.4 ± 9.5% for the terminal yard samples. A relatively consistent mobile source impact was present at all the terminals only when considering percentage of total OC concentrations, not in terms of absolute concentrations. PMID:18392272

  10. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  11. Nuclear Terrorism: Assessing the Threat, Developing a Response

    Science.gov (United States)

    2009-01-01

    milling facilities to crush the ore and extract the uranium concentrate, a process that yields what is often called yellowcake. The yellowcake would then...issued by the Baker-Cutler Task Force described the threat, “In a worst-case scenario, a nuclear engineer graduate with a grapefruit -sized lump of HEU...stealing spent power reactor fuel or fresh (unirradiated) MOX fuel, both of which would need to have their plutonium chemically extracted . While separating

  12. Electrical diesel particulate filter (DPF) regeneration

    Science.gov (United States)

    Gonze, Eugene V; Ament, Frank

    2013-12-31

    An exhaust system that processes exhaust generated by an engine includes a diesel particulate filter (DPF) that is disposed downstream of the engine and that filters particulates from the exhaust. An electrical heater is disposed upstream of the DPF and selectively heats the exhaust to initiate combustion of the particulates within the exhaust as it passes therethrough. Heat generated by combustion of the particulates induces combustion of particulates within the DPF.

  13. The exposure assessment of airborne particulates matter (PM10 and PM2.5) towards building occupants: A case study at KL Sentral, Kuala Lumpur, Malaysia

    International Nuclear Information System (INIS)

    Mohddin, S A; Aminuddin, N M

    2014-01-01

    Airborne particulates have been recognized as a crucial pollutant of indoor air. These pollutants can contribute towards poor indoor air quality (IAQ), which may affect human health in immediate or long term. This study aims to determine the level of IAQ and the effects of particulate towards occupants of office buildings (the office buildings selected for the case study are SSM, KTMB and MRCB at KL Sentral). The objectives of study are (i) to measure the level of airborne particulates that contribute to the IAQ during working hours, (ii) to compare the level of airborne particulates with the existing guidelines and standards of IAQ in Malaysia and other Asian countries and (iii) to assess the symptoms associated with airborne particulates among the building occupants, which were achieved through primary data collection (case study or site survey, structured interview and questionnaire survey) and supported by literature reviews. The results showed that the mass concentration level of airborne particulates within the areas has exceeded the allowable limit of 0.15mg/m 3 by IAQ Code of Practice, 2005 of the Department of Safety and Health (DOSH), Malaysia and 0.05mg/m 3 by the Department of Environmental (DOE) (outdoor) of 8 hours continuous sampling. Based on the findings, the highest mass concentration values measured is 2.581 mg/m 3 at lobby of SSM building which is the highest recorded 17 times higher from the maximum limit recommended by DOSH than the others. This is due to the nearby construction works and the high numbers of particulates are generated from various types of vehicles for transportation surrounding KL Sentral. Therefore, the development of Malaysian Ambient Air Quality Guidelines on PM 2.5 as one of the crucial parameters is highly recommended

  14. Vigilant attention to threat, sleep patterns, and anxiety in peripubertal youth.

    Science.gov (United States)

    Ricketts, Emily J; Price, Rebecca B; Siegle, Greg J; Silk, Jennifer S; Forbes, Erika E; Ladouceur, Cecile D; Harvey, Allison G; Ryan, Neal D; Dahl, Ronald E; McMakin, Dana L

    2018-05-02

    Vigilant attention to threat is commonly observed in anxiety, undergoes developmental changes in early adolescence, and has been proposed to interfere with sleep initiation and maintenance. We present one of the first studies to use objective measures to examine associations between vigilant attention to threat and difficulties initiating and maintaining sleep in an early adolescent anxious sample. We also explore the moderating role of development (age, puberty) and sex. Participants were 66 peripubertal youth (ages 9-14) with a primary anxiety disorder and 24 healthy control subjects. A dot-probe task was used to assess attentional bias to fearful relative to neutral face stimuli. Eye-tracking indexed selective attentional bias to threat, and reaction time bias indexed action readiness to threat. Sleep was assessed via actigraphy (e.g. sleep onset delay, wake after sleep onset, etc.), parent report (Children's Sleep Habits Questionnaire), and child report (Sleep Self-Report). The Pediatric Anxiety Rating Scale assessed anxiety severity. Eye-tracking initial threat fixation bias (β = .33, p = .001) and threat dwell time bias (β = .22, p = .041) were positively associated with sleep onset latency. Reaction time bias was positively associated with wake after sleep onset (β = .24, p = .026) and parent-reported sleep disturbance (β = .25, p = .019). Anxiety (severity, diagnosis) was not associated with these outcomes. Sex (β = -.32, p = .036) moderated the relation between initial threat fixation bias and sleep onset latency, with a positive association for males (p = .005), but not for females (p = .289). Age and pubertal status did not moderate effects. Vigilant attention to threat is related to longer sleep onset and reduced sleep maintenance. These associations are not stronger in early adolescents with anxiety. Implications for early intervention or prevention that targets vigilant attention to threat to impact sleep disturbance, and

  15. Particulate pollution of PM10 and PM2.5 due to strong anthropopressure in Sosnowiec city

    Directory of Open Access Journals (Sweden)

    Jolanta Cembrzyńska

    2012-12-01

    Full Text Available Introduction: Air contamination with particulate matter causes a serious problem in large cities and urban-industrial agglomerations both in Poland and Europe. Anthropogenic sources of air pollution in urban areas are emissions from municipal, industrial and transportation sector. Many epidemiological studies have revealed that exposure to air pollution, especially the fine particles with aerodynamic diameter less than 2,5 micrometer, can pose a threat to human health exposed to exceedingly high concentrations of particulate matter. Aim of the study: The aim of this study was to evaluate PM10 and PM2,5 mass concentrations in autumn and winter season in the city of Sosnowiec, in relation to ambient air quality standards in Poland and the European Union. Results: The average concentrations of PM10 and PM2,5 in autumn-winter seasons in Sosnowiec city 2010–2011 were 2,1 to 2,7 times higher than limit values, specified in the legislation acts.

  16. Threat Assessment Teams: A Model for Coordinating the Institutional Response and Reducing Legal Liability when College Students Threaten Suicide

    Science.gov (United States)

    Penven, James C.; Janosik, Steven M.

    2012-01-01

    Increasing numbers of college students with mental health issues are enrolling in college. If these students threaten suicide they present serious legal issues for college officials. Lack of communication and coordination of a response to these students exacerbates the issue. Threat assessment teams can serve as mechanisms to coordinate the…

  17. Final report from the NKS NordThreat seminar in Asker, Norway

    International Nuclear Information System (INIS)

    Eikelmann, I.M.H.; Selnaes, Oe.G.

    2009-11-01

    Changes in the international security environment have lead to an increased attention towards the need to revise various threat assessments in the Nordic countries. Together with recent events such as incidents at Nordic nuclear power plants, orphan sources and accidents involving nuclear powered vessels, this has given a good opportunity for an exchange of information and opinions. The NKS-B NordThreat seminar took place at Sem gjestegaerd in Asker outside Oslo, Norway on 30 - 31 October 2008. Main topics in the seminar were: 1) National threat assessments 2) Potential hazards 3) Experience from previous incidents 4) Public perception of nuclear and radiological threats and information challenges 5) Challenges for future preparedness. There were about 40 participants at the seminar. These were mainly members of the NKS organisations, invited speakers and representatives from various Norwegian emergency preparedness organisations. (author)

  18. Assessing the Biological Threat Posed by Suicide Bombers

    Science.gov (United States)

    2016-02-01

    the test by about 350’, it is clear some aerosol particles “ surfed ” the shockwave from the blast and were carried a distance upwind. Had the sampling...projectiles implantation in victims of suicide bombings and implications for health and emergency care provideres: the 7/7 experience, Ann R Coll Surg Engl...Ebola in East Africa and Implications for Global Health and Security, Global Policy 2013. (8) Ustun, C.; Ozgurler, O., Ebola: A Significant Threat as

  19. Portable Integrated Wireless Device Threat Assessment to Aircraft Radio Systems

    Science.gov (United States)

    Salud, Maria Theresa P.; Williams, Reuben A. (Technical Monitor)

    2004-01-01

    An assessment was conducted on multiple wireless local area network (WLAN) devices using the three wireless standards for spurious radiated emissions to determine their threat to aircraft radio navigation systems. The measurement process, data and analysis are provided for devices tested using IEEE 802.11a, IEEE 802.11b, and Bluetooth as well as data from portable laptops/tablet PCs and PDAs (grouping known as PEDs). A comparison was made between wireless LAN devices and portable electronic devices. Spurious radiated emissions were investigated in the radio frequency bands for the following aircraft systems: Instrument Landing System Localizer and Glideslope, Very High Frequency (VHF) Communication, VHF Omnidirectional Range, Traffic Collision Avoidance System, Air Traffic Control Radar Beacon System, Microwave Landing System and Global Positioning System. Since several of the contiguous navigation systems were grouped under one encompassing measurement frequency band, there were five measurement frequency bands where spurious radiated emissions data were collected for the PEDs and WLAN devices. The report also provides a comparison between emissions data and regulatory emission limit.

  20. The Modified Fouling Index Ultrafiltration constant flux for assessing particulate/colloidal fouling of RO systems

    KAUST Repository

    Salinas-Rodriguez, Sergio G.

    2015-02-18

    Reliable methods for measuring and predicting the fouling potential of reverse osmosis (RO) feed water are important in preventing and diagnosing fouling at the design stage, and for monitoring pre-treatment performance during plant operation. The Modified Fouling Index Ultrafiltration (MFI-UF) constant flux is a significant development with respect to assessing the fouling potential of RO feed water. This research investigates (1) the variables influencing the MFI-UF test at constant flux filtration (membrane pore size, membrane material, flux rate); and (2) the application of MFI-UF into pre-treatment assessment and RO fouling estimation. The dependency of MFI on flux, means that to assess accurately particulate fouling in RO systems, the MFI should be measured at a flux similar to a RO system (close to 20 L/m2/h) or extrapolated from higher fluxes. The two studied membrane materials showed reproducible results; 10% for PES membranes and 6.3% for RC membranes. Deposition factors (amount of particles that remain on the surface of membrane) were measured in a full-scale plant ranging between 0.2 and 0.5. The concept of “safe MFI” is presented as a guideline for assessing pre-treatment for RO systems.

  1. Assessing Potential of VIIRS Data for Contribution to a Forest Threat Early Warning System

    Science.gov (United States)

    Spruce, Joseph P.

    2007-01-01

    This viewgraph presentation reviews the contributions by the Rapid Prototyping Capability (RPC) towards using Visible Infrared Imager / Radiometer Suite (VIIRS) data in assessing the damage to forests. The Healthy Forest Restoration Act of 2003 mandates development of national Early Warning System (EWS) for forest threat monitoring and mitigation. NASA Stennis is working with the US Forest Service to develop needed components of this EWS. The use of MODIS data for monitoring forest disturbance at broad regional scales is a componet of this program. This RPC experiment was initiated to assess potential of the MODIS follow-on, VIIRS, for monitoring forest disturbance at broad scales and thereby contributing to the EWS. This presentation reviews the potential use of the VIIRS to examine the damage to forests caused by gyspy moths in the West Virginia and Virginia area.

  2. Electrically heated particulate filter restart strategy

    Science.gov (United States)

    Gonze, Eugene V [Pinckney, MI; Ament, Frank [Troy, MI

    2011-07-12

    A control system that controls regeneration of a particulate filter is provided. The system generally includes a propagation module that estimates a propagation status of combustion of particulate matter in the particulate filter. A regeneration module controls current to the particulate filter to re-initiate regeneration based on the propagation status.

  3. Nationwide assessment of nonpoint source threats to water quality

    Science.gov (United States)

    Thomas C. Brown; Pamela Froemke

    2012-01-01

    Water quality is a continuing national concern, in part because the containment of pollution from nonpoint (diffuse) sources remains a challenge. We examine the spatial distribution of nonpoint-source threats to water quality. On the basis of comprehensive data sets for a series of watershed stressors, the relative risk of water-quality impairment was estimated for the...

  4. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  5. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  6. Assessment of naked mole-rat distribution and threats in Eastern Ethiopia

    Directory of Open Access Journals (Sweden)

    Mengistu Wale

    2016-08-01

    Full Text Available Objective: To identify the distribution, threats and community attitudes towards naked molerat in Eastern Ethiopia. Methods: Data were collected through direct observation and interview and Chi-square at 95% confidence interval was used for significance test. Results: Naked mole-rat was identified in Fafan, City/Shinele, Eastern Hararghe Zone and Dire Dawa Administrative. The main threats of naked mole-rat identified were agricultural expansion, human killing and lack of awareness. From a total of 100 respondents, 92% of them considered naked mole-rat as pest as a result that 46% of them participated in direct killing. Literacy rate significantly affects the willingness to participate in the conservation of naked mole-rat (χ2 = 7.478, df = 1, P < 0.05. From a total of 26% respondents who did not show the willingness to participate in the conservation, 80.8% of them were illiterate. Conclusions: Naked mole-rat is fairly common in many of the study sites. However, rapid shift from nomadic life style to cultivation of crops and lacks of awareness were the main threats of naked mole-rat. Therefore, since there is no conservation action currently, further comprehensive study is required to design conservation plan for this species.

  7. Externality costs by emission. E. Particulates

    International Nuclear Information System (INIS)

    Anon.

    1991-01-01

    Fossil-fuel-fired electricity generating systems, particularly coal and oil-fired facilities, are significant emitters of particulate matter. The major components of particulate emissions from a power plant include ash, which is made up of heavy metals, radioactive isotopes and hydrocarbons, and sulfates (SO 4 ) and nitrates (NO 3 ), which are formed by reaction of sulfur dioxide (SO 2 ) and nitrogen oxides (NO x ) in the atmosphere. The smallest ash particulates (including sulfates and nitrates) cause human respiratory effects and impaired visibility. Other effects may include materials damage due to soiling and possibly corrosion, damage to domestic and wild flora through deposition of particulates on foliage, and possible health effects on domestic animals and wild fauna. Several studies focus on the direct effects of high ambient levels of small particulates. This chapter reviews the available literature on the effects of particulate emissions on humans and their environment, and attempts to assign a cost figure to the environmental effects and human health impairments associated with particulate matter emissions. Specifically, this report focuses on the effects of particulates related to human health, visibility, flora, fauna and materials

  8. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    Science.gov (United States)

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  9. Integrated indoor and outdoor exposure assessment framework for fine particulate matter pollution

    DEFF Research Database (Denmark)

    McKone, Thomas E; Hodas, Natasha; Apte, Joshua S.

    2016-01-01

    The 2010 Global Burden of Disease report demonstrates that fine particulate matter (PM2.5) pollution is the major environmental contributor to mortality. Exposures outdoors (ambient) and indoors (household) contribute almost qually to this burden. Unfortunately, the health impacts from exposure t...

  10. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  11. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  12. Airborne particulate discriminator

    Science.gov (United States)

    Creek, Kathryn Louise [San Diego, CA; Castro, Alonso [Santa Fe, NM; Gray, Perry Clayton [Los Alamos, NM

    2009-08-11

    A method and apparatus for rapid and accurate detection and discrimination of biological, radiological, and chemical particles in air. A suspect aerosol of the target particulates is treated with a taggant aerosol of ultrafine particulates. Coagulation of the taggant and target particles causes a change in fluorescent properties of the cloud, providing an indication of the presence of the target.

  13. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  14. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  15. Threat driven modeling framework using petri nets for e-learning system.

    Science.gov (United States)

    Khamparia, Aditya; Pandey, Babita

    2016-01-01

    Vulnerabilities at various levels are main cause of security risks in e-learning system. This paper presents a modified threat driven modeling framework, to identify the threats after risk assessment which requires mitigation and how to mitigate those threats. To model those threat mitigations aspects oriented stochastic petri nets are used. This paper included security metrics based on vulnerabilities present in e-learning system. The Common Vulnerability Scoring System designed to provide a normalized method for rating vulnerabilities which will be used as basis in metric definitions and calculations. A case study has been also proposed which shows the need and feasibility of using aspect oriented stochastic petri net models for threat modeling which improves reliability, consistency and robustness of the e-learning system.

  16. Hymenoptera of Afghanistan and the central command area of operations: assessing the threat to deployed U.S. service members with insect venom hypersensitivity.

    Science.gov (United States)

    Turbyville, Joseph C; Dunford, James C; Nelson, Michael R

    2013-01-01

    Insect venom hypersensitivity can pose a threat to personnel deployed to a combat zone but the exposure risk in Afghanistan is currently unknown. This study was designed to assess the threat of Hymenoptera stings and associated allergic reactions in Afghanistan. Hymenoptera species were collected during a deployment to southern Afghanistan from June 2010 through January 2011. The literature was also reviewed to determine species of medically important Hymenoptera recorded in the region. The U.S. Army theater electronic medical data system was mined for ICD-9 codes associated with insect stings to determine the number of theater medical clinic encounters addressing insect sting reactions. Three species of flying hymenoptera were commonly encountered during the study period: Vespa orientalis L., Polistes wattii Cameron, and Vespula germanica (F.). A literature review also confirms the presence of honeybees (Apidae), numerous velvet ant (Mutillidae) species, and various ant (Formicidae) species all capable of stinging. No evidence was identified to suggest that fire ants (Solenopsis ssp.) are a threat in the region. Based on electronic medical records from the U.S. Central Command area of operations over a 2-year period, roughly 1 in 500 clinic visits involved a patient with a diagnosis of insect bite or sting. Cross-reactive members of all five flying Hymenoptera species commonly assessed for in Hymenoptera allergy evaluations are present in Afghanistan. The review of in-theater medical records confirms that insect stings pose an environmental threat to deployed service members.

  17. Health effects from indoor and outdoor exposure to fine particulate matter in life cycle impact assessment

    DEFF Research Database (Denmark)

    Fantke, Peter; McKone, T.E.; Jolliet, Olivier

    2016-01-01

    Exposure to fine particulate matter (PM2.5) pollution is a major contributor to human disease burden as continuously shown in the Global Burden of Disease study series. Exposures to PM2.5 concentration outdoors and indoors contribute almost equally to this burden. Despite the importance, health...... impacts from exposure to PM2.5 are often excluded from life cycle impact assessment (LCIA) characterization profiles. This is in large part because of the lack of well-vetted harmonized guidance about how to consistently assess the exposures and impacts of indoor and outdoor emissions of PM2.5 and its...... precursors. We present a framework for calculating characterization factors for indoor and outdoor emissions of primary PM2.5 and secondary PM2.5 precursors, and a roadmap for further refining this modelling framework for operational use in LCIA. The framework was developed over the last three years...

  18. Evaluation of airborne particulates and fungi during hospital renovation.

    Science.gov (United States)

    Overberger, P A; Wadowsky, R M; Schaper, M M

    1995-07-01

    This study was conducted over 30 weeks on a hospital floor undergoing partial renovation. Some patients housed on the floor were immunosuppressed, including bone marrow transplant recipients. The construction zone was placed under negative pressure and was separated from patient rooms by existing hospital walls and via erection of a temporary barrier. Other control measures minimized patient exposure to airborne materials. Air sampling was done for 3 weeks prior to construction, 24 weeks during construction, and 3 weeks after renovation was completed. Airborne particulate concentrations, total spore counts, particle size, and fungal species were assessed. At the beginning of the renovation there were increases in airborne particulates (from 0.2 to 2.0 mg/m3) and fungal spores (from 3.5 to 350 colony forming units (CFU/m3), but only in the construction zone. Throughout the remainder of the renovation, particulate and fungal spore levels fluctuated inside the construction zone but remained close to baseline values in the patient area. When renovation was completed, particulates and spore counts inside the construction zone decreased to preconstruction levels. The primary fungus isolated from air samples was Penicillium. This study demonstrated that control measures were effective in reducing exposures of hospitalized patients to airborne particulates and spores and in reducing the increased risk of aspergillosis and other fungal infections associated with hospital construction projects. The data from this study may be useful in establishing exposure guidelines for other health care settings.

  19. BUILDING UP STATE STRATEGIC RESISTANCE AGAINST HYBRID THREATS

    Directory of Open Access Journals (Sweden)

    Miroslaw Banasik

    2017-11-01

    Full Text Available Hybrid warfare, conducted in Ukraine since 2014, has become a new geopolitical phenomenon which threatens the Euro-Atlantic security that appeared after the collapse of the bipolar world. The paper discusses how the Russian Federation takes advantage of hybrid warfare to achieve its political objectives and to further its own interests. The paper also contains an assessment of the threat of hybrid warfare in Poland and determines what undertakings are necessary to effectively counter threats coming from Russia.

  20. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  1. Spatially explicit multi-threat assessment of food tree species in Burkina Faso: A fine-scale approach.

    Directory of Open Access Journals (Sweden)

    Hannes Gaisberger

    Full Text Available Over the last decades agroforestry parklands in Burkina Faso have come under increasing demographic as well as climatic pressures, which are threatening indigenous tree species that contribute substantially to income generation and nutrition in rural households. Analyzing the threats as well as the species vulnerability to them is fundamental for priority setting in conservation planning. Guided by literature and local experts we selected 16 important food tree species (Acacia macrostachya, Acacia senegal, Adansonia digitata, Annona senegalensis, Balanites aegyptiaca, Bombax costatum, Boscia senegalensis, Detarium microcarpum, Lannea microcarpa, Parkia biglobosa, Sclerocarya birrea, Strychnos spinosa, Tamarindus indica, Vitellaria paradoxa, Ximenia americana, Ziziphus mauritiana and six key threats to them (overexploitation, overgrazing, fire, cotton production, mining and climate change. We developed a species-specific and spatially explicit approach combining freely accessible datasets, species distribution models (SDMs, climate models and expert survey results to predict, at fine scale, where these threats are likely to have the greatest impact. We find that all species face serious threats throughout much of their distribution in Burkina Faso and that climate change is predicted to be the most prevalent threat in the long term, whereas overexploitation and cotton production are the most important short-term threats. Tree populations growing in areas designated as 'highly threatened' due to climate change should be used as seed sources for ex situ conservation and planting in areas where future climate is predicting suitable habitats. Assisted regeneration is suggested for populations in areas where suitable habitat under future climate conditions coincides with high threat levels due to short-term threats. In the case of Vitellaria paradoxa, we suggest collecting seed along the northern margins of its distribution and considering assisted

  2. Diesel Particulate Matter Polygons, US EPA Region 9, 2005, NATA

    Data.gov (United States)

    U.S. Environmental Protection Agency — The national-scale assessment includes 177 air pollutants (a subset of the air toxics on the Clean Air Act's list of 187 air toxics plus diesel particulate matter...

  3. The role of perceived threat in the emergence of PTSD and depression symptoms during warzone deployment.

    Science.gov (United States)

    Lancaster, Cynthia L; Cobb, Adam R; Lee, Han-Joo; Telch, Michael J

    2016-07-01

    Numerous studies have shown that level of exposure to combat-related stressors is a robust risk factor for posttraumatic stress disorder (PTSD) and depression among military personnel deployed to a warzone. Threat perception of warzone experiences assessed retrospectively has been consistently linked to increased risk for PTSD and depression months or even years after returning from deployment. However, little is known about concurrent relations between perceived threat, deployment stress, and stress-related symptoms during deployment. Using a novel in-theater web-based assessment system, we investigated the unique and joint contribution of threat perception and deployment stressors in predicting the emergence of PTSD and depression symptoms during deployment. Soldiers (N = 150) completed assessments of deployment stressors, perceived threat, PTSD symptoms, and depression symptoms throughout deployment to Iraq. Results revealed that perceived threat potentiated the increase in PTSD symptoms as a result of increases in deployment stressors. In contrast, perceived threat, but not warzone stressors, uniquely predicted depression symptoms. Results highlight the important role of threat perception as a risk marker for the acute experience of depression and PTSD symptoms during deployment. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  4. A health-based assessment of particulate air pollution in urban areas of Beijing in 2000-2004

    International Nuclear Information System (INIS)

    Zhang Minsi; Song Yu; Cai Xuhui

    2007-01-01

    Particulate air pollution is a serious problem in Beijing. The annual concentration of particulate matter with aerodynamic diameter less than 10 μm (PM 10 ), ranging from 141 to 166 μg m -3 in 2000-2004, could be very harmful to human health. In this paper, we presented the mortality and morbidity effects of PM 10 pollution based on statistical data and the epidemiological exposure-response function. The economic costs to health during the 5 years were estimated to lie between US$1670 and $3655 million annually, accounting for about 6.55% of Beijing's gross domestic product each year. The total costs were apportioned into two parts caused by: the local emissions and long-range transported pollution. The contribution from local emissions dominated the total costs, accounting on average for 3.60% of GDP. However, the contributions from transported pollution cannot be neglected, and the relative percentage to the total costs from the other regions could account for about 45%. An energy policy and effective measures should be proposed to reduce particulate matter, especially PM 2.5 pollution in Beijing to protect public health. The Beijing government also needs to cooperate with the other local governments to reduce high background level of particulate air pollution

  5. The development and preliminary validation of the Challenge and Threat in Sport (CAT-Sport) Scale

    OpenAIRE

    Rossato, C.J.L.; Uphill, M.A.; Swain, J.; Coleman, D.

    2016-01-01

    This paper outlines the development and preliminary validation of a sport-specific measure of\\ud athletes’ experience of challenge and threat. Three independent studies assess the content\\ud validity, factor structure, criterion validity and internal consistency of the Challenge and\\ud Threat in Sport (CAT-Sport) Scale. In study 1, a group of 25 athletes and 2 experts assessed\\ud the content validity of items derived from existing measures of challenge and threat.\\ud Participants examined a p...

  6. Computer security threats faced by small businesses in Australia

    OpenAIRE

    Hutchings, Alice

    2012-01-01

    In this paper, an overview is provided of computer security threats faced by small businesses. Having identified the threats, the implications for small business owners are described, along with countermeasures that can be adopted to prevent incidents from occurring. The results of the Australian Business Assessment of Computer User Security (ABACUS) survey, commissioned by the Australian Institute of Criminology (AIC), are drawn upon to identify key risks (Challice 2009; Richards 2009). Addi...

  7. Experimental estimation of snare detectability for robust threat monitoring

    OpenAIRE

    O Kelly, H. J.; Rowcliffe, M.; Durant, S.; Milner-Gulland, E. J.

    2018-01-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccess...

  8. Al-Qaida threats and strategies : the religious justification for targeting the international energy economy

    Energy Technology Data Exchange (ETDEWEB)

    Williams, J.F.

    2008-03-15

    Methods of analyzing threats generated by terrorists against the energy industry were discussed. Threat was defined as the product of an adversary's capability, intent, and authority to engage a target using a specific attack mode. The paper argued that robust models for threat must demonstrate a cultural awareness of the adversary in question. The study used an al-Qaida attack to develop and critique the religious justification offered by Salafi-Jihadi religious scholars for attacking the energy industry. The importance of the fatawa's religious authority was evaluated, and cultural drivers for al-Qaida were explored in relation to the threat model. An assessment of past terrorist acts against energy industry infrastructure was conducted. Various relevant fatawa issued by religious scholars were discussed. Socio-political and religious attributes of the al-Qaida movement were outlined using the Combating Terrorism Center's militant ideology atlas. The threat equation was expanded to include authority and cultural influences. The threat model was developed by assigning information to bins of capability, intent, and authority in order to assess and evaluate data. The Kalman filter technique was used to determine threat drivers. 98 refs., 20 figs.

  9. Particulate Matter and Black Carbon Concentration Levels in Ashaiman, a Semi-Urban Area of Ghana, 2008

    OpenAIRE

    Sam-Quarcoo Dotse; Joshua Kwame Asane; F.G. Ofosu

    2012-01-01

    Particulate matter and black carbon concentration levels in Ashaiman, a semi-urban area of Ghana was assessed. Using IVL PM2.5 and PM10 particle samplers, airborne particulate matter was sampled on Teflon filters for a period of three months. In addition to determination of particulate mass in the two fractions by gravimetrical method, aerosol filters were analyzed to determine Black Carbon (BC) concentration levels using the black smoke method. BC fractions in fine and coarse, together with ...

  10. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  11. Quantifying the environmental impact of particulate deposition from dry unpaved roadways

    Energy Technology Data Exchange (ETDEWEB)

    Becker, D.L.

    1979-01-01

    Airborne dust is the air pollutant most frequently observed to exceed National Ambient Air Quality Standards in rural areas. This pollutant (also referred to as suspended particulates) may originate from point sources (e.g., large areas of bare soil or pollen-producing vegetation.) Most sources of atmospheric particulates, whether natural or anthropogenic, are difficult to quantify by means of a source strength (i.e., mass of particulates emitted per unit time). A numerical model was developed for calculating the source strength and quantifying the atmospheric transport and eposition of dust generated on unpaved roadways. This model satisfies the second-order differential equation for the diffusion process and also the equation of mass conservation. Input to the model includes meterological variables, surface roughness characteristics, and the size distribution and suspended particulate concentration of dust as sampled downwind of an unpaved roadway. By using predetermined tolerance levels of airborne concentrations or tolerance levels of deposition, maximum allowable vehicular traffic volume can be established. The model also may be used to estimate reduction in photosynthesis resulting from fugitive dust from point or line sources. The contribug ion to sedimentation in aquatic bodies, resulting from airborne particulates also may be assessed with this model.

  12. Stereotype threat reduces false recognition when older adults are forewarned.

    Science.gov (United States)

    Wong, Jessica T; Gallo, David A

    2016-01-01

    Exposing older adults to ageing stereotypes can reduce their memory for studied information--a phenomenon attributed to stereotype threat--but little is known about stereotype effects on false memory. Here, we assessed ageing stereotype effects on the Deese-Roediger-McDermott false memory illusion. Older adults studied lists of semantically associated words, and then read a passage about age-related memory decline (threat condition) or an age-neutral passage (control condition). They then took a surprise memory test with a warning to avoid false recognition of non-studied associates. Relative to the control condition, activating stereotype threat reduced the recognition of both studied and non-studied words, implicating a conservative criterion shift for associated test words. These results indicate that stereotype threat can reduce false memory, and they help to clarify mixed results from prior ageing research. Consistent with the regulatory focus hypothesis, threat motivates older adults to respond more conservatively when error-prevention is emphasised at retrieval.

  13. Threat-related selective attention predicts treatment success in childhood anxiety disorders.

    Science.gov (United States)

    Legerstee, Jeroen S; Tulen, Joke H M; Kallen, Victor L; Dieleman, Gwen C; Treffers, Philip D A; Verhulst, Frank C; Utens, Elisabeth M W J

    2009-02-01

    The present study examined whether threat-related selective attention was predictive of treatment success in children with anxiety disorders and whether age moderated this association. Specific components of selective attention were examined in treatment responders and nonresponders. Participants consisted of 131 children with anxiety disorders (aged 8-16 years), who received standardized cognitive-behavioral therapy. At pretreatment, a pictorial dot-probe task was administered to assess selective attention. Both at pretreatment and posttreatment, diagnostic status of the children was evaluated with a semistructured clinical interview (the Anxiety Disorders Interview Schedule for Children). Selective attention for severely threatening pictures at pretreatment assessment was predictive of treatment success. Examination of the specific components of selective attention revealed that nonresponders showed difficulties to disengage their attention away from severe threat. Treatment responders showed a tendency not to engage their attention toward severe threat. Age was not associated with selective attention and treatment success. Threat-related selective attention is a significant predictor of treatment success in children with anxiety disorders. Clinically anxious children with difficulties disengaging their attention away from severe threat profit less from cognitive-behavioral therapy. For these children, additional training focused on learning to disengage attention away from anxiety-arousing stimuli may be beneficial.

  14. Cyber-Threat Assessment for the Air Traffic Management System: A Network Controls Approach

    Science.gov (United States)

    Roy, Sandip; Sridhar, Banavar

    2016-01-01

    , and indeed security solutions are being implemented in the current system. While these security solutions are important, they only provide a piecemeal solution. Particular computers or communication channels are protected from particular attacks, without a holistic view of the air transportation infrastructure. On the other hand, the above-listed incidents highlight that a holistic approach is needed, for several reasons. First, the air transportation infrastructure is a large scale cyber-physical system with multiple stakeholders and diverse legacy assets. It is impractical to protect every cyber- asset from known and unknown disruptions, and instead a strategic view of security is needed. Second, disruptions to the cyber- system can incur complex propagative impacts across the air transportation network, including its physical and human assets. Also, these implications of cyber- events are exacerbated or modulated by other disruptions and operational specifics, e.g. severe weather, operator fatigue or error, etc. These characteristics motivate a holistic and strategic perspective on protecting the air transportation infrastructure from cyber- events. The analysis of cyber- threats to the air traffic system is also inextricably tied to the integration of new autonomy into the airspace. The replacement of human operators with cyber functions leaves the network open to new cyber threats, which must be modeled and managed. Paradoxically, the mitigation of cyber events in the airspace will also likely require additional autonomy, given the fast time scale and myriad pathways of cyber-attacks which must be managed. The assessment of new vulnerabilities upon integration of new autonomy is also a key motivation for a holistic perspective on cyber threats.

  15. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  16. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  17. PIXE analysis of vehicle exhaust particulate

    International Nuclear Information System (INIS)

    Shi Xianfeng; Yao Huiying; Liu Bo; Sun Minde; Xu Huawei; Mi Yong; Shen Hao

    2001-01-01

    PIXE technique on the analysis of vehicle exhaust particulate is introduced. The clement composition and concentration of particulate are obtained. Some elements which are related to environmental pollution such as sulfur lead, silicon and manganese, were analyzed and discussed in detail by PIXE technique Nowadays although unleaded gasoline is widely used, the lead concentration is still very high in exhaust particulate. The concentrations of silicon and manganese in exhaust particulate from different model vehicles are also quite high from measurements. It shows that an evidence for exhaust pollution control could be provided from this work

  18. Measurement and analysis of ambient atmospheric particulate matter in urban and remote environments

    Science.gov (United States)

    Hagler, Gayle S. W.

    Atmospheric particulate matter pollution is a challenging environmental concern in both urban and remote locations worldwide. It is intrinsically difficult to control, given numerous anthropogenic and natural sources (e.g. fossil fuel combustion, biomass burning, dust, and seaspray) and atmospheric transport up to thousands of kilometers after production. In urban regions, fine particulate matter (particles with diameters under 2.5 mum) is of special concern for its ability to penetrate the human respiratory system and threaten cardiopulmonary health. A second major impact area is climate, with particulate matter altering Earth's radiative balance through scattering and absorbing solar radiation, modifying cloud properties, and reducing surface reflectivity after deposition in snow-covered regions. While atmospheric particulate matter has been generally well-characterized in populated areas of developed countries, particulate pollution in developing nations and remote regions is relatively unexplored. This thesis characterizes atmospheric particulate matter in locations that represent the extreme ends of the spectrum in terms of air pollution-the rapidly-developing and heavily populated Pearl River Delta Region of China, the pristine and climate-sensitive Greenland Ice Sheet, and a remote site in the Colorado Rocky Mountains. In China, fine particles were studied through a year-long field campaign at seven sites surrounding the Pearl River Delta. Fine particulate matter was analyzed for chemical composition, regional variation, and meteorological impacts. On the Greenland Ice Sheet and in the Colorado Rocky Mountains, the carbonaceous fraction (organic and elemental carbon) of particulate matter was studied in the atmosphere and snow pack. Analyses included quantifying particulate chemical and optical properties, assessing atmospheric transport, and evaluating post-depositional processing of carbonaceous species in snow.

  19. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  20. Characterization and cytotoxic assessment of ballistic aerosol particulates for tungsten alloy penetrators into steel target plates.

    Science.gov (United States)

    Machado, Brenda I; Murr, Lawrence E; Suro, Raquel M; Gaytan, Sara M; Ramirez, Diana A; Garza, Kristine M; Schuster, Brian E

    2010-09-01

    The nature and constituents of ballistic aerosol created by kinetic energy penetrator rods of tungsten heavy alloys (W-Fe-Ni and W-Fe-Co) perforating steel target plates was characterized by scanning and transmission electron microscopy. These aerosol regimes, which can occur in closed, armored military vehicle penetration, are of concern for potential health effects, especially as a consequence of being inhaled. In a controlled volume containing 10 equispaced steel target plates, particulates were systematically collected onto special filters. Filter collections were examined by scanning and transmission electron microscopy (SEM and TEM) which included energy-dispersive (X-ray) spectrometry (EDS). Dark-field TEM identified a significant nanoparticle concentration while EDS in the SEM identified the propensity of mass fraction particulates to consist of Fe and FeO, representing target erosion and formation of an accumulating debris field. Direct exposure of human epithelial cells (A549), a model for lung tissue, to particulates (especially nanoparticulates) collected on individual filters demonstrated induction of rapid and global cell death to the extent that production of inflammatory cytokines was entirely inhibited. These observations along with comparisons of a wide range of other nanoparticulate species exhibiting cell death in A549 culture may suggest severe human toxicity potential for inhaled ballistic aerosol, but the complexity of the aerosol (particulate) mix has not yet allowed any particular chemical composition to be identified.

  1. Characterization and Cytotoxic Assessment of Ballistic Aerosol Particulates for Tungsten Alloy Penetrators into Steel Target Plates

    Directory of Open Access Journals (Sweden)

    Brian E. Schuster

    2010-08-01

    Full Text Available The nature and constituents of ballistic aerosol created by kinetic energy penetrator rods of tungsten heavy alloys (W-Fe-Ni and W-Fe-Co perforating steel target plates was characterized by scanning and transmission electron microscopy. These aerosol regimes, which can occur in closed, armored military vehicle penetration, are of concern for potential health effects, especially as a consequence of being inhaled. In a controlled volume containing 10 equispaced steel target plates, particulates were systematically collected onto special filters. Filter collections were examined by scanning and transmission electron microscopy (SEM and TEM which included energy-dispersive (X-ray spectrometry (EDS. Dark-field TEM identified a significant nanoparticle concentration while EDS in the SEM identified the propensity of mass fraction particulates to consist of Fe and FeO, representing target erosion and formation of an accumulating debris field. Direct exposure of human epithelial cells (A549, a model for lung tissue, to particulates (especially nanoparticulates collected on individual filters demonstrated induction of rapid and global cell death to the extent that production of inflammatory cytokines was entirely inhibited. These observations along with comparisons of a wide range of other nanoparticulate species exhibiting cell death in A549 culture may suggest severe human toxicity potential for inhaled ballistic aerosol, but the complexity of the aerosol (particulate mix has not yet allowed any particular chemical composition to be identified.

  2. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  3. 4th international exhaust gas and particulate emissions forum. Proceedings; 4. internationales FORUM Abgas- und Partikelemissionen. Beitraege

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    Lectures of the conference addressed the following topics: European and US American pollution regulations, particulate measuring systems, emission factors for vehicles, particulate emission abatement through simulation and optimization, selective catalytic reduction in heavy duty diesel trucks, filters, combustion properties, performance assessment, contribution of biofuels. (uke)

  4. Assessing the impacts of ethanol and isobutanol on gaseous and particulate emissions from flexible fuel vehicles.

    Science.gov (United States)

    Karavalakis, Georgios; Short, Daniel; Russell, Robert L; Jung, Heejung; Johnson, Kent C; Asa-Awuku, Akua; Durbin, Thomas D

    2014-12-02

    This study investigated the effects of higher ethanol blends and an isobutanol blend on the criteria emissions, fuel economy, gaseous toxic pollutants, and particulate emissions from two flexible-fuel vehicles equipped with spark ignition engines, with one wall-guided direct injection and one port fuel injection configuration. Both vehicles were tested over triplicate Federal Test Procedure (FTP) and Unified Cycles (UC) using a chassis dynamometer. Emissions of nonmethane hydrocarbons (NMHC) and carbon monoxide (CO) showed some statistically significant reductions with higher alcohol fuels, while total hydrocarbons (THC) and nitrogen oxides (NOx) did not show strong fuel effects. Acetaldehyde emissions exhibited sharp increases with higher ethanol blends for both vehicles, whereas butyraldehyde emissions showed higher emissions for the butanol blend relative to the ethanol blends at a statistically significant level. Particulate matter (PM) mass, number, and soot mass emissions showed strong reductions with increasing alcohol content in gasoline. Particulate emissions were found to be clearly influenced by certain fuel parameters including oxygen content, hydrogen content, and aromatics content.

  5. Enduring somatic threat perceptions and post-traumatic stress disorder symptoms in survivors of cardiac events.

    Science.gov (United States)

    Meli, Laura; Alcántara, Carmela; Sumner, Jennifer A; Swan, Brendan; Chang, Bernard P; Edmondson, Donald

    2017-04-01

    Post-traumatic stress disorder due to acute cardiovascular events may be uniquely defined by enduring perceptions of somatic threat. We tested whether post-traumatic stress disorder at 1 month post-acute coronary syndrome indeed required both high peritraumatic threat during the acute coronary syndrome and ongoing cardiac threat perceptions. We assessed peritraumatic threat during emergency department enrollment of 284 patients with a provisional acute coronary syndrome diagnosis and cardiac threat perceptions and post-traumatic stress disorder symptoms 1 month post-discharge. In a multiple regression model with adjustment for important covariates, emergency department threat perceptions were associated with higher 1 month post-traumatic stress disorder symptoms only among those with high levels of ongoing cardiac threat.

  6. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  7. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  8. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  9. Note on the sanitary impact of diesel particulates; Note sur l'impact sanitaire des particules diesel

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2003-10-15

    In the actual situation of scientific works, the epidemiology studies on environment do not allow to say the carcinogen contribution of diesel particulates at the concentration levels measured in the urban air. But according to the experimental data for the rat and the data observed for the personnel exposed to diesel particulates these particulates are classified as probably carcinogen. (N.C.)

  10. An updated taxonomy for characterizing hackers according to their threat properties

    DEFF Research Database (Denmark)

    Hald, Sara Ligaard; Pedersen, Jens Myrup

    2012-01-01

    The objective of this paper is to give an up-to-date terminology for and categorization of hackers on the Internet, and to characterize each category of hackers by their threat properties. To be able to prioritize defense efforts, security experts need an accurate taxonomy of attackers...... for the production of detailed and precise threat assessments. We take an existing taxonomy for hackers and update it to correspond to the terminology used by hackers and security experts. Also, the categories of hackers are updated to reflect the threat properties demonstrated in recent attacks, and each category...

  11. Analytical Methods INAA and PIXE Applied to Characterization of Airborne Particulate Matter in Bandung, Indonesia

    Directory of Open Access Journals (Sweden)

    D.D. Lestiani

    2011-08-01

    Full Text Available Urbanization and industrial growth have deteriorated air quality and are major cause to air pollution. Air pollution through fine and ultra-fine particles is a serious threat to human health. The source of air pollution must be known quantitatively by elemental characterization, in order to design the appropriate air quality management. The suitable methods for analysis the airborne particulate matter such as nuclear analytical techniques are hardly needed to solve the air pollution problem. The objectives of this study are to apply the nuclear analytical techniques to airborne particulate samples collected in Bandung, to assess the accuracy and to ensure the reliable of analytical results through the comparison of instrumental neutron activation analysis (INAA and particles induced X-ray emission (PIXE. Particle samples in the PM2.5 and PM2.5-10 ranges have been collected in Bandung twice a week for 24 hours using a Gent stacked filter unit. The result showed that generally there was a systematic difference between INAA and PIXE results, which the values obtained by PIXE were lower than values determined by INAA. INAA is generally more sensitive and reliable than PIXE for Na, Al, Cl, V, Mn, Fe, Br and I, therefore INAA data are preffered, while PIXE usually gives better precision than INAA for Mg, K, Ca, Ti and Zn. Nevertheless, both techniques provide reliable results and complement to each other. INAA is still a prospective method, while PIXE with the special capabilities is a promising tool that could contribute and complement the lack of NAA in determination of lead, sulphur and silicon. The combination of INAA and PIXE can advantageously be used in air pollution studies to extend the number of important elements measured as key elements in source apportionment.

  12. Analytical Methods INAA and PIXE Applied to Characterization of Airborne Particulate Matter in Bandung, Indonesia

    International Nuclear Information System (INIS)

    Lestiani, D.D.; Santoso, M.

    2011-01-01

    Urbanization and industrial growth have deteriorated air quality and are major cause to air pollution. Air pollution through fine and ultra-fine particles is a serious threat to human health. The source of air pollution must be known quantitatively by elemental characterization, in order to design the appropriate air quality management. The suitable methods for analysis the airborne particulate matter such as nuclear analytical techniques are hardly needed to solve the air pollution problem. The objectives of this study are to apply the nuclear analytical techniques to airborne particulate samples collected in Bandung, to assess the accuracy and to ensure the reliable of analytical results through the comparison of instrumental neutron activation analysis (INAA) and particles induced X-ray emission (PIXE). Particle samples in the PM 2.5 and PM 2.5-10 ranges have been collected in Bandung twice a week for 24 hours using a Gent stacked filter unit. The result showed that generally there was a systematic difference between INAA and PIXE results, which the values obtained by PIXE were lower than values determined by INAA. INAA is generally more sensitive and reliable than PIXE for Na, Al, Cl, V, Mn, Fe, Br and I, therefore INAA data are preferred, while PIXE usually gives better precision than INAA for Mg, K, Ca, Ti and Zn. Nevertheless, both techniques provide reliable results and complement to each other. INAA is still a prospective method, while PIXE with the special capabilities is a promising tool that could contribute and complement the lack of NAA in determination of lead, sulphur and silicon. The combination of INAA and PIXE can advantageously be used in air pollution studies to extend the number of important elements measured as key elements in source apportionment. (author)

  13. Particulate emission characteristics of a port-fuel-injected SI engine

    International Nuclear Information System (INIS)

    Gupta, S.; Poola, R.; Lee, K. O.; Sekar, R.

    2000-01-01

    Particulate emissions from spark-ignited (SI) engines have come under close scrutiny as they tend to be smaller than 50 nm, are composed mainly of volatile organic compounds, and are emitted in significant numbers. To assess the impact of such emissions, measurements were performed in the exhaust of a current-technology port-fuel-injected SI engine, which was operated at various steady-state conditions. To gain further insights into the particulate formation mechanisms, measurements were also performed upstream of the catalytic converter. At all engine speeds, a general trend was observed in the number densities and mass concentrations: a moderate increase at low loads followed by a decrease at mid-range loads, which was followed by a steep increase at high loads. Within reasonable bounds, one could attribute such a trend to three different mechanisms. An unidentified mechanism at low loads results in particulate emissions monotonically increasing with load. At medium loads, wherein the engine operates close to stoichiometric conditions, high exhaust temperatures lead to particulate oxidation. At high loads, combustion occurs mostly under fuel-rich conditions, and the contribution from combustion soot becomes significant. Estimates of the number of particles emitted per kilometer by a vehicle carrying the current test engine were found to be lower than those from a comparable diesel vehicle by three orders of magnitude. Similar estimates for mass emissions (grams of particulates emitted per kilometer) were found to be two orders of magnitude lower than the future regulated emission value of 0.006 (g/km) for light-duty diesel vehicles. Moreover, considering the fact that these particles have typical lifetimes of 15 min, the health hazard from particulate emissions from SI engines appears to be low

  14. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  15. 40 CFR 230.21 - Suspended particulates/turbidity.

    Science.gov (United States)

    2010-07-01

    ... Impacts on Physical and Chemical Characteristics of the Aquatic Ecosystem § 230.21 Suspended particulates/turbidity. (a) Suspended particulates in the aquatic ecosystem consist of fine-grained mineral particles..., and man's activities including dredging and filling. Particulates may remain suspended in the water...

  16. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  17. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  18. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  19. Identification and Characterization of Particulate Matter Concentrations at Construction Jobsites

    Directory of Open Access Journals (Sweden)

    Ingrid P. S. Araújo

    2014-11-01

    Full Text Available The identification and characterization of particulate matter (PM concentrations from construction site activities pose major challenges due to the diverse characteristics related to different aspects, such as concentration, particle size and particle composition. Moreover, the characterization of particulate matter is influenced by meteorological conditions, including temperature, humidity, rainfall and wind speed. This paper is part of a broader investigation that aims to develop a methodology for assessing the environmental impacts caused by the PM emissions that arise from construction activities. The objective of this paper is to identify and characterize the PM emissions on a construction site with different aerodynamic diameters (PM2.5, PM10, total suspended particulates (TSP, based on an exploratory study. Initially, a protocol was developed to standardize the construction site selection criteria, laboratory procedures, field sample collection and laboratory analysis. This protocol was applied on a multifamily residential building construction site during three different construction phases (earthworks, superstructure and finishings aimed at measuring and monitoring PM concentrations arising from construction activities. The particulate matter was characterized in different particle sizes. Results showed that the higher TSP emissions arising from construction activities provoked environmental impacts. Some limitations to the results were identified, especially with regards the need for a detailed investigation about the influence of different construction phases on PM emissions. The findings provided significant knowledge about various situations, serving as a basis for improving the existing methodology for particulate material collection on construction sites and the development of future studies on the specific construction site phases.

  20. Scaling range sizes to threats for robust predictions of risks to biodiversity.

    Science.gov (United States)

    Keith, David A; Akçakaya, H Resit; Murray, Nicholas J

    2018-04-01

    Assessments of risk to biodiversity often rely on spatial distributions of species and ecosystems. Range-size metrics used extensively in these assessments, such as area of occupancy (AOO), are sensitive to measurement scale, prompting proposals to measure them at finer scales or at different scales based on the shape of the distribution or ecological characteristics of the biota. Despite its dominant role in red-list assessments for decades, appropriate spatial scales of AOO for predicting risks of species' extinction or ecosystem collapse remain untested and contentious. There are no quantitative evaluations of the scale-sensitivity of AOO as a predictor of risks, the relationship between optimal AOO scale and threat scale, or the effect of grid uncertainty. We used stochastic simulation models to explore risks to ecosystems and species with clustered, dispersed, and linear distribution patterns subject to regimes of threat events with different frequency and spatial extent. Area of occupancy was an accurate predictor of risk (0.81<|r|<0.98) and performed optimally when measured with grid cells 0.1-1.0 times the largest plausible area threatened by an event. Contrary to previous assertions, estimates of AOO at these relatively coarse scales were better predictors of risk than finer-scale estimates of AOO (e.g., when measurement cells are <1% of the area of the largest threat). The optimal scale depended on the spatial scales of threats more than the shape or size of biotic distributions. Although we found appreciable potential for grid-measurement errors, current IUCN guidelines for estimating AOO neutralize geometric uncertainty and incorporate effective scaling procedures for assessing risks posed by landscape-scale threats to species and ecosystems. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  1. A freshwater biodiversity hotspot under pressure - assessing threats and identifying conservation needs for ancient Lake Ohrid

    Science.gov (United States)

    Kostoski, G.; Albrecht, C.; Trajanovski, S.; Wilke, T.

    2010-12-01

    Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact. Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes. Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1) assess threats to Lake Ohrids' (endemic) biodiversity, (2) summarize existing conservation activities and strategies, and (3) outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species) as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1) watershed impacts, (2) agriculture and forestry, (3) tourism and population growth, (4) non-indigenous species, (5) habitat alteration or loss, (6) unsustainable exploitation of fisheries, and (7) global climate change. Among the major (well-known) threats with high impact are nutrient input (particularly of phosphorus), habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture) or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species measures, international

  2. Characterization of particulate amines

    International Nuclear Information System (INIS)

    Gundel, L.A.; Chang, S.G.; Clemenson, M.S.; Markowitz, S.S.; Novakov, T.

    1979-01-01

    The reduced nitrogen compounds associated with ambient particulate matter are chemically characterized by means of ESCA and proton activation analysis. Ambient particulate samples collected on silver filters in Berkeley, California were washed with water and organic solvents, and ESCA and proton activation analysis were performed in order to determine the composition of various nitrogen compounds and the total nitrogen content. It is found that 85% of the amines originally present in ambient particulate matter can be removed by water extraction, whereas the ammonium and nitrate are completely removed. An observed increase in ammonium ion in the extract, compared with its concentration in the original sample, coupled with the commensurate decrease in amine concentration, is attributed to the hydrolysis of amide groups, which may cause analytical methods based on extraction to yield erroneous results

  3. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  4. Implications of the Differential Toxicological Effects of III-V Ionic and Particulate Materials for Hazard Assessment of Semiconductor Slurries.

    Science.gov (United States)

    Jiang, Wen; Lin, Sijie; Chang, Chong Hyun; Ji, Zhaoxia; Sun, Bingbing; Wang, Xiang; Li, Ruibin; Pon, Nanetta; Xia, Tian; Nel, André E

    2015-12-22

    Because of tunable band gaps, high carrier mobility, and low-energy consumption rates, III-V materials are attractive for use in semiconductor wafers. However, these wafers require chemical mechanical planarization (CMP) for polishing, which leads to the generation of large quantities of hazardous waste including particulate and ionic III-V debris. Although the toxic effects of micron-sized III-V materials have been studied in vivo, no comprehensive assessment has been undertaken to elucidate the hazardous effects of submicron particulates and released III-V ionic components. Since III-V materials may contribute disproportionately to the hazard of CMP slurries, we obtained GaP, InP, GaAs, and InAs as micron- (0.2-3 μm) and nanoscale (particles for comparative studies of their cytotoxic potential in macrophage (THP-1) and lung epithelial (BEAS-2B) cell lines. We found that nanosized III-V arsenides, including GaAs and InAs, could induce significantly more cytotoxicity over a 24-72 h observation period. In contrast, GaP and InP particulates of all sizes as well as ionic GaCl3 and InCl3 were substantially less hazardous. The principal mechanism of III-V arsenide nanoparticle toxicity is dissolution and shedding of toxic As(III) and, to a lesser extent, As(V) ions. GaAs dissolves in the cell culture medium as well as in acidifying intracellular compartments, while InAs dissolves (more slowly) inside cells. Chelation of released As by 2,3-dimercapto-1-propanesulfonic acid interfered in GaAs toxicity. Collectively, these results demonstrate that III-V arsenides, GaAs and InAs nanoparticles, contribute in a major way to the toxicity of III-V materials that could appear in slurries. This finding is of importance for considering how to deal with the hazard potential of CMP slurries.

  5. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  6. Threat and vulnerability analysis and conceptual design of countermeasures for a computer center under construction

    International Nuclear Information System (INIS)

    Rozen, A.; Musacchio, J.M.

    1988-01-01

    This project involved the assessment of a new computer center to be used as the main national data processing facility of a large European bank. This building serves as the principal facility in the country with all other branches utilizing the data processing center. As such, the building is a crucial target which may attract terrorist attacks. Threat and vulnerability assessments were performed as a basis to define and overall fully-integrated security system of passive and active countermeasures for the facility. After separately assessing the range of threats and vulnerabilities, a combined matrix of threats and vulnerabilities was used to identify the crucial combinations. A set of architectural-structural passive measures was added to the active components of the security system

  7. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    example of the type of results generated, we estimated that the probability of the manatee population falling to less than 250 adults on either the Atlantic or Gulf coasts (from a current statewide population size of near 3300) within 100 years is 8.6%. Complete removal of the watercraft threat alone would reduce this risk to 0.4%; complete removal of the warm-water threat to 4.2%; removal of both threats would reduce the risk to 0.1%. The modeling approach we have taken also allows us to consider partial removal of threats, as well as removal of multiple threats simultaneously. We believe the measure we have proposed (probability of quasi-extinction over y years, with quasi-extinction defined as dropping below a threshold of z on either coast) is a suitable measure of status that integrates a number of the elements that are relevant to interpretation under the ESA (it directly integrates risk of extinction and reduction of range, and indirectly integrates loss of genetic diversity). But the identification of the time frame of interest and the tolerable risk of quasi-extinction are policy decisions, and an ecology-based quasi-extinction threshold has not yet been determined. We have endeavored to provide results over a wide range of these parameters to give decision-makers useful information to assess status. This assessment of threats suggests that watercraft-related mortality is having the greatest impact on manatee population growth and resilience. Elimination of this single threat would greatly reduce the probability of quasi-extinction. Loss of warm-water is also a significant threat, particularly over the long-term. Red tide and entanglement, while noticeable threats, have had less of an impact on the manatee population. The effect of water control structures may have already been largely mitigated. We did not, however, consider an exhaustive list of threats. Other threats (e.g., reduction of food resources due to storms and development) may play a

  8. Estimates of Particulate Mass in Multi-Canister Overpacks

    International Nuclear Information System (INIS)

    SLOUGHTER, J.P.

    2000-01-01

    High, best estimate, and low values are developed for particulate inventories within MCO baskets that have been loaded with freshly cleaned fuel assemblies and scrap. These per-basket estimates are then applied to all anticipated MCO payload configurations to identify which configurations are bounding for each type of particulate. Finally the resulting bounding and nominal values for residual particulates are combined with corresponding values [from other documents] for particulates that may be generated by corrosion of exposed uranium after the fuel has been cleaned. The resulting rounded nominal estimate for a typical MCO after 40 years of storage is 8 kg. The estimate for a bounding total particulate case MCO is that it may contain up to 64 kg of particulate after 40 years of storage

  9. Estimates of particulate mass in multi-canister overpacks

    International Nuclear Information System (INIS)

    SLOUGHTER, J.P.

    1999-01-01

    High, best estimate, and low values are developed for particulate inventories within MCO baskets that have been loaded with freshly cleaned fuel assemblies and scrap. These per-basket estimates are then applied to all anticipated MCO payload configurations to identify which configurations are bounding for each type of particulate. Finally the resulting bounding and nominal values for residual particulates are combined with corresponding values [from other documents] for particulate that may be generated by corrosion of exposed uranium after the fuel has been cleaned. The resulting rounded nominal estimate for a typical MCO after 40 years of storage is 8 kg. The estimate for a bounding total particulate case MCO is that it may contain up to 64 kg of particulate after 40 years of storage

  10. Estimates of particulate mass in multi-canister overpacks

    Energy Technology Data Exchange (ETDEWEB)

    SLOUGHTER, J.P.

    1999-02-25

    High, best estimate, and low values are developed for particulate inventories within MCO baskets that have been loaded with freshly cleaned fuel assemblies and scrap. These per-basket estimates are then applied to all anticipated MCO payload configurations to identify which configurations are bounding for each type of particulate. Finally the resulting bounding and nominal values for residual particulates are combined with corresponding values [from other documents] for particulate that may be generated by corrosion of exposed uranium after the fuel has been cleaned. The resulting rounded nominal estimate for a typical MCO after 40 years of storage is 8 kg. The estimate for a bounding total particulate case MCO is that it may contain up to 64 kg of particulate after 40 years of storage.

  11. Determination of trace elements in urban airborne particulates (PM ...

    African Journals Online (AJOL)

    Assessment of the air quality in Newcastle upon Tyne, UK was performed by determining the trace element content in airborne particulates (PM10). Samples were collected over a 12 month period (March 2011 to April 2012) using two high volume air sampler provided with a PM10 size selective inlet. The concentrations of ...

  12. Endemics under threat: an assessment of the conservation status of Cuban bats

    Directory of Open Access Journals (Sweden)

    Carlos Mancina

    2007-07-01

    Full Text Available Abstract Reviewing available information from published literature, museum database, personal communications and from the authors own field data, the conservation status of Cuban bats has been assessed using six qualitative parameters: abundance, distribution, roosting habits, aggregation level, forest dependence, and degree of endemism. The resulting Red List is analogous to that of the IUCN, species having been included in four categories of risk. Four out of the 26 extant bats of Cuba should be considered endangered, four vulnerable to extinction, twelve potentially threatened, and six in a stable situation. Most of the species of bats endemic to Cuba are under some form of threat. The major threats to the survival of Cuban bats are the destruction of forests and the modification of caves, the latter being critical habitats for the mostly cave-dwelling Cuban bat fauna. We argue that its conservation should be the result of a cooperative effort promoting research and habitat management. Riassunto Endemismi minacciati: una valutazione dello stato di conservazione dei chirotteri cubani. Lo stato di conservazione dei chirotteri cubani è stato valutato a partire da sei parametri qualitativi: abbondanza, distribuzione, roost utilizzati, livello di aggregazione, dipendenza da ambienti forestali e grado di endemismo. A questo scopo sono state esaminate le informazioni bibliografiche, i database dei musei e dati non pubblicati, in parte raccolti dagli stessi autori. La Lista Rossa risultante è analoga a quella dell’IUCN, comprendendo quattro categorie di rischio crescente. Delle 26 specie attualmente presenti a Cuba, 4 sono da considerarsi in pericolo di estinzione, 4 "vulnerabili", 12 "potenzialmente minacciate" e 6 "stabili". La maggior parte delle specie endemiche è in qualche misura minacciata. La deforestazione e l’alterazione delle cavità carsiche, che costituiscono un habitat

  13. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  14. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  15. Persistent and novel threats to the biodiversity of Kazakhstan’s steppes and semi-deserts

    Science.gov (United States)

    Kamp, Johannes; Koshkin, Maxim A; Bragina, Tatyana M; Katzner, Todd E.; Milner-Gulland, E J; Schreiber, Dagmar; Sheldon, Robert; Shmalenko, Alyona; Smelansky, Ilya; Terraube, Julien; Urazaliev, Ruslan

    2016-01-01

    Temperate grasslands have suffered disproportionally from conversion to cropland, degradation and fragmentation. A large proportion of the world’s remaining near-natural grassland is situated in Kazakhstan. We aimed to assess current and emerging threats to steppe and semi-desert biodiversity in Kazakhstan and evaluate conservation research priorities. We conducted a horizon-scanning exercise among conservationists from academia and practice. We first compiled a list of 45 potential threats. These were then ranked by the survey participants according to their perceived severity, the need for research on them, and their novelty. The highest-ranked threats were related to changes in land use (leading to habitat loss and deterioration), direct persecution of wildlife, and rapid infrastructure development due to economic and population growth. Research needs were identified largely in the same areas, and the mean scores of threat severity and research need were highly correlated. Novel threats comprised habitat loss by photovoltaic and wind power stations, climate change and changes in agriculture such as the introduction of biofuels. However, novelty was not correlated with threat severity or research priority, suggesting that the most severe threats are the established ones. Important goals towards more effective steppe and semi-desert conservation in Kazakhstan include more cross-sector collaboration (e.g. by involving stakeholders in conservation and agriculture), greater allocation of funds to under-staffed areas (e.g. protected area management), better representativeness and complementarity in the protected area system and enhanced data collection for wildlife monitoring and threat assessments (including the use of citizen-science databases).

  16. The energy sector exposed to the cyber-threat

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2016-01-01

    Technologies of information and communication (TICs) are present at all stages of energy production, transport and distribution, and this development is an opportunity for a better resources allocation, but also makes physical infrastructures more vulnerable to cyber-crime. The example of a cyber-attack against Ukrainian utilities in 2015 showed that this threat is an actual one, and the author outlines how energy companies are particularly vulnerable to these threats for cultural, historical and organisational reasons. Some simulations already assessed the huge costs of a cyber-attack against these infrastructures. The author then discusses the perspective and possibilities of development of a cyber-safety in Europe

  17. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  18. CDC WONDER: Daily Fine Particulate Matter

    Data.gov (United States)

    U.S. Department of Health & Human Services — The Daily Fine Particulate Matter data available on CDC WONDER are geographically aggregated daily measures of fine particulate matter in the outdoor air, spanning...

  19. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  20. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  1. Radio Frequency Sensing of Particulate Matter Accumulation on a Gasoline Particulate Filter

    Energy Technology Data Exchange (ETDEWEB)

    Parks, II, James E [ORNL; Prikhodko, Vitaly Y [ORNL; Sappok, Alex [Filter Sensing Technologies; Ragaller, Paul [Filter Sensing Technologies; Bromberg, L. [Massachusetts Institute of Technology (MIT)

    2016-10-30

    Filter Sensing Technology’s radio frequency (RF) sensor for particulate filter on-board diagnostics (OBD) was studied on a lean gasoline engine at the National Transportation Research Center (NTRC) at Oak Ridge National Laboratory (ORNL). The response of the RF sensor to particulate matter (PM) or “soot” accumulation on the gasoline particulate filter (GPF) installed in the engine exhaust was evaluated. In addition, end plugs of the GPF were purposely removed, and subsequent changes to the RF sensor measured soot loading on the GPF were characterized. Results from the study showed that the RF sensor can accurately measure soot accumulation on a GPF; furthermore, the predicted decreased soot accumulation due to plug removal was detected by the RF sensor. Overall, the studies were short and preliminary in nature; however, clearly, the RF sensor demonstrated the capability of measuring GPF soot loading at a level suitable for use in lean gasoline engine emission control OBD and control.

  2. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  3. Source apportionment studies on particulate matter in Beijing/China

    Science.gov (United States)

    Suppan, P.; Shen, R.; Shao, L.; Schrader, S.; Schäfer, K.; Norra, S.; Vogel, B.; Cen, K.; Wang, Y.

    2013-05-01

    More than 15 million people in the greater area of Beijing are still suffering from severe air pollution levels caused by sources within the city itself but also from external impacts like severe dust storms and long range advection from the southern and central part of China. Within this context particulate matter (PM) is the major air pollutant in the greater area of Beijing (Garland et al., 2009). PM did not serve only as lead substance for air quality levels and therefore for adverse health impact effects but also for a strong influence on the climate system by changing e.g. the radiative balance. Investigations on emission reductions during the Olympic Summer Games in 2008 have caused a strong reduction on coarser particles (PM10) but not on smaller particles (PM2.5). In order to discriminate the composition of the particulate matter levels, the different behavior of coarser and smaller particles investigations on source attribution, particle characteristics and external impacts on the PM levels of the city of Beijing by measurements and modeling are performed: a) Examples of long term measurements of PM2.5 filter sampling in 2010/2011 with the objectives of detailed chemical (source attribution, carbon fraction, organic speciation and inorganic composition) and isotopic analyses as well as toxicological assessment in cooperation with several institutions (Karlsruhe Institute of Technology (IfGG/IMG), Helmholtz Zentrum München (HMGU), University Rostock (UR), Chinese University of Mining and Technology Beijing, CUMTB) will be discussed. b) The impact of dust storm events on the overall pollution level of particulate matter in the greater area of Beijing is being assessed by the online coupled comprehensive model system COSMO-ART. First results of the dust storm modeling in northern China (2011, April 30th) demonstrates very well the general behavior of the meteorological parameters temperature and humidity as well as a good agreement between modeled and

  4. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  5. Are College Students' Assessments of Threat Shaped by the Dangers of Their Childhood Environment?

    Science.gov (United States)

    Sherman, Amanda K; Minich, Steven H; Langen, Tom A; Skufca, Joseph; Wilke, Andreas

    2016-07-01

    Humans internalize environmental cues of mortality risk at an early age, which influences subsequent risk perceptions and behavior. In this respect, an individual's current risk assessment may be viewed as an adaptive response to the dangers present within his or her early local environment. Here we examine the relationship between several variables indicating threat within an individual's early environment (e.g., prevalence of violent and property crimes, registered sex offenders) and their perception of crime risk within both the childhood and current adult environments. We recruited a group of 657 students who hail from diverse geographic backgrounds to provide the zip code location of their childhood residence along with subjective ratings of danger of that and their current location, which enabled us to compare their ratings of risk/danger with the federally reported crime statistics of each setting. Our results indicate that the early prevalence of registered sex offenders indeed influences an individual's risk perception in adulthood, and that these factors have a differential effect on males and females. Our findings provide support for the theory that early environmental factors signaling danger affect how individuals assess risk within their adult environment. © The Author(s) 2015.

  6. Stereotype Threat, Inquiring about Test Takers' Race and Gender, and Performance on Low-Stakes Tests in a Large-Scale Assessment. Research Report. ETS RR-15-02

    Science.gov (United States)

    Stricker, Lawrence J.; Rock, Donald A.; Bridgeman, Brent

    2015-01-01

    This study explores stereotype threat on low-stakes tests used in a large-scale assessment, math and reading tests in the Education Longitudinal Study of 2002 (ELS). Issues identified in laboratory research (though not observed in studies of high-stakes tests) were assessed: whether inquiring about their race and gender is related to the…

  7. Flux dependency of particulate/colloidal fouling in seawater reverse osmosis systems

    KAUST Repository

    Salinas Rodríguez, S. G.

    2012-01-01

    Fouling is the main operational problem in seawater reverse osmosis systems (SWRO). Particulate fouling is traditionally measured through the silt density index (SDI) and through the modified fouling index (MFI). In recent years, ultrafiltration membranes were used successfully at constant flux-MFI-UF-to measure particulate/colloidal fouling potential and tested in sea water applications. Furthermore, constant flux operation allows predicting the rate of fouling in RO systems. The objectives of this study are: (1) to measure the flux effect in MFI-UF with different membranes (100, 30 and 10 kDa) for raw seawater and pre-treated water before reverse osmosis in three different locations; (2) to study the particulate and colloidal fouling potential of seawater in reverse osmosis systems; (3) to project the increase in pressure due to cake resistance in reverse osmosis systems. In this research, flat ultrafiltration membranes (100, 50, 30 and 10 kDa) are used in a con- stant flux filtration mode to test and compare real seawaters from various locations (North and Mediterranean Sea) and from various full scale facilities including different pre-treatments (i.e., ultrafiltration and coagulation + dual media filtration). The operated fluxes range from 350 down to values close to real RO operation, 15l(m2h)-1. After each filtration test, the MFI-UF is calculated to assess the particulate fouling potential. The obtained results showed that: (1) the particulate and colloidal fouling potential is directly proportional to the applied flux during filtration. This proportionality is related to the compression of the cake deposit occurring at high flux values; (2) the higher the flux, the higher the required pressure, the less porous the cake and therefore the higher the specific cake resistance; (3) particulate and colloidal fouling potential of seawater is site specific and is influenced by pre-treatment. © 2012 Desalination Publications. All rights reserved.

  8. Understanding particulate coating microstructure development

    Science.gov (United States)

    Roberts, Christine Cardinal

    How a dispersion of particulates suspended in a solvent dries into a solid coating often is more important to the final coating quality than even its composition. Essential properties like porosity, strength, gloss, particulate order, and concentration gradients are all determined by the way the particles come together as the coating dries. Cryogenic scanning electron microscopy (cryoSEM) is one of the most effective methods to directly visualize a drying coating during film formation. Using this method, the coating is frozen, arresting particulate motion and solidifying the sample so that it be imaged in an SEM. In this thesis, the microstructure development of particulate coatings was explored with several case studies. First, the effect of drying conditions was determined on the collapse of hollow latex particles, which are inexpensive whiteners for paint. Using cryoSEM, it was found that collapse occurs during the last stages of drying and is most likely to occur at high drying temperatures, humidity, and with low binder concentration. From these results, a theoretical model was proposed for the collapse of a hollow latex particle. CryoSEM was also used to verify a theoretical model for the particulate concentration gradients that may develop in a coating during drying for various evaporation, sedimentation and particulate diffusion rates. This work created a simple drying map that will allow others to predict the character of a drying coating based on easily calculable parameters. Finally, the effect of temperature on the coalescence and cracking of latex coatings was explored. A new drying regime for latex coatings was identified, where partial coalescence of particles does not prevent cracking. Silica was shown to be an environmentally friendly additive for preventing crack formation in this regime.

  9. A Feasibility Study on Detection of Insider Threats based on Human Bio-signals

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The insider threat means that trusted workers in an organization might carry out harmful acts from the negligent use of classified data to potentially sabotage the workplace. Surveys and studies conducted over the last decade have consistently shown the critical nature of the insider threats problem, in both government and private sectors. The shortcomings of existing systems, such as mental self-assessment and peer review, are very subjective, biased-assessments and employed infrequently. To overcome these limitations, this study investigates the feasibility of detecting and predicting an insider threat by using human biodata, from smart wearable devices. This paper showed the feasibility of predicting and detecting insider threats using EEG, GSR and ECG signals. In the section 2.1, two research hypotheses were established to identify the significant difference on EEG, GSR and ECG signals when the subject decided bad action and is the placed in deceit situation. These hypotheses were tested using two kinds of pilot experiments in the form of input (stimulus) and output (checking response of physiological signals and reaction time)

  10. A study of insider threat in nuclear security analysis using game theoretic modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Yim, Man-Sung; Schneider, Erich

    2017-01-01

    Highlights: • Implications of an insider threat in nuclear security were quantitatively analyzed. • The analysis was based on of a hypothetical nuclear facility and using game theoretic approach. • Through a sensitivity analysis, vulnerable paths and important parameters were identified. • The methodology can be utilized to prioritize the implementation of PPS improvements in a facility. - Abstract: An Insider poses a greater threat to the security system of a nuclear power plant (NPP) because of their ability to take advantage of their access rights and knowledge of a facility, to bypass dedicated security measures. If an insider colludes with an external terrorist group, this poses a key threat to the safety-security interface. However, despite the importance of the insider threat, few studies have been conducted to quantitatively analyze an insider threat. This research examines the quantitative framework for investigating the implications of insider threat, taking a novel approach. Conventional tools assessing the security threats to nuclear facilities focus on a limited number of attack pathways. These are defined by the modeler and are based on simple probabilistic calculations. They do not capture the adversary’s intentions nor do they account for their response and adaptation to defensive investments. As an alternative way of performing physical protection analysis, this research explores the use of game theoretic modeling of Physical Protection Systems (PPS) analysis by incorporating the implications of an insider threat, to address the issues of intentionality and interactions. The game theoretic approach has the advantage of modeling an intelligent adversary and insider who has an intention to do harm and complete knowledge of the facility. Through a quantitative assessment and sensitivity analysis, vulnerable but important parameters in this model were identified. This made it possible to determine which insider threat is more important. The

  11. Insects and their life cycle: Steps to take to assess threats

    Science.gov (United States)

    Alicia M. Bray; Jason B. Oliver

    2013-01-01

    This paper provides a brief overview of the importance of wood-boring insects to the forest nursery industry. Descriptions of the major insect groups are provided with special attention to the life stages that are most problematic within each group. Steps are provided to guide individuals to mitigate potential threats if a new insect is detected causing damage to trees...

  12. Monitoring diesel particulate matter and calculating diesel particulate densities using Grimm model 1.109 real-time aerosol monitors in underground mines.

    Science.gov (United States)

    Kimbal, Kyle C; Pahler, Leon; Larson, Rodney; VanDerslice, Jim

    2012-01-01

    Currently, there is no Mine Safety and Health Administration (MSHA)-approved sampling method that provides real-time results for ambient concentrations of diesel particulates. This study investigated whether a commercially available aerosol spectrometer, the Grimm Portable Aerosol Spectrometer Model 1.109, could be used during underground mine operations to provide accurate real-time diesel particulate data relative to MSHA-approved cassette-based sampling methods. A subset was to estimate size-specific diesel particle densities to potentially improve the diesel particulate concentration estimates using the aerosol monitor. Concurrent sampling was conducted during underground metal mine operations using six duplicate diesel particulate cassettes, according to the MSHA-approved method, and two identical Grimm Model 1.109 instruments. Linear regression was used to develop adjustment factors relating the Grimm results to the average of the cassette results. Statistical models using the Grimm data produced predicted diesel particulate concentrations that highly correlated with the time-weighted average cassette results (R(2) = 0.86, 0.88). Size-specific diesel particulate densities were not constant over the range of particle diameters observed. The variance of the calculated diesel particulate densities by particle diameter size supports the current understanding that diesel emissions are a mixture of particulate aerosols and a complex host of gases and vapors not limited to elemental and organic carbon. Finally, diesel particulate concentrations measured by the Grimm Model 1.109 can be adjusted to provide sufficiently accurate real-time air monitoring data for an underground mining environment.

  13. Determination of lead associated with airborne particulate matter by flame atomic absorption and wave-length dispersive x-ray fluorescence spectrometry

    International Nuclear Information System (INIS)

    Talebi, S.M.

    1997-01-01

    The lead content of airborne particulate matter was determined by flame atomic absorption spectrometry (FAAS) following digestion with a mixture of nitric acid and hydrogen peroxide and also by wave-length dispersive x-ray fluorescence (WDXRF). The extraction procedure was checked by analyzing a standard reference material of airborne particulate matter (NIST, SRM -1648). It was concluded that lead can quantitatively (98%) be extracted from airborne particulate matter by the leaching process. A five-stage sequential extraction was performed to assess the potential mobility of lead associated with airborne particulate matter. Comparison of the airborne particulate lead measured by WDXRF to that measured by FAAS showed good agreement. The WDXRF method requires no time-consuming sample preparation or use of environmentally unfriendly solvents. The technique is suggested for direct determination of lead in airborne particulate matter in air pollution studies. (author)

  14. Phase I aging assessment of nuclear air-treatment system high efficiency particulate air and adsorbers

    International Nuclear Information System (INIS)

    Winegardner, W.K.

    1996-01-01

    A phase I aging assessment of high efficiency particulate air filters and activated carbon gas adsorption units was performed by the Pacific Northwest Laboratory as part of the US Nuclear Regulatory Commission's Nuclear Plant Aging Research Program. Information was compiled concerning design features, failure experience, aging mechanisms, effects, and stressors, and monitoring methods. Over 1100 failures, or 12% of the filter installations, were reported as part of a US Department of energy survey. Investigators from other laboratories have suggested that aging could have contributed to over 80% of these failures. Several instances of impaired performance as the result of the premature aging of carbon were reported. Filter aging mechanisms range from those associated with particle loading to reactions that alter the properties of gaskets. Mechanisms that can lead to impaired adsorber performance include the loss of potentially available active sites as a result of the adsorption of moisture or pollutants. Stressors include heat, moisture, radiation, and airborne particles and contaminants. (orig.)

  15. Are needs to manage uncertainty and threat associated with political conservatism or ideological extremity?

    Science.gov (United States)

    Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian

    2007-07-01

    Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.

  16. Aerotrace. Measurement of particulates from an engine combustor

    Energy Technology Data Exchange (ETDEWEB)

    Hurley, C D [DRA, Farnborough (United Kingdom)

    1998-12-31

    The effect of gas turbine operating conditions, inlet temperature, pressure and overall air fuel ratio, on particulate number density has been measured. Particulate number density was found to be proportional to combustor inlet pressure and decrease with increasing combustor inlet temperature. The relationship with air fuel ratio is more complex. The mechanism of particulate loss down sample lines has been elucidated and equations are presented to predict particulate losses for stainless steel and PTFE sample lines. (author) 3 refs.

  17. Aerotrace. Measurement of particulates from an engine combustor

    Energy Technology Data Exchange (ETDEWEB)

    Hurley, C.D. [DRA, Farnborough (United Kingdom)

    1997-12-31

    The effect of gas turbine operating conditions, inlet temperature, pressure and overall air fuel ratio, on particulate number density has been measured. Particulate number density was found to be proportional to combustor inlet pressure and decrease with increasing combustor inlet temperature. The relationship with air fuel ratio is more complex. The mechanism of particulate loss down sample lines has been elucidated and equations are presented to predict particulate losses for stainless steel and PTFE sample lines. (author) 3 refs.

  18. Removal of particulates from nuclear offgas

    International Nuclear Information System (INIS)

    Burchsted, C.A.

    1976-01-01

    Particulate removal from nuclear offgases can be broken down into three parts: pretreatment, prefiltration, and absolute filtration. Pretreatment, using conventional air cleaning devices in most cases, is sometimes required to temper the gases and remove heavy concentrations of particulate matter. Prefiltration, if required, serves primarily to protect the final filter stages from heavy dust loadings in order to extend their life. HEPA filters are the most commonly used ''absolute'' filtration devices and are always required for removal of submicrometer particulates that cannot be removed effectively by other devices

  19. Assessment of Particulate Matter Levels in Vulnerable Communities in North Charleston, South Carolina prior to Port Expansion

    Directory of Open Access Journals (Sweden)

    Erik R. Svendsen

    2014-01-01

    Full Text Available Introduction The Port of Charleston, one of the busiest US ports, currently operates five terminals. The fifth terminal is being planned for expansion to accommodate container ships from the proposed Panama Canal expansion. Such expansion is expected to increase traffic within local vulnerable North Charleston neck communities by at least 7,000 diesel truck trips per day, more than a 70% increase from the present average rate of 10,000 trucks per day. Our objective was to measure the current particulate matter (PM concentrations in North Charleston communities as a baseline to contrast against future air pollution after the proposed port expansion. Methods Saturation study was performed to determine spatial variability of PM in local Charleston neck communities. In addition, the temporal trends in particulate air pollution within the region were determined across several decades. With the BGI sampler, PM samples were collected for 24 hours comparable to the federal reference method protocol. Gravimetric analysis of the PM filter samples was conducted following EPA protocol. Results The range of the PM 10 annual average across the region from 1982 to 2006 was 17.0-55.0 μg/m 3 . On only two occasions were the records of PM 10 averaged above the 50.0 μg/m 3 national standard. In the case of PM 2.5 , the annual average for 1999-2006 ranged from 11.0 to 13.5 μg/m 3 and no annual average exceeded the 15.0 μg/m 3 PM 2.5 annual standard. Conclusions Although ambient PM levels have fallen in the Charleston region since the 1960s due to aggressive monitoring by the stakeholders against air pollution, local air pollution sources within the North Charleston neck communities have consistently contributed to the PM levels in the region for several decades. This baseline assessment of ambient PM will allow for comparisons with future assessments to ascertain the impact of the increased truck and port traffic on PM concentrations.

  20. Proceedings of the Mongolian Biodiversity Databank Workshop: Assessing the Conservation Status of Mongolian Mammals and Fishes: III – Fishes: Assessment Results and Threats

    Directory of Open Access Journals (Sweden)

    Joanne F. Ocock

    2005-12-01

    Full Text Available The Mongolian Biodiversity Databank Workshop was held at the National University of Mongolia and Hustai National Park from 1 st October to 4 th November, 2005. As part of the workshop, a working group of fish experts assessed the conservation status of all Mongolian fishes using the IUCN Catego - ries and Criteria. Of the 64 fish species found in Mongolia, 48 were assessed, with 16 considered Not Applicable (NA by the working group. Only one species, the Siberian sturgeon ( Acipenser baerii was assessed as Critically Endangered (CR in Mongolia, however six species were assigned Endangered (EN status. Four were found to be Vulnerable (VU and three were assessed to be Near Threatened (NT. Forty-eight percent of Mongolian fishes were Data Deficient (DD and 25% were Least Concern (LC. The north-east of Mongolia was most species rich, particularly the Onon River basin and Buir Lake. There was no trend for where the most threatened species occurred as they were found throughout the north of Mongolia. Hunting/fishing was the greatest threat to Mongolian fishes, followed by resource extraction and pollution.

  1. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  2. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  3. Temporal and spatial variations in particulate matter, particulate organic carbon and attenuation coefficient in Cochin Backwaters

    Digital Repository Service at National Institute of Oceanography (India)

    Devi, K.S.

    Nine stations over a stretch of 21 km of Periyar river estuary were sampled during January to December 1981. Particulate matter varied from 3-253 mg.1 super(1) at the surface and 24.8-257mg.1 super(1) at the bottom. Particulate organic carbon ranged...

  4. Remote sensing of atmospheric particulates: Technological innovation and physical limitations in applications to short-range weather prediction

    Science.gov (United States)

    Curran, R. J.; Kropfil, R.; Hallett, J.

    1984-01-01

    Techniques for remote sensing of particles, from cloud droplet to hailstone size, using optical and microwave frequencies are reviewed. The inherent variability of atmospheric particulates is examined to delineate conditions when the signal can give information to be effectively utilized in a forecasting context. The physical limitations resulting from the phase, size, orientation and concentration variability of the particulates are assessed.

  5. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  6. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  7. Fuzzy Similarity Measures Approach in Benchmarking Taxonomies of Threats against SMEs in Developing Economies

    DEFF Research Database (Denmark)

    Yeboah-Boateng, Ezer Osei

    2013-01-01

    There are various threats that militate against SMEs in developing economies. However, most SMEs fall on the conservative “TV News Effect” of most-publicized cyber-threats or incidences, with disproportionate mitigation measures. This paper endeavors to establish a taxonomy of threat agents to fill...... in the void. Various fuzzy similarity measures based on multi-attribute decision-making techniques have been employed in the evaluation. The taxonomy offers a panoramic view of cyber-threats in assessing mission-critical assets, and serves as a benchmark for initiating appropriate mitigation strategies. SMEs...... in developing economies were strategically interviewed for their expert opinions on various business and security metrics. The study established that natural disasters, which are perennial in most developing economies, are the most critical cyber-threat agent, whilst social engineering is the least critical...

  8. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  9. If it bleeds, it leads: separating threat from mere negativity.

    Science.gov (United States)

    Kveraga, Kestutis; Boshyan, Jasmine; Adams, Reginald B; Mote, Jasmine; Betz, Nicole; Ward, Noreen; Hadjikhani, Nouchine; Bar, Moshe; Barrett, Lisa F

    2015-01-01

    Most theories of emotion hold that negative stimuli are threatening and aversive. Yet in everyday experiences some negative sights (e.g. car wrecks) attract curiosity, whereas others repel (e.g. a weapon pointed in our face). To examine the diversity in negative stimuli, we employed four classes of visual images (Direct Threat, Indirect Threat, Merely Negative and Neutral) in a set of behavioral and functional magnetic resonance imaging studies. Participants reliably discriminated between the images, evaluating Direct Threat stimuli most quickly, and Merely Negative images most slowly. Threat images evoked greater and earlier blood oxygen level-dependent (BOLD) activations in the amygdala and periaqueductal gray, structures implicated in representing and responding to the motivational salience of stimuli. Conversely, the Merely Negative images evoked larger BOLD signal in the parahippocampal, retrosplenial, and medial prefrontal cortices, regions which have been implicated in contextual association processing. Ventrolateral as well as medial and lateral orbitofrontal cortices were activated by both threatening and Merely Negative images. In conclusion, negative visual stimuli can repel or attract scrutiny depending on their current threat potential, which is assessed by dynamic shifts in large-scale brain network activity. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  10. The concept of risk in the design basis threat

    International Nuclear Information System (INIS)

    Reynolds, J.M.

    2001-01-01

    Full text: Mathematically defined, risk is a product of one or more probability factors and one or more consequences. Actuarial analysis of risk requires the creation of a numeric algorithm that reflects the interaction of different probability factors, where probability data usually draws on direct measurements of incidence. For physical protection purposes, the algorithms take the general form: Risk = Probability of successful attack x Consequence where the overall probability of a successful attack will be determined by the product of, amongst other things, the probability of there being sufficient intent, the probability of there being available hostile resources, the probability of deterrence, and the probability that a hostile act will be detected and prevented. Deliberate, malevolent acts against nuclear facilities are rare. In so far as it is possible to make an actuarial type of judgement, the probability of malevolent activity against a nuclear facility is almost zero. This creates a problem for a numerical assessment of risk for nuclear facilities where the value (consequence) term could be almost infinite. As can be seen from the general equation above, a numerical algorithm of risk of malevolent activity affecting nuclear facilities could only yield a zero or infinite result. In such circumstances, intelligence-based threat assessments are sometimes thought of as a substitute for historic data in the determination of probability. However, if the paucity of historic data reflects the actual threat - which by and large it should - no amount of intelligence is likely to yield a substantially different conclusion. This mathematical approach to analysing risk appears to lead us either to no risk and no protection or to an infinite risk demanding every conceivable protective measure. The Design Basis Threat (DBT) approach offers a way out of the dilemma. Firstly, it allows us to eliminate from further consideration all zero or near zero probabilities

  11. The investigation of atmospheric particulate matter pollution in Suzhou

    International Nuclear Information System (INIS)

    Chen Yi'ou; Zhang Yuliang; Wang Ya; Wang Pei; Tian Hailin

    2012-01-01

    Objective: To investigate the pollution status, vertical distribution and concentration variation within 24 hours of total suspended particles (TSPs), particulate matter ≤10 μm (PM10), particulate matter ≤5 (PM5) and particulate matter ≤2.5 μm (PM2.5) in major functional areas of Suzhou and the protective effect of different type masks on particulate matter. Methods: (1) The concentration of atmospheric TSPs, PM10, PM5 and PM2.5 in seven functional areas in Suzhou was monitored for three consecutive days. (2) A residential building of 25 stories was chosen and the concentration of TSPs, PM10, PM5, PM2.5 was detected at the 1st, 5th, 10th, 15th, 20 th and the 25th floor respectively. (3) The concentrations of the four particulate matter were detected every two-hours for three consecutive days to investigate how concentration of particulate matter varies within 24 hours. (4) The concentration of the four kinds of particulate matter was analyzed with the sampling head of monitor wrapped with disposable non-woven medical mask, fashion-type mask, gauze mask or activated carbon anti-dust mask respectively, and the protective effect of the four masks on particulate matter was compared. Results: (1) The concentration of PM2.5 was higher than the national health limit in all seven functional areas in Suzhou. (2) No significant difference in vertical distribution of particulate matter was found among different floors in residential buildings (P>0.05). (3) Two small peaks of particulate matter appeared in the morning and evening respectively while the top appeared at dawn (P< 0.05). (4) Disposable non-woven medical mask showed the best protective effect on particulate matter among the four tested masks. Conclusion: PM2.5 is the main particulate matter in Suzhou area. In addition the 4 kinds of particulate matter: TSP, PM10, PM5 and PM2.5 are of higher concentration in the early morning. No significant difference was detected from an altitude of less than 75 meters

  12. Preliminary analysis of variability in concentration of fine particulate matter - PM1.0, PM2.5 and PM10 in area of Poznań city

    Directory of Open Access Journals (Sweden)

    Sówka Izabela

    2018-01-01

    Full Text Available It is commonly known, that suspended particulate matter pose a threat to human life and health, negatively influence the flora, climate and also materials. Especially dangerous is the presence of high concentration of particulate matter in the area of cities, where density of population is high. The research aimed at determining the variability of suspended particulate matter concentration (PM1.0, PM2.5 and PM10 in two different thermal seasons, in the area of Poznań city. As a part of carried out work we analyzed the variability of concentrations and also performed a preliminary analysis of their correlation. Measured concentrations of particulate matter were contained within following ranges: PM10 – 8.7-69.6 μg/m3, PM2.5 – 2.2-88.5 μg/m3, PM1.0 – 2.5-22.9 μg/m3 in the winter season and 1.0-42.8 μg/m3 (PM10, 1.2-40.3 μg/m3 (PM2.5 and 2.7-10.4 (PM1.0 in the summer season. Preliminary correlative analysis indicated interdependence between the temperature of air, the speed of wind and concentration of particulate matter in selected measurement points. The values of correlation coefficients between the air temperature, speed of wind and concentrations of particulate matter were respectively equal to: for PM10: -0.59 and -0.55 (Jana Pawła II Street, -0.53 and -0.53 (Szymanowskiego Street, for PM2.5: -0.60 and -0.53 (Jana Pawła II Street and for PM1.0 -0.40 and -0.59 (Jana Pawła II Street.

  13. The Influence of Social Threat on Pain, Aggression, and Empathy in Women.

    Science.gov (United States)

    Karos, Kai; Meulders, Ann; Goubert, Liesbet; Vlaeyen, Johan W S

    2018-03-01

    Only one published study has investigated the effect of a threatening social context on the perception and expression of pain, showing that social threat leads to increased pain reports but reduced nonverbal pain expression. The current study aimed to replicate and extend these findings to further explore the effects of a threatening social context. Healthy, female participants (N = 71) received 10 electrocutaneous stimuli delivered by a confederate. They were led to believe that the confederate was requested to administer 10 painful stimuli (control group) or that the confederate deliberately chose to deliver 10 painful stimuli when given the choice to deliver between 1 to 10 painful stimuli (social threat group). Self-reported pain intensity, unpleasantness, threat value of pain, and painful facial expression were assessed. Additionally, empathy and aggression toward the confederate were investigated. Social threat did not affect painful facial expression or self-reported pain intensity, but led to increased aggression toward the confederate. Moreover, perceived social threat predicted the threat value of pain and reduced empathy toward the confederate. We were not able to replicate the previously reported dissociation between pain reports and pain expression as a result of social threat. However, social threat was associated with an increased threat value of pain, increased aggression, and reduced empathy. A threatening social context affects how threatening pain is perceived and has interpersonal consequences such as increased aggression and reduced empathy, thereby creating a double burden on the individual suffering from pain. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  14. Environment assessing for airborne radioactive particulate release-introduction of methods in IAEA safety report series No.19

    International Nuclear Information System (INIS)

    Meng, Dan; Yang, Liu; Shen, Fu; Yang, Yi; Ma, Yinghao; Ma, Tao; Zhang, Zhilong; Fu, Cuiming

    2016-01-01

    Airborne radioactive particulate in many important nuclear facilities (particularly nuclear power plants) will have a strong impact on the relative public dose if they are released into the corresponding environment traversing the stack or vents. The radiation protection researchers have regarded the relative environment assessing and estimation of public doses. And the model of assessing impact of discharges radioactive substance to the environment have been recommended by many international organizations (e.g. IAEA) with the nuclear energy safety and radiation protection. This paper introduced the generic models that were suggested by International Atomic Energy Agency (IAEA), for use in assessing the impact of discharges of radioactive substances to the environment (e.g. IAEA Safety Report Series No.19). The writers of this paper, based on the recommend methods, assessed the discharge limits in some airborne radioactive substances discharging standards. The reasons that IAEA method are introduced are mainly the following considerations: IAEA is one of international organizations with some authorities in the nuclear energy safety and radiation protection; and, more important, the recommend modes are operational methods rather than the methods having little operations such as that have used by some researchers. It is wish that the introduced methods in this paper can be referenced in draft or revise of the standards related to discharges of radioactive substances to the environment

  15. Environment assessing for airborne radioactive particulate release-introduction of methods in IAEA safety report series No.19

    Energy Technology Data Exchange (ETDEWEB)

    Meng, Dan; Yang, Liu; Shen, Fu; Yang, Yi; Ma, Yinghao; Ma, Tao; Zhang, Zhilong; Fu, Cuiming [China Institute for Radiation Protection, Taiyuan (China)

    2016-12-15

    Airborne radioactive particulate in many important nuclear facilities (particularly nuclear power plants) will have a strong impact on the relative public dose if they are released into the corresponding environment traversing the stack or vents. The radiation protection researchers have regarded the relative environment assessing and estimation of public doses. And the model of assessing impact of discharges radioactive substance to the environment have been recommended by many international organizations (e.g. IAEA) with the nuclear energy safety and radiation protection. This paper introduced the generic models that were suggested by International Atomic Energy Agency (IAEA), for use in assessing the impact of discharges of radioactive substances to the environment (e.g. IAEA Safety Report Series No.19). The writers of this paper, based on the recommend methods, assessed the discharge limits in some airborne radioactive substances discharging standards. The reasons that IAEA method are introduced are mainly the following considerations: IAEA is one of international organizations with some authorities in the nuclear energy safety and radiation protection; and, more important, the recommend modes are operational methods rather than the methods having little operations such as that have used by some researchers. It is wish that the introduced methods in this paper can be referenced in draft or revise of the standards related to discharges of radioactive substances to the environment.

  16. Personal privacy, information assurance, and the threat posed by malware techology

    Science.gov (United States)

    Stytz, Martin R.; Banks, Sheila B.

    2006-04-01

    In spite of our best efforts to secure the cyber world, the threats posed to personal privacy by attacks upon networks and software continue unabated. While there are many reasons for this state of affairs, clearly one of the reasons for continued vulnerabilities in software is the inability to assess their security properties and test their security systems while they are in development. A second reason for this growing threat to personal privacy is the growing sophistication and maliciousness of malware coupled with the increasing difficulty of detecting malware. The pervasive threat posed by malware coupled with the difficulties faced when trying to detect its presence or an attempted intrusion make addressing the malware threat one of the most pressing issues that must be solved in order to insure personal privacy to users of the internet. In this paper, we will discuss the threat posed by malware, the types of malware found in the wild (outside of computer laboratories), and current techniques that are available for from a successful malware penetration. The paper includes a discussion of anti-malware tools and suggestions for future anti-malware efforts.

  17. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  18. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  19. Impact of fugitive sources and meteorological parameters on vertical distribution of particulate matter over the industrial agglomeration.

    Science.gov (United States)

    Štrbová, Kristína; Raclavská, Helena; Bílek, Jiří

    2017-12-01

    The aim of the study was to characterize vertical distribution of particulate matter, in an area well known by highest air pollution levels in Europe. A balloon filled with helium with measuring instrumentation was used for vertical observation of air pollution over the fugitive sources in Moravian-Silesian metropolitan area during spring and summer. Synchronously, selected meteorological parameters were recorded together with particulate matter for exploration its relationship with particulate matter. Concentrations of particulate matter in the vertical profile were significantly higher in the spring than in the summer. Significant effect of fugitive sources was observed up to the altitude ∼255 m (∼45 m above ground) in both seasons. The presence of inversion layer was observed at the altitude ∼350 m (120-135 m above ground) at locations with major source traffic load. Both particulate matter concentrations and number of particles for the selected particle sizes decreased with increasing height. Strong correlation of particulate matter with meteorological parameters was not observed. The study represents the first attempt to assess the vertical profile over the fugitive emission sources - old environmental burdens in industrial region. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Method for immobilizing particulate materials in a packed bed

    Science.gov (United States)

    Even, Jr., William R.; Guthrie, Stephen E.; Raber, Thomas N.; Wally, Karl; Whinnery, LeRoy L.; Zifer, Thomas

    1999-01-01

    The present invention pertains generally to immobilizing particulate matter contained in a "packed" bed reactor so as to prevent powder migration, compaction, coalescence, or the like. More specifically, this invention relates to a technique for immobilizing particulate materials using a microporous foam-like polymer such that a) the particulate retains its essential chemical nature, b) the local movement of the particulate particles is not unduly restricted, c) bulk powder migration and is prevented, d) physical and chemical access to the particulate is unchanged over time, and e) very high particulate densities are achieved. The immobilized bed of the present invention comprises a vessel for holding particulate matter, inlet and an outlet ports or fittings, a loosely packed bed of particulate material contained within the vessel, and a three dimensional porous matrix for surrounding and confining the particles thereby fixing the movement of individual particle to a limited local position. The established matrix is composed of a series of cells or chambers comprising walls surrounding void space, each wall forming the wall of an adjacent cell; each wall containing many holes penetrating through the wall yielding an overall porous structure and allowing useful levels of gas transport.

  1. Particulate uranium, plutonium and polonium in the biogeochemistries of the coastal zone

    Energy Technology Data Exchange (ETDEWEB)

    Hodge, V F; Koide, M; Goldberg, E D [Scripps Institution of Oceanography, La Jolla, CA (USA)

    1979-01-18

    It is stated that although increasing attention has been paid to the role of inorganic solid phases in the chemistry of seawater, little quantitative data has been available to assess their involvement with living systems. Recent observations are here reported on the uptake of uranium, plutonium and polonium in coastal waters by organisms and submerged surfaces as traced by their isotopes. It is shown that the body burdens of these radioelements in some marine organisms are governed measurably by the uptake of their particulate forms. Furthermore, these elements are associated with different particulate phases, as deduced from the rates at which they deposit on submerged surfaces.

  2. Threats of Violence in Schools: The Dallas Independent School District's Response.

    Science.gov (United States)

    Ryan-Arrendondo, Kim; Renouf, Kristin; Egyed, Carla; Doxey, Meredith; Dobbins, Maria; Sanchez, Serafin; Rakowitz, Bert

    2001-01-01

    Discusses the Dallas Public Schools' procedures for assessing the potential for violence among children who express intent to harm others. The Dallas Violence Risk Assessment (DVRA) was developed to evaluate students who have made threats of violence, and to assist school staff in determining appropriate intervention strategies. Describes the…

  3. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  4. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  5. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    the fear of nuclear devices. In a scientific area as nuclear, where problems are often very complex for experts themselves, the way to communicate cannot be as simple as good information. Next to that statement, we will develop some conclusions based on the work of Slovic, Kasperson and some others, within the framework of the amplification of risk. This model describes how the threats can be diffuse in a population and specifically the radiological threat. Widely experimentally assessed, it analyse how the fear can spread and affect people, independently form the real measurable risk. We will lastly ask ourselves if there is a way of handle panic for this kind of threat. We will show that the notion of panic is somehow irrelevant to such threats whereas the confidence in political and public regulation is strongly related to them. Finally, we will ask if the social psychologist could make a model of public reaction in case of nuclear threat. That question remains open until further experiments are made. (author)

  6. Matching species traits to projected threats and opportunities from climate change

    DEFF Research Database (Denmark)

    Garcia, Raquel A.; Bastos, Miguel; Burgess, Neil David

    2014-01-01

    Aim Climate change can lead to decreased climatic suitability within species' distributions, increased fragmentation of climatically suitable space, and/or emergence of newly suitable areas outside present distributions. Each of these extrinsic threats and opportunities potentially interacts...... with specific intrinsic traits of species, yet this specificity is seldom considered in risk assessments. We present an analytical framework for examining projections of climate change-induced threats and opportunities with reference to traits that are likely to mediate species' responses, and illustrate...... of a framework combining spatial projections of climate change exposure with traits that are likely to mediate species' responses. Although the proposed framework carries several assumptions that require further scrutiny, its application adds a degree of realism to familiar assessments that consider all species...

  7. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  8. A horizon scanning assessment of current and potential future threats to migratory shorebirds

    Science.gov (United States)

    Sutherland, William J.; Alves, José A.; Amano, Tatsuya; Chang, Charlotte H.; Davidson, Nicholas C.; Finlayson, C. Max; Gill, Jennifer A.; Gill, Robert E.; González, Patricia M.; Gunnarsson, Tómas Grétar; Kleijn, David; Spray, Chris J.; Székely, Tamás; Thompson, Des B.A.

    2012-01-01

    We review the conservation issues facing migratory shorebird populations that breed in temperate regions and use wetlands in the non-breeding season. Shorebirds are excellent model organisms for understanding ecological, behavioural and evolutionary processes and are often used as indicators of wetland health. A global team of experienced shorebird researchers identified 45 issues facing these shorebird populations, and divided them into three categories (natural, current anthropogenic and future issues). The natural issues included megatsunamis, volcanoes and regional climate changes, while current anthropogenic threats encompassed agricultural intensification, conversion of tidal flats and coastal wetlands by human infrastructure developments and eutrophication of coastal systems. Possible future threats to shorebirds include microplastics, new means of recreation and infectious diseases. We suggest that this review process be broadened to other taxa to aid the identification and ranking of current and future conservation actions.

  9. Breast-related stereotype threat contributes to a symptom cluster in women with breast cancer.

    Science.gov (United States)

    Li, Jie; Gao, Wei; Yu, Li-Xiang; Zhu, Song-Ying; Cao, Feng-Lin

    2017-05-01

    To investigate the prevalence of breast-related stereotype threat and its effects on a symptom cluster consisting of anxiety, depression and fatigue and on each symptom. The stereotype that breasts are a sign of women's femininity results in patients with breast cancer fearing diminished femininity and rejection, which may induce psychological problems that co-occur as a symptom cluster. Cross-sectional study. A total of 131 patients with breast cancer postmastectomy completed the study. A question measuring breast-related stereotype threat, the Hospital Anxiety and Depression Scale and the Functional Assessment of Chronic Illness Therapy-Fatigue Scale were used to assess their breast-related stereotype threat and symptoms of anxiety, depression and fatigue. Of the 131 patients who answered the breast-related stereotype threat question, 86 (65·6%) reported breast-related stereotype threat. They did not differ significantly in social and clinical characteristics compared with those without the stereotype, but did report significantly higher levels of the symptom cluster and each symptom (anxiety, depression and fatigue). The odds ratios of the stereotype were significant for the symptom cluster, depression and fatigue (odds ratios = 2·52-3·98, p stereotype threat was common in patients with breast cancer. There was about a twofold increase in their risk of experiencing the symptom cluster and symptoms of depression and fatigue. In clinical practice, breast-related stereotype threat should be measured together with prevalent symptoms (e.g. anxiety, depression and fatigue) in patients with breast cancer. Our findings will aid the development of interventions for improving the mental health of women with breast cancer. © 2016 John Wiley & Sons Ltd.

  10. Combating Terrorism: Linking Threats to Strategies and Resources

    National Research Council Canada - National Science Library

    2000-01-01

    ...) gathers intelligence and assesses the threat posed by domestic sources of terrorism. According to the U.S. intelligence community, conventional explosives and firearms continue to be the weapons of choice for terrorists. The intelligence community (both foreign and domestic agencies) reports an increased possibility that terrorists may use CBRN agents in the next decade.

  11. Early adolescent adversity inflates threat estimation in females and promotes alcohol use initiation in both sexes.

    Science.gov (United States)

    Walker, Rachel A; Andreansky, Christopher; Ray, Madelyn H; McDannald, Michael A

    2018-06-01

    Childhood adversity is associated with exaggerated threat processing and earlier alcohol use initiation. Conclusive links remain elusive, as childhood adversity typically co-occurs with detrimental socioeconomic factors, and its impact is likely moderated by biological sex. To unravel the complex relationships among childhood adversity, sex, threat estimation, and alcohol use initiation, we exposed female and male Long-Evans rats to early adolescent adversity (EAA). In adulthood, >50 days following the last adverse experience, threat estimation was assessed using a novel fear discrimination procedure in which cues predict a unique probability of footshock: danger (p = 1.00), uncertainty (p = .25), and safety (p = .00). Alcohol use initiation was assessed using voluntary access to 20% ethanol, >90 days following the last adverse experience. During development, EAA slowed body weight gain in both females and males. In adulthood, EAA selectively inflated female threat estimation, exaggerating fear to uncertainty and safety, but promoted alcohol use initiation across sexes. Meaningful relationships between threat estimation and alcohol use initiation were not observed, underscoring the independent effects of EAA. Results isolate the contribution of EAA to adult threat estimation, alcohol use initiation, and reveal moderation by biological sex. (PsycINFO Database Record (c) 2018 APA, all rights reserved).

  12. The impact of Stereotype Threat on the simulated driving performance of older drivers.

    Science.gov (United States)

    Joanisse, Mélanie; Gagnon, Sylvain; Voloaca, Mihnea

    2013-01-01

    Older drivers are perceived as being dangerous and overly cautious by other drivers. We tested the hypothesis that this negative stereotype has a direct influence on the performance of older drivers. Based on the Stereotype Threat literature, we predicted that older driving performance would be altered after exposure to a Stereotype Threat. Sixty-one older drivers aged 65 and above completed a simulated driving assessment course. Prior to testing, half of the participants were told that the objective of the study was to investigate why older adults aged 65 and above were more implicated in on-road accidents (Stereotype Threat condition) and half were showed a neutral statement. Results confirmed that exposure to the threat significantly altered driving performance. Older adults in the Stereotype Threat condition made more driving mistakes than those in the control group. Interestingly, under a Stereotype Threat condition, older adults tended to commit more speeding infractions. We also observed that domain identification (whether driving is deemed important or not) moderated the impact of the threat. Taken together, these results support recent older drivers' performance models suggesting that the interaction between individual and social factors need to be considered when examining older drivers' performance. Copyright © 2012 Elsevier Ltd. All rights reserved.

  13. A freshwater biodiversity hotspot under pressure – assessing threats and identifying conservation needs for ancient Lake Ohrid

    Directory of Open Access Journals (Sweden)

    G. Kostoski

    2010-12-01

    Full Text Available Immediate conservation measures for world-wide freshwater resources are of eminent importance. This is particularly true for so-called ancient lakes. While these lakes are famous for being evolutionary theatres, often displaying an extraordinarily high degree of biodiversity and endemism, in many cases these biota are also experiencing extreme anthropogenic impact.

    Lake Ohrid, a major European biodiversity hotspot situated in a trans-frontier setting on the Balkans, is a prime example for a lake with a magnitude of narrow range endemic taxa that are under increasing anthropogenic pressure. Unfortunately, evidence for a "creeping biodiversity crisis" has accumulated over the last decades, and major socio-political changes have gone along with human-mediated environmental changes.

    Based on field surveys, monitoring data, published records, and expert interviews, we aimed to (1 assess threats to Lake Ohrids' (endemic biodiversity, (2 summarize existing conservation activities and strategies, and (3 outline future conservation needs for Lake Ohrid. We compiled threats to both specific taxa (and in cases to particular species as well as to the lake ecosystems itself. Major conservation concerns identified for Lake Ohrid are: (1 watershed impacts, (2 agriculture and forestry, (3 tourism and population growth, (4 non-indigenous species, (5 habitat alteration or loss, (6 unsustainable exploitation of fisheries, and (7 global climate change.

    Among the major (well-known threats with high impact are nutrient input (particularly of phosphorus, habitat conversion and silt load. Other threats are potentially of high impact but less well known. Such threats include pollution with hazardous substances (from sources such as mines, former industries, agriculture or climate change. We review and discuss institutional responsibilities, environmental monitoring and ecosystem management, existing parks and reserves, biodiversity and species

  14. Threat Assessment for Multistage Cyber Attacks in Smart Grid Communication Networks

    OpenAIRE

    He, Xiaobing

    2017-01-01

    In smart grids, managing and controlling power operations are supported by information and communication technology (ICT) and supervisory control and data acquisition (SCADA) systems. The increasing adoption of new ICT assets in smart grids is making smart grids vulnerable to cyber threats, as well as raising numerous concerns about the adequacy of current security approaches. As a single act of penetration is often not sufficient for an attacker to achieve his/her goal, multistage cyb...

  15. Short-term serotonergic but not noradrenergic antidepressant administration reduces attentional vigilance to threat in healthy volunteers.

    Science.gov (United States)

    Murphy, Susannah E; Yiend, Jenny; Lester, Kathryn J; Cowen, Philip J; Harmer, Catherine J

    2009-03-01

    Anxiety is associated with threat-related biases in information processing such as heightened attentional vigilance to potential threat. Such biases are an important focus of psychological treatments for anxiety disorders. Selective serotonin reuptake inhibitors (SSRIs) are effective in the treatment of a range of anxiety disorders. The aim of this study was to assess the effect of an SSRI on the processing of threat in healthy volunteers. A selective noradrenergic reuptake inhibitor (SNRI), which is not generally used in the treatment of anxiety, was used as a contrast to assess the specificity of SSRI effects on threat processing. Forty-two healthy volunteers were randomly assigned to 7 d double-blind intervention with the SSRI citalopram (20 mg/d), the SNRI reboxetine (8 mg/d), or placebo. On the final day, attentional and interpretative bias to threat was assessed using the attentional probe and the homograph primed lexical decision tasks. Citalopram reduced attentional vigilance towards fearful faces but did not affect the interpretation of ambiguous homographs as threatening. Reboxetine had no significant effect on either of these measures. Citalopram reduces attentional orienting to threatening stimuli, which is potentially relevant to its clinical use in the treatment of anxiety disorders. This finding supports a growing literature suggesting that an important mechanism through which pharmacological agents may exert their effects on mood is by reversing the cognitive biases that characterize the disorders that they treat. Future studies are needed to clarify the neural mechanisms through which these effects on threat processing are mediated.

  16. Gauging U.S. Emergency Medical Services workers' willingness to respond to pandemic influenza using a threat- and efficacy-based assessment framework.

    Directory of Open Access Journals (Sweden)

    Daniel J Barnett

    2010-03-01

    Full Text Available Emergency Medical Services workers' willingness to report to duty in an influenza pandemic is essential to healthcare system surge amidst a global threat. Application of Witte's Extended Parallel Process Model (EPPM has shown utility for revealing influences of perceived threat and efficacy on non-EMS public health providers' willingness to respond in an influenza pandemic. We thus propose using an EPPM-informed assessment of EMS workers' perspectives toward fulfilling their influenza pandemic response roles.We administered an EPPM-informed snapshot survey about attitudes and beliefs toward pandemic influenza response, to a nationally representative, stratified random sample of 1,537 U.S. EMS workers from May-June 2009 (overall response rate: 49%. Of the 586 respondents who met inclusion criteria (currently active EMS providers in primarily EMS response roles, 12% indicated they would not voluntarily report to duty in a pandemic influenza emergency if asked, 7% if required. A majority (52% indicated their unwillingness to report to work if risk of disease transmission to family existed. Confidence in personal safety at work (OR = 3.3 and a high threat/high efficacy ("concerned and confident" EPPM profile (OR = 4.7 distinguished those who were more likely to voluntarily report to duty. Although 96% of EMS workers indicated that they would probably or definitely report to work if they were guaranteed a pandemic influenza vaccine, only 59% had received an influenza immunization in the preceding 12 months.EMS workers' response willingness gaps pose a substantial challenge to prehospital surge capacity in an influenza pandemic. "Concerned and confident" EMS workers are more than four times as likely to fulfill pandemic influenza response expectations. Confidence in workplace safety is a positively influential modifier of their response willingness. These findings can inform insights into interventions for enhancing EMS workers' willingness to respond

  17. Short-term serotonergic but not noradrenergic antidepressant administration reduces attentional vigilance to threat in healthy volunteers

    OpenAIRE

    Murphy, Susannah E; Yiend, Jenny; Lester, Kathryn J; Cowen, Philip J; Harmer, Catherine J

    2009-01-01

    Anxiety is associated with threat-related biases in information processing such as heightened attentional vigilance to potential threat. Such biases are an important focus of psychological treatments for anxiety disorders. Selective serotonin reuptake inhibitors (SSRIs) are effective in the treatment of a range of anxiety disorders. The aim of this study was to assess the effect of an SSRI on the processing of threat in healthy volunteers. A selective noradrenergic reuptake inhibitor (SNRI), ...

  18. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  19. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  20. Air Quality Criteria for Particulate Matter.

    Science.gov (United States)

    National Air Pollution Control Administration (DHEW), Washington, DC.

    To assist states in developing air quality standards, this book offers a review of literature related to atmospheric particulates and the development of criteria for air quality. It not only summarizes the current scientific knowledge of particulate air pollution, but points up the major deficiencies in that knowledge and the need for further…

  1. Advances in the simulation of personal protective equipment for the mitigation of exposure to radioactive particulates

    International Nuclear Information System (INIS)

    Roeterink, M.J.; Kelly, D.G.; Dickson, E.F.G; Corcoran, E.C.

    2014-01-01

    Airborne radioactive particulates represent a significant potential hazard to first responders in nuclear related incidents. Personal protective equipment (PPE), in particular radio-opaque fabrics, can be used to reduce wearer exposure to the emitted radiation, but do not offer complete protection. The objective of this project is to create a realistic dosimetric model of the human arm, protected by a sleeve, which can eventually be developed into a tool to assess the full-body dose imparted to the wearer in the event of radiological particulate exposure. A two-fold approach will be employed whereby: (1) a particulate transport model will be used to determine the regional radioactive particulate concentrations; and (2) these concentration data will then be incorporated into a dosimetric model that will use the Monte Carlo N-Particle (MCNP) transport code to determine the dose imparted to the tissue. Benchmarking experiments will be carried out to validate the results generated by the computer models. Such experimentation will be conducted for both the particulate transport and dosimetric models. Model advancement aims to consider whole body dose and will be invaluable in the development of future radiation exposure policies and procedures. (author)

  2. Salience of the Nuclear Threat: Operationalization through Spontaneous Concern.

    Science.gov (United States)

    Mayton, Daniel M., II

    An indirect/nonreactive technique of assessing spontaneous concern should be used to examine the salience of the threat of nuclear war. Direct/reactive techniques may produce inconsistent results and inadvertently enhance a false consensus. The procedures for the administration, scoring, and interpretation of a spontaneous concern measure along…

  3. Concealed Threat Detection at Multiple Frames-per-second

    Energy Technology Data Exchange (ETDEWEB)

    Chang, J T

    2005-11-08

    In this LDRD project, our research purpose is to investigate the science and technology necessary to enable real-time array imaging as a rapid way to detect hidden threats through obscurants such as smoke, fog, walls, doors, and clothing. The goal of this research is to augment the capabilities of protective forces in concealed threat detection. In the current context, threats include people as well as weapons. In most cases, security personnel must make very fast assessments of a threat based upon limited amount of data. Among other attributes, UWB has been shown and quantified to penetrate and propagate through many materials (wood, some concretes, non-metallic building materials, some soils, etc.) while maintaining high range resolution. We have build collaborations with university partners and government agencies. We have considered the impact of psychometrics on target recognition and identification. Specifically we have formulated images in real-time that will engage the user's vision system in a more active way to enhance image interpretation capabilities. In this project, we are researching the use of real time (field programmable gate arrays) integrated with high resolution (cm scale), ultra wide band (UWB) electromagnetic signals for imaging personnel through smoke and walls. We evaluated the ability of real-time UWB imaging for detecting smaller objects, such as concealed weapons that are carried by the obscured personnel. We also examined the cognitive interpretation process of real time UWB electromagnetic images.

  4. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  5. Advanced Hybrid Particulate Collector Project Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    Miller, S.J.

    1995-11-01

    As the consumption of energy increases, its impact on ambient air quality has become a significant concern. Recent studies indicate that fine particles from coal combustion cause health problems as well as atmospheric visibility impairment. These problems are further compounded by the concentration of hazardous trace elements such as mercury, cadmium, selenium, and arsenic in fine particles. Therefore, a current need exists to develop superior, but economical, methods to control emissions of fine particles. Since most of the toxic metals present in coal will be in particulate form, a high level of fine- particle collection appears to be the best method of overall air toxics control. However, over 50% of mercury and a portion of selenium emissions are in vapor form and cannot be collected in particulate control devices. Therefore, this project will focus on developing technology not only to provide ultrahigh collection efficiency of particulate air toxic emissions, but also to capture vapor- phase trace metals such as mercury and selenium. Currently, the primary state-of-the-art technologies for particulate control are fabric filters (baghouses) and electrostatic precipitators (ESPs). However, they both have limitations that prevent them from achieving ultrahigh collection of fine particulate matter and vapor-phase trace metals. The objective of this project is to develop a highly reliable advanced hybrid particulate collector (AHPC) that can provide > 99.99 % particulate collection efficiency for all particle sizes between 0.01 and 50 14m, is applicable for use with all U.S. coals, and is cost-0443competitive with existing technologies. Phase I of the project is organized into three tasks: Task I - Project Management, Reporting, and Subcontract Consulting Task 2 - Modeling, Design, and Construction of 200-acfm AHPC Model Task 3 - Experimental Testing and Subcontract Consulting

  6. Process for off-gas particulate removal and apparatus therefor

    International Nuclear Information System (INIS)

    Carl, D.E.

    1997-01-01

    In the event of a breach in the off-gas line of a melter operation requiring closure of the line, a secondary vessel vent line is provided with a particulate collector utilizing atomization for removal of large particulates from the off-gas. The collector receives the gas containing particulates and directs a portion of the gas through outer and inner annular channels. The collector further receives a fluid, such as water, which is directed through the outer channel together with a second portion of the particulate-laden gas. The outer and inner channels have respective ring-like termination apertures concentrically disposed adjacent one another on the outer edge of the downstream side of the particulate collector. Each of the outer and inner channels curves outwardly away from the collector's centerline in proceeding toward the downstream side of the collector. Gas flow in the outer channel maintains the fluid on the channel's wall in the form of a ''wavy film,'' while the gas stream from the inner channel shears the fluid film as it exits the outer channel in reducing the fluid to small droplets. Droplets formed by the collector capture particulates in the gas stream by one of three mechanisms: impaction, interception or Brownian diffusion in removing the particulates. The particulate-laden droplets are removed from the fluid stream by a vessel vent condenser or mist eliminator. 4 figs

  7. Analyzing Cyber-Physical Threats on Robotic Platforms †

    Science.gov (United States)

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  8. Microfluidic paper-based analytical device for particulate metals.

    Science.gov (United States)

    Mentele, Mallory M; Cunningham, Josephine; Koehler, Kirsten; Volckens, John; Henry, Charles S

    2012-05-15

    A microfluidic paper-based analytical device (μPAD) fabricated by wax printing was designed to assess occupational exposure to metal-containing aerosols. This method employs rapid digestion of particulate metals using microliters of acid added directly to a punch taken from an air sampling filter. Punches were then placed on a μPAD, and digested metals were transported to detection reservoirs upon addition of water. These reservoirs contained reagents for colorimetric detection of Fe, Cu, and Ni. Dried buffer components were used to set the optimal pH in each detection reservoir, while precomplexation agents were deposited in the channels between the sample and detection zones to minimize interferences from competing metals. Metal concentrations were quantified from color intensity images using a scanner in conjunction with image processing software. Reproducible, log-linear calibration curves were generated for each metal, with method detection limits ranging from 1.0 to 1.5 μg for each metal (i.e., total mass present on the μPAD). Finally, a standard incineration ash sample was aerosolized, collected on filters, and analyzed for the three metals of interest. Analysis of this collected aerosol sample using a μPAD showed good correlation with known amounts of the metals present in the sample. This technology can provide rapid assessment of particulate metal concentrations at or below current regulatory limits and at dramatically reduced cost.

  9. Assessing the Threat of Infectious Disease to the Biosecurity of the United States

    Science.gov (United States)

    2016-06-10

    bioweapons to innocent tourists who unknowingly transmit a potentially deadly pathogen to a susceptible person. The threat is significant. In the US...infectious disease agent. The exposure can take many forms, but typical routes include inhalation, ingestion, direct contact or from the bite of a

  10. Healthcare Stereotype Threat in Older Adults in the Health and Retirement Study.

    Science.gov (United States)

    Abdou, Cleopatra M; Fingerhut, Adam W; Jackson, James S; Wheaton, Felicia

    2016-02-01

    Healthcare stereotype threat is the threat of being personally reduced to group stereotypes that commonly operate within the healthcare domain, including stereotypes regarding unhealthy lifestyles and inferior intelligence. The objective of this study was to assess the extent to which people fear being judged in healthcare contexts on several characteristics, including race/ethnicity and age, and to test predictions that experience of such threats would be connected with poorer health and negative perceptions of health care. Data were collected as part of the 2012 Health and Retirement Study (HRS). A module on healthcare stereotype threat, designed by the research team, was administered to a random subset (n=2,048 of the total 20,555) of HRS participants. The final sample for the present healthcare stereotype threat experiment consists of 1,479 individuals. Logistic regression was used to test whether healthcare stereotype threat was associated with self-rated health, reported hypertension, and depressive symptoms, as well as with healthcare-related outcomes, including physician distrust, dissatisfaction with health care, and preventative care use. Seventeen percent of respondents reported healthcare stereotype threat with respect to one or more aspects of their identities. As predicted, healthcare stereotype threat was associated with higher physician distrust and dissatisfaction with health care, poorer mental and physical health (i.e., self-rated health, hypertension, and depressive symptoms), and lower odds of receiving the influenza vaccine. The first of its kind, this study demonstrates that people can experience healthcare stereotype threat on the basis of various stigmatized aspects of social identity, and that these experiences can be linked with larger health and healthcare-related outcomes, thereby contributing to disparities among minority groups. Copyright © 2016. Published by Elsevier Inc.

  11. Application of Cyclone to Removal of Hot Particulate in Hot Cell

    International Nuclear Information System (INIS)

    Kim, Gye Nam; Lee, Sung Yeol; Won, Hui Jun; Jung, Chong Hun; Oh, Won Zin

    2005-01-01

    The size and main ingredient of hot particulate generated during the nuclide experiment in hot cells of nuclear facilities were 0.5300 μm and UO 2 . A cyclone filter equipment which consists of a cyclone and Bag/HEPA filter was devised to remove hot particulate generated during the nuclide experiment in hot cells of nuclear facilities. The experimental conditions to maximize the collection efficiency of hot particulate were suggested through experiments done with the cyclone filter equipment. With the large size of simulated particulate, the collection efficiency of the particulate was high. When the size of simulated particulate was more than 5 μm, the collection efficiency of the particulate was more than 80% and when the size of simulated particulate was less than 1.0 μm, the collection efficiency decreased by less than. If the inflow velocity of simulated particulate was increased, the collection efficiency of the particulate was also increased. When the inflow velocity of simulated particulate was more than 12 m/sec, the collection efficiency was higher than , but after 17 m/sec inflow velocity, no change observed. The collection efficiency of the simulated particulate can be enhanced with the length of vortex finder inside the chamber. With the length of vortex finder, 7.2 cm, the observed collection efficiency of the particulate was the maximum. Moreover, when the sub-cone was attached under the cyclone, the collection efficiency of cyclone increased 2%. It was found that effect by attachment of sub-cone was not serious.

  12. Particulate carbon in the atmosphere

    International Nuclear Information System (INIS)

    Surakka, J.

    1992-01-01

    Carbonaceous aerosols are emitted to the atmosphere in combustion processes. Carbon particles are very small and have a long residence time in the air. Black Carbon, a type of carbon aerosol, is a good label when transport of combustion emissions in the atmosphere is studied. It is also useful tool in air quality studies. Carbon particles absorb light 6.5 to 8 times stronger than any other particulate matter in the air. Their effect on decreasing visibility is about 50 %. Weather disturbances are also caused by carbon emissions e.g. in Kuwait. Carbon particles have big absorption surface and capacity to catalyze different heterogenous reactions in air. Due to their special chemical and physical properties particulate carbon is a significant air pollution specie, especially in urban air. Average particulate carbon concentration of 5.7 μg/m 2 have been measured in winter months in Helsinki

  13. Global Particulate Matter Source Apportionment

    Science.gov (United States)

    Lamancusa, C.; Wagstrom, K.

    2017-12-01

    As our global society develops and grows it is necessary to better understand the impacts and nuances of atmospheric chemistry, in particular those associated with atmospheric particulate matter. We have developed a source apportionment scheme for the GEOS-Chem global atmospheric chemical transport model. While these approaches have existed for several years in regional chemical transport models, the Global Particulate Matter Source Apportionment Technology (GPSAT) represents the first incorporation into a global chemical transport model. GPSAT runs in parallel to a standard GEOS-Chem run. GPSAT uses the fact that all molecules of a given species have the same probability of undergoing any given process as a core principle. This allows GPSAT to track many different species using only the flux information provided by GEOS-Chem's many processes. GPSAT accounts for the change in source specific concentrations as a result of aqueous and gas-phase chemistry, horizontal and vertical transport, condensation and evaporation on particulate matter, emissions, and wet and dry deposition. By using fluxes, GPSAT minimizes computational cost by circumventing the computationally costly chemistry and transport solvers. GPSAT will allow researchers to address many pertinent research questions about global particulate matter including the global impact of emissions from different source regions and the climate impacts from different source types and regions. For this first application of GPSAT, we investigate the contribution of the twenty largest urban areas worldwide to global particulate matter concentrations. The species investigated include: ammonium, nitrates, sulfates, and the secondary organic aerosols formed by the oxidation of benzene, isoprene, and terpenes. While GPSAT is not yet publically available, we will incorporate it into a future standard release of GEOS-Chem so that all GEOS-Chem users will have access to this new tool.

  14. Particulate contamination spectrometer. Volume 1: Technical report

    Science.gov (United States)

    Schmitt, R. J.; Boyd, B. A.; Linford, R. M. F.

    1975-01-01

    A laser particulate spectrometer (LPS) system was developed to measure the size and speed distributions of particulate (dusts, aerosols, ice particles, etc.) contaminants. Detection of the particulates was achieved by means of light scattering and extinction effects using a single laser beam to cover a size range of 0.8 to 275 microns diameter and a speed range of 0.2 to 20 meter/second. The LPS system was designed to operate in the high vacuum environment of a space simulation chamber with cold shroud temperatures ranging from 77 to 300 K.

  15. Modelling airborne dispersion of coarse particulate material

    International Nuclear Information System (INIS)

    Apsley, D.D.

    1989-03-01

    Methods of modelling the airborne dispersion and deposition of coarse particulates are presented, with the emphasis on the heavy particles identified as possible constituents of releases from damaged AGR fuel. The first part of this report establishes the physical characteristics of the irradiated particulate in airborne emissions from AGR stations. The second part is less specific and describes procedures for extending current dispersion/deposition models to incorporate a coarse particulate component: the adjustment to plume spread parameters, dispersion from elevated sources and dispersion in conjunction with building effects and plume rise. (author)

  16. Assessing the impact of the U.S. Endangered Species Act recovery planning guidelines on managing threats for listed species.

    Science.gov (United States)

    Troyer, Caitlin M; Gerber, Leah R

    2015-10-01

    The Endangered Species Act (ESA) of the United States was enacted in 1973 to prevent the extinction of species. Recovery plans, required by 1988 amendments to the ESA, play an important role in organizing these efforts to protect and recover species. To improve the use of science in the recovery planning process, the Society for Conservation Biology (SCB) commissioned an independent review of endangered species recovery planning in 1999. From these findings, the SCB made key recommendations for how management agencies could improve the recovery planning process, after which the U.S. Fish and Wildlife Service and the National Marine Fisheries Service redrafted their recovery planning guidelines. One important recommendation called for recovery plans to make threats a primary focus, including organizing and prioritizing recovery tasks for threat abatement. We sought to determine the extent to which results from the SCB study were incorporated into these new guidelines and whether the SCB recommendations regarding threats manifested in recovery plans written under the new guidelines. Recovery planning guidelines generally incorporated the SCB recommendations, including those for managing threats. However, although recent recovery plans have improved in their treatment of threats, many fail to adequately incorporate threat monitoring. This failure suggests that developing clear guidelines for monitoring should be an important priority in improving ESA recovery planning. © 2015 Society for Conservation Biology.

  17. Outcome and Efficacy of Interventions by a Public Figure Threat Assessment and Management Unit: A Mirrored Study of Concerning Behaviors and Police Contacts Before and After Intervention.

    Science.gov (United States)

    James, David V; Farnham, Frank R

    2016-09-01

    Specialized units for the assessment and management of concerning behaviors towards public figures have been set up in various jurisdictions. Their efficacy has been demonstrated descriptively and in terms of reduction in concern rates. This study of 100 consecutive cases from the Fixated Threat Assessment Centre (FTAC) in the UK uses a novel measure of outcome in the form of reduction in behaviors of concern and in police call-outs/stops, using data culled from police and health service records. It adopts a mirrored design, comparing individuals over 12-month and 2-year periods before and after FTAC intervention. It demonstrates significant reductions in both numbers of individuals involved in, and number of actual incidents of, concerning communication and problematic approach, as well as police call-outs/stops. Most results are consistent across subgroups with regard to gender, previous convictions, concern level, compulsory hospitalization and grievance-driven behavior. Such threat assessment units reduce risky behavior and save police time and, possibly, costs. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  18. Global Guidance On LCIA Indicators: Impacts Of Particulate Matter And Of Land Use

    DEFF Research Database (Denmark)

    Jolliet, Olivier; Fantke, Peter; McKone, Thomas E.

    2017-01-01

    Improving life cycle impact assessment models is crucial. The flagship project of the UNEP-SETAC Life Cycle Initiative provides global guidance and consensus on environmental LCIA indicators for climate change, particulate matter impacts, land use impact on biodiversity, water scarcity and water ...

  19. Meeting the challenge of interacting threats in freshwater ecosystems: A call to scientists and managers

    Directory of Open Access Journals (Sweden)

    Laura S. Craig

    2017-12-01

    Full Text Available Human activities create threats that have consequences for freshwater ecosystems and, in most watersheds, observed ecological responses are the result of complex interactions among multiple threats and their associated ecological alterations. Here we discuss the value of considering multiple threats in research and management, offer suggestions for filling knowledge gaps, and provide guidance for addressing the urgent management challenges posed by multiple threats in freshwater ecosystems. There is a growing literature assessing responses to multiple alterations, and we build off this background to identify three areas that require greater attention: linking observed alterations to threats, understanding when and where threats overlap, and choosing metrics that best quantify the effects of multiple threats. Advancing science in these areas will help us understand existing ecosystem conditions and predict future risk from multiple threats. Because addressing the complex issues and novel ecosystems that arise from the interaction of multiple threats in freshwater ecosystems represents a significant management challenge, and the risks of management failure include loss of biodiversity, ecological goods, and ecosystem services, we also identify actions that could improve decision-making and management outcomes. These actions include drawing insights from management of individual threats, using threat attributes (e.g., causes and spatio-temporal dynamics to identify suitable management approaches, testing management strategies that are likely to be successful despite uncertainties about the nature of interactions among threats, avoiding unintended consequences, and maximizing conservation benefits. We also acknowledge the broadly applicable challenges of decision-making within a socio-political and economic framework, and suggest that multidisciplinary teams will be needed to innovate solutions to meet the current and future challenge of interacting

  20. Meeting the challenge of interacting threats in freshwater ecosystems: A call to scientists and managers

    Science.gov (United States)

    Craig, Laura S.; Olden, Julian D.; Arthington, Angela; Entrekin, Sally; Hawkins, Charles P.; Kelly, John J.; Kennedy, Theodore A.; Maitland, Bryan M.; Rosi, Emma J.; Roy, Allison; Strayer, David L.; Tank, Jennifer L.; West, Amie O.; Wooten, Matthew S.

    2017-01-01

    Human activities create threats that have consequences for freshwater ecosystems and, in most watersheds, observed ecological responses are the result of complex interactions among multiple threats and their associated ecological alterations. Here we discuss the value of considering multiple threats in research and management, offer suggestions for filling knowledge gaps, and provide guidance for addressing the urgent management challenges posed by multiple threats in freshwater ecosystems. There is a growing literature assessing responses to multiple alterations, and we build off this background to identify three areas that require greater attention: linking observed alterations to threats, understanding when and where threats overlap, and choosing metrics that best quantify the effects of multiple threats. Advancing science in these areas will help us understand existing ecosystem conditions and predict future risk from multiple threats. Because addressing the complex issues and novel ecosystems that arise from the interaction of multiple threats in freshwater ecosystems represents a significant management challenge, and the risks of management failure include loss of biodiversity, ecological goods, and ecosystem services, we also identify actions that could improve decision-making and management outcomes. These actions include drawing insights from management of individual threats, using threat attributes (e.g., causes and spatio-temporal dynamics) to identify suitable management approaches, testing management strategies that are likely to be successful despite uncertainties about the nature of interactions among threats, avoiding unintended consequences, and maximizing conservation benefits. We also acknowledge the broadly applicable challenges of decision-making within a socio-political and economic framework, and suggest that multidisciplinary teams will be needed to innovate solutions to meet the current and future challenge of interacting threats in

  1. Microwave regenerated particulate trap

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, A.C. Jr.; Yonushonis, T.M. [Cummins Engine Co., Inc., Columbus, IN (United States); Haberkamp, W.C.; Mako, F.; Len, L.K,; Silberglitt, R.; Ahmed, I. [FM Technologies, Inc., Fairfax, VA (United States)

    1997-12-31

    It has been demonstrated that a fibrous particulate filter can extract particulate matter from the diesel exhaust. However, additional engineering efforts remains to achieve the design target of 90%. It has also be shown that with minor modifications magnetrons produced for home ovens can endure a simulated diesel operating environment. Much work remains to develop a robust product ready to complete extensive engine testing and evaluation. These efforts include: (1) additional environmental testing of magnetrons; (2) vibration testing of the filter in the housing; (3) evaluating alternative methods/designs to seal the center bore; and (4) determining the optimum coating thickness that provides sufficient structural integrity while maintaining rapid heating rates.

  2. Complexity analysis in particulate matter measurements

    Directory of Open Access Journals (Sweden)

    Luciano Telesca

    2011-09-01

    Full Text Available We investigated the complex temporal fluctuations of particulate matter data recorded in London area by using the Fisher-Shannon (FS information plane. In the FS plane the PM10 and PM2.5 data are aggregated in two different clusters, characterized by different degrees of order and organization. This results could be related to different sources of the particulate matter.

  3. Heat and mass transfer in particulate suspensions

    CERN Document Server

    Michaelides, Efstathios E (Stathis)

    2013-01-01

    Heat and Mass Transfer in Particulate Suspensions is a critical review of the subject of heat and mass transfer related to particulate Suspensions, which include both fluid-particles and fluid-droplet Suspensions. Fundamentals, recent advances and industrial applications are examined. The subject of particulate heat and mass transfer is currently driven by two significant applications: energy transformations –primarily combustion – and heat transfer equipment. The first includes particle and droplet combustion processes in engineering Suspensions as diverse as the Fluidized Bed Reactors (FBR’s) and Internal Combustion Engines (ICE’s). On the heat transfer side, cooling with nanofluids, which include nanoparticles, has attracted a great deal of attention in the last decade both from the fundamental and the applied side and has produced several scientific publications. A monograph that combines the fundamentals of heat transfer with particulates as well as the modern applications of the subject would be...

  4. Development of asthmatic inflammation in mice following early-life exposure to ambient environmental particulates and chronic allergen challenge

    Directory of Open Access Journals (Sweden)

    Cristan Herbert

    2013-03-01

    Childhood exposure to environmental particulates increases the risk of development of asthma. The underlying mechanisms might include oxidant injury to airway epithelial cells (AEC. We investigated the ability of ambient environmental particulates to contribute to sensitization via the airways, and thus to the pathogenesis of childhood asthma. To do so, we devised a novel model in which weanling BALB/c mice were exposed to both ambient particulate pollutants and ovalbumin for sensitization via the respiratory tract, followed by chronic inhalational challenge with a low mass concentration of the antigen. We also examined whether these particulates caused oxidant injury and activation of AEC in vitro. Furthermore, we assessed the potential benefit of minimizing oxidative stress to AEC through the period of sensitization and challenge by dietary intervention. We found that characteristic features of asthmatic inflammation developed only in animals that received particulates at the same time as respiratory sensitization, and were then chronically challenged with allergen. However, these animals did not develop airway hyper-responsiveness. Ambient particulates induced epithelial injury in vitro, with evidence of oxidative stress and production of both pro-inflammatory cytokines and Th2-promoting cytokines such as IL-33. Treatment of AEC with an antioxidant in vitro inhibited the pro-inflammatory cytokine response to these particulates. Ambient particulates also induced pro-inflammatory cytokine expression following administration to weanling mice. However, early-life dietary supplementation with antioxidants did not prevent the development of an asthmatic inflammatory response in animals that were exposed to particulates, sensitized and challenged. We conclude that injury to airway epithelium by ambient environmental particulates in early life is capable of promoting the development of an asthmatic inflammatory response in sensitized and antigen-challenged mice. These

  5. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  6. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  7. Casting of particulate Al-base composites

    International Nuclear Information System (INIS)

    Moustafa, S.F.

    1997-01-01

    A molten Al-4 wt.% Cu as well as a Al-13 wt.% Si alloy have been mixed mechanically with particulate of SiC, Al 2 O 3 , or graphite. After the completion of mixing, each mixture was poured into a permanent mould to solidify. To overcome the problem of non-wettability that exists between the investigated particulate and the molten aluminum alloys the particulate was chemically treated by impregnation in a solution containing Na + ions. The loading of SiC or Al 2 O 3 particulate in the produced composites can be as high as 40 wt.%, and for graphite particles it can be 20 wt.%. The mixing time required to introduce and distribute the investigated particles into the molten matrix was as low as five minutes to recluce chemical reactions at the interfaces between them. Processing details and parameters controlling this technique are described. Metallographic examinations as well as tensile tests were carried out to characterize the microstructure, the distribution of the particles and the strength of these composites. The results display that the composites made by this technique have good microstructure and tensile properties. (orig.)

  8. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  9. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  10. Assessment of occupational exposure and contamination by Means of airborne particulate matter and bio monitors using Nuclear technique

    International Nuclear Information System (INIS)

    Menezes, Maria Angela de B. C.; Maia, Elene C. P.; Albinati, Claudia; Filho, Serafim S.

    2001-01-01

    To make an occupational diagnosis is complex because of the difficulty to identify and characterise the expositions. Physicians do not usually have access to the quantity of raw material managed by the worker, dates, period of exposure to the substance. Besides this the onset of occupational diseases is similar to other chronic diseases. Then, this project aimed at assessing metal levels in a galvanising industry by means of biomonitors, scalp hair and toenails donated by workers, and particulate matter collected on air filter. The analysis of the samples was carried out by k0 instrumental neutron activation analysis, k0-INAA. The project was conducted together with the physicians of the Secretariat Municipal de Saude (Municipal Department of Health) and it was inserted in a Worker's Health Awareness Program. Belo Horizonte and surrounding areas are an important industrial centre, concentrating many industries in several areas. Only in Belo Horizonte there are more than 20 galvanising industries ranging from home factories to well equipped ones. This industry was chosen as Object of this project because it is responsible for the majority of patients who look for medical assistance because of metal contamination. Stationary air sampling was carried out in order to evaluate the level of elemental concentration in the indoor environment of the plant. Comparative Group sampling was carried out the same way as the Work Group for scalp hair and toenails. The irradiations were performed in the reactor TRIGA MARK I IPR-R1 in the CDTN. Elemental concentration results determined in the samples from non-exposed people were compared to values in the literature and there were no significant differences between the values. The airborne particulate matter results showed the high level of pollutants which the workers are exposed to inside the galvanising factory. The results obtained confirmed the medical suspicions of workers' contamination and the medical recommendations aimed

  11. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  12. Norwegian support in development of regulations of radioactive waste management in central Asia-threat assessment

    International Nuclear Information System (INIS)

    Zhunussova, Tamara; Sneve, Malgorzata; Liland, Astrid; Strand, Per; Kim, Alexander; Mirsaidov, Ulmas; Tolongutov, Baigabyl

    2011-01-01

    In Central Asia (CA) the radioactive waste comes mainly from uranium mining and milling, nuclear weapon testing and nuclear power development and other ionizing sources. This waste was produced, to a greater extent, by the military-industrial complex and the uranium and non-uranium industry, and, to a lesser extent, by the nuclear industry and in the process of use of isotope products. Exploitation and mining of uranium and thorium deposits produce a large amount of solid and liquid radioactive waste, as well volatile contaminants which need a proper management. In Central Asia the wastes are mainly stored at the surface in large piles and represent a long-term potential health and environmental hazard. The process of remediating legacy sites of the past and reducing the threats is now getting under way, with the design and implementation of remediation activities, partly with international support. However, there is a significant lack in the regulatory basis for carrying out such remediation work, including a lack of relevant radiation and environmental safety norms and standards, licensing procedures and requirements for monitoring etc., as well as expertise to transform such a basis into practice. Accordingly, the objective of the proposed project is to assist the relevant regulatory authorities in Kazakhstan, Kirgizstan and Tajikistan to develop national robust and adequate regulations and procedures, taking into account the international guidance and Norwegian experience with regulatory support projects in Russia. Specific expected results in the project period include: a threat assessment report identifying priority areas for regulatory development, based on the status of current regulatory documents and the hazard presented by the different sites and facilities; development of national radioactive waste management strategies in each country; development of an enhanced regulatory framework for supervision of nuclear matters, and an enhanced safety culture

  13. Relationship between Particulate matter less than 10 microns exposures and health effects on humans in Ahvaz, Iran

    Directory of Open Access Journals (Sweden)

    Sahar Geravandi

    2015-06-01

    Full Text Available Background & Aims of the Study: Particulate matters less than 10 microns can absorb into your lungs and reacting with the moisture and enter the circulatory system directly through the airways. The aim of this study is to assess Behavior PM 10 data in different seasons and Determination effects on human health in Ahvaz city during 2013. Materials & Methods: Data Particulate matters less than 10 microns were taken from Ahvaz Department of Environment and Meteorological Organization. Sampling was performed for 24 hours in 4 stations. Method of sampling and analysis were performed according to EPA guideline. Processing data include the instruction set correction of averaging, coding and filtering. Finally, health-effects of Particulate matters less than 10 exposures were calculated with impact of meteorological parameters and converted as input file to the Air Q model. Results: PM 10 concentration in winter season was maximum amount in the year 2013. According to the research findings, highest and the lowest Particulate matters less than 10 microns concentrations during 2013 had the Bureau of Meteorology “Havashenasi” and Head office of ADoE “Mohitzist”. Sum of total numbers of cardiovascular death and hospitals admission to respiratory diseases attributed to Particulate matters less than 10 microns were 923 and 2342 cases in 2013. Conclusions: Particulate matter emissions are highly regulated in most industrialized countries. Due to environmental concerns, most industries and dust storm phenomena are required to decrease in source produce particle mater and kind of dust collection system to control particulate emissions. Pollution prevention and control measures that reduce Particulate matters less than 10 microns can very useful for expected to reduce people’s exposures to Sulfur dioxide.

  14. Particulate matter mass concentrations produced from pavement surface abrasion

    Directory of Open Access Journals (Sweden)

    Fullova Dasa

    2017-01-01

    Full Text Available According to the latest findings particulate matter belong to the most significant pollutants in Europe together with ground-level ozone O3 and nitrogen dioxide NO2. Road traffic is one of the main sources of particulate matter. Traffic volume has unpleasant impact on longevity of the pavements and also on the environment. Vehicle motions cause mechanical wearing of the asphalt pavement surface - wearing course by vehicle tyres. The paper deals with abrasion of bituminous wearing courses of pavements. The asphalt mixtures are compared in terms of mechanically separated particulate matter. The samples of asphalt mixtures were rutted in wheel tracking machine. The particulate matter measurements were performed in laboratory conditions. The experimental laboratory measurements make it possible to sample particulates without contamination from exhaust emissions, abraded particles from vehicles, resuspension of road dust and climate affects. The paper offers partial results of measurements on six trial samples of asphalt mixtures with different composition. It presents particulate matter morphology and the comparison of rutted asphalt samples in terms of PM mass concentrations and chemical composition.

  15. Particulate carbohydrates in the Bay of Bengal

    Digital Repository Service at National Institute of Oceanography (India)

    Bhosle, N.B.; Nandakumar, K.; Venkat, K.

    Particulate matter collected from 77 water samples over a 3000 m water column was analyzed for particulate carbohydrates (PCHO). PCHO in the surface waters ranged from 43 to 143 mu g.l-1, and below 250 m it was 16.PCHO showed large variations at all...

  16. Portable Wireless Device Threat Assessment for Aircraft Navigation Radios

    Science.gov (United States)

    Nguyen, Truong X.; Koppen, Sandra V.; Ely, Jay J.; Williams, Reuben A.; Smith, Laura J.; Salud, Maria Theresa P.

    2004-01-01

    This paper addresses the concern for Wireless Local Area Network devices and two-way radios to cause electromagnetic interference to aircraft navigation radio systems. Spurious radiated emissions from various IEEE 802.11a, 802.11b, and Bluetooth devices are characterized using reverberation chambers. The results are compared with baseline emissions from standard laptop computer and personal digital assistants (PDAs) that are currently allowed for use on aircraft. The results indicate that the WLAN devices tested are not more of a threat to aircraft navigation radios than standard laptop computers and PDAs in most aircraft bands. In addition, spurious radiated emission data from seven pairs of two-way radios are provided. These two-way radios emit at much higher levels in the bands considered. A description of the measurement process, device modes of operation and the measurement results are reported.

  17. Shielded regeneration heating element for a particulate filter

    Science.gov (United States)

    Gonze, Eugene V [Pinckney, MI; Ament, Frank [Troy, MI

    2011-01-04

    An exhaust system includes a particulate filter (PF) that is disposed downstream from an engine. The PF filters particulates within an exhaust from the engine. A heating element heats particulate matter in the PF. A catalyst substrate or a flow converter is disposed upstream from said heating element. The catalyst substrate oxidizes the exhaust prior to reception by the heating element. The flow converter converts turbulent exhaust flow to laminar exhaust flow prior to reception by the heating element.

  18. Perceived Threat and Perceived Neglect: Couples' Underlying Concerns during Conflict

    Science.gov (United States)

    Sanford, Keith

    2010-01-01

    The Couples Underlying Concern Inventory assesses 2 fundamental types of distress that couples experience during interpersonal conflict. "Perceived threat" involves a perception that one's partner is blaming and controlling the self. "Perceived neglect" involves a perception that one's partner is failing to make desired contributions or…

  19. Problems and Tools for the Detection of Threats to Personnel Security in the Region

    Directory of Open Access Journals (Sweden)

    Natalia Victorovna Kuznetsova

    2016-12-01

    Full Text Available The investigation of threats negatively affecting the state and the development of human resources as well as the varieties of security threats is of particular importance in the theory and practice of personnel security measures. The purpose of the article is to identify and classify the ideas of the main threats to personnel security of the region (the research is carried out on the example of the Irkutsk region. On the basis of the content analysis of Russian regulatory legal acts and scientific publications, external and internal threats to personnel security of the region are highlighted. As a result, the list of threats to personnel security of the region consisting of 37 stands is composed. The political, economic, demographic, social, technical and technological, ecological, legal, ethnocultural forms of threats are demonstrated. The authors came to the conclusion that the internal threats to personnel security of the region (first of all socio-economic are dominant. An assessment of the urgency and relevance of the threats to the personnel security of the region is given. With the use of the technology of the hierarchical factorial analysis, the types of threats (factors of the lowest level were identified and their influence on the general level of the urgency of personnel security threats (a factor of the highest level is estimated. It is revealed that legal threats, as well as threats caused by the low labour potential of the region, have the most significant impact on the estimation of the urgency of threats. The study applies the following analysis methods — a content analysis, the analysis of linear and cross-distribution, hierarchical factor and correlation analysis. The analysis is based on the data of the expert survey conducted in the Irkutsk region (2015. To determine the relationship (coherence of the expert evaluations, the Kendall’s coefficient of concordance is calculated. The received results can be used for studying

  20. Life cycle impact assessment modeling for particulate matter: A new approach based on physico-chemical particle properties.

    Science.gov (United States)

    Notter, Dominic A

    2015-09-01

    Particulate matter (PM) causes severe damage to human health globally. Airborne PM is a mixture of solid and liquid droplets suspended in air. It consists of organic and inorganic components, and the particles of concern range in size from a few nanometers to approximately 10μm. The complexity of PM is considered to be the reason for the poor understanding of PM and may also be the reason why PM in environmental impact assessment is poorly defined. Currently, life cycle impact assessment is unable to differentiate highly toxic soot particles from relatively harmless sea salt. The aim of this article is to present a new impact assessment for PM where the impact of PM is modeled based on particle physico-chemical properties. With the new method, 2781 characterization factors that account for particle mass, particle number concentration, particle size, chemical composition and solubility were calculated. Because particle sizes vary over four orders of magnitudes, a sound assessment of PM requires that the exposure model includes deposition of particles in the lungs and that the fate model includes coagulation as a removal mechanism for ultrafine particles. The effects model combines effects from particle size, solubility and chemical composition. The first results from case studies suggest that PM that stems from emissions generally assumed to be highly toxic (e.g. biomass combustion and fossil fuel combustion) might lead to results that are similar compared with an assessment of PM using established methods. However, if harmless PM emissions are emitted, established methods enormously overestimate the damage. The new impact assessment allows a high resolution of the damage allocatable to different size fractions or chemical components. This feature supports a more efficient optimization of processes and products when combating air pollution. Copyright © 2015 Elsevier Ltd. All rights reserved.

  1. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  2. Spontaneous default mode network phase-locking moderates performance perceptions under stereotype threat.

    Science.gov (United States)

    Forbes, Chad E; Leitner, Jordan B; Duran-Jordan, Kelly; Magerman, Adam B; Schmader, Toni; Allen, John J B

    2015-07-01

    This study assessed whether individual differences in self-oriented neural processing were associated with performance perceptions of minority students under stereotype threat. Resting electroencephalographic activity recorded in white and minority participants was used to predict later estimates of task errors and self-doubt on a presumed measure of intelligence. We assessed spontaneous phase-locking between dipole sources in left lateral parietal cortex (LPC), precuneus/posterior cingulate cortex (P/PCC), and medial prefrontal cortex (MPFC); three regions of the default mode network (DMN) that are integral for self-oriented processing. Results revealed that minorities with greater LPC-P/PCC phase-locking in the theta band reported more accurate error estimations. All individuals experienced less self-doubt to the extent they exhibited greater LPC-MPFC phase-locking in the alpha band but this effect was driven by minorities. Minorities also reported more self-doubt to the extent they overestimated errors. Findings reveal novel neural moderators of stereotype threat effects on subjective experience. Spontaneous synchronization between DMN regions may play a role in anticipatory coping mechanisms that buffer individuals from stereotype threat. © The Author (2014). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  3. Village Level Tsunami Threat Maps for Tamil Nadu, SE Coast of India: Numerical Modeling Technique

    Science.gov (United States)

    MP, J.; Kulangara Madham Subrahmanian, D.; V, R. M.

    2014-12-01

    The Indian Ocean tsunami (IOT) devastated several countries of North Indian Ocean. India is one of the worst affected countries after Indonesia and Sri Lanka. In India, Tamil Nadu suffered maximum with fatalities exceeding 8,000 people. Historical records show that tsunami has invaded the shores of Tamil Nadu in the past and has made people realize that the tsunami threat looms over Tamil Nadu and it is necessary to evolve strategies for tsunami threat management. The IOT has brought to light that tsunami inundation and runup varied within short distances and for the disaster management for tsunami, large scale maps showing areas that are likely to be affected by future tsunami are identified. Therefore threat assessment for six villages including Mamallapuram (also called Mahabalipuram) which is famous for its rock-cut temples, from the northern part of Tamil Nadu state of India has been carried out and threat maps categorizing the coast into areas of different degree of threat are prepared. The threat was assessed by numerical modeling using TUNAMI N2 code considering different tsunamigenic sources along the Andaman - Sumatra trench. While GEBCO and C-Map data was used for bathymetry and for land elevation data was generated by RTK - GPS survey for a distance of 1 km from shore and SRTM for the inland areas. The model results show that in addition to the Sumatra source which generated the IOT in 2004, earthquakes originating in Car Nicobar and North Andaman can inflict more damage. The North Andaman source can generate a massive tsunami and an earthquake of magnitude more than Mw 9 can not only affect Tamil Nadu but also entire south east coast of India. The runup water level is used to demarcate the tsunami threat zones in the villages using GIS.

  4. IDENTIFICATION OF THE FREQUENCY AND THE INTENSITY OF THE THREATS IN THE FUNCTION OF DEVELOPMENT OF THE INFORMATION SYSTEM

    Directory of Open Access Journals (Sweden)

    Željko Hutinski

    2006-06-01

    Full Text Available In the process of development of the security system of the information system, the risk assessment is the foundation for selection of the security measures. The reduction of the level of risk and the amount of costs depend upon the adequate selection of the security measures. The quality of the risk assessment depends upon the adequate assessment of the form and the intensity of the threats. If the forms of threats are not monitored in the business system, it should make its own threat assessment, or use experience of others. The best, but also the most time-consuming solution is to develop own security system, while the fastest way is to use experience of others. However, there is the problem of migration of some other solution to our own system. Depending upon the question whether we are adopting the experiences of domestic or foreign business systems, the question of the applicability to the system from the different business environment becomes relevant. This happens because of the significant differences in the form and intensity of threats in certain local environments or different branches of industry.

  5. Electrically heated particulate filter enhanced ignition strategy

    Science.gov (United States)

    Gonze, Eugene V; Paratore, Jr., Michael J

    2012-10-23

    An exhaust system that processes exhaust generated by an engine is provided. The system generally includes a particulate filter (PF) that filters particulates from the exhaust wherein an upstream end of the PF receives exhaust from the engine. A grid of electrically resistive material is applied to an exterior upstream surface of the PF and selectively heats exhaust passing through the grid to initiate combustion of particulates within the PF. A catalyst coating applied to at least one of the PF and the grid. A control module estimates a temperature of the grid and controls the engine to produce a desired exhaust product to increase the temperature of the grid.

  6. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  7. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  8. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  9. Population-Level Exposure to Particulate Air Pollution during Active Travel: Planning for Low-Exposure, Health-Promoting Cities.

    Science.gov (United States)

    Hankey, Steve; Lindsey, Greg; Marshall, Julian D

    2017-04-01

    Providing infrastructure and land uses to encourage active travel (i.e., bicycling and walking) are promising strategies for designing health-promoting cities. Population-level exposure to air pollution during active travel is understudied. Our goals were a ) to investigate population-level patterns in exposure during active travel, based on spatial estimates of bicycle traffic, pedestrian traffic, and particulate concentrations; and b ) to assess how those exposure patterns are associated with the built environment. We employed facility-demand models (active travel) and land use regression models (particulate concentrations) to estimate block-level ( n = 13,604) exposure during rush-hour (1600-1800 hours) in Minneapolis, Minnesota. We used the model-derived estimates to identify land use patterns and characteristics of the street network that are health promoting. We also assessed how exposure is correlated with indicators of health disparities (e.g., household income, proportion of nonwhite residents). Our work uses population-level rates of active travel (i.e., traffic flows) rather than the probability of walking or biking (i.e., "walkability" or "bikeability") to assess exposure. Active travel often occurs on high-traffic streets or near activity centers where particulate concentrations are highest (i.e., 20-42% of active travel occurs on blocks with high population-level exposure). Only 2-3% of blocks (3-8% of total active travel) are "sweet spots" (i.e., high active travel, low particulate concentrations); sweet spots are located a ) near but slightly removed from the city-center or b ) on off-street trails. We identified 1,721 blocks (~ 20% of local roads) where shifting active travel from high-traffic roads to adjacent low-traffic roads would reduce exposure by ~ 15%. Active travel is correlated with population density, land use mix, open space, and retail area; particulate concentrations were mostly unchanged with land use. Public health officials and

  10. Large scale air monitoring: Biological indicators versus air particulate matter

    International Nuclear Information System (INIS)

    Rossbach, M.; Jayasekera, R.; Kniewald, G.

    2000-01-01

    Biological indicator organisms are widely used for monitoring and banking purposes since many years. Although the complexity of the interactions between bioorganisms and their environment is generally not easily comprehensible, environmental quality assessment using the bioindicator approach offers some convincing advantages compared to direct analysis of soil, water, or air. Direct measurement of air particulates is restricted to experienced laboratories with access to expensive sampling equipment. Additionally, the amount of material collected generally is just enough for one determination per sampling and no multidimensional characterization might be possible. Further, fluctuations in air masses have a pronounced effect on the results from air filter sampling. Combining the integrating property of bioindicators with the world wide availability and uniform matrix characteristics of air particulates as a prerequisite for global monitoring of air pollution will be discussed. A new approach for sampling urban dust using large volume filtering devices installed in air conditioners of large hotel buildings is assessed. A first experiment was initiated to collect air particulates (300 to 500 g each) from a number of hotels during a period of three to four months by successive vacuum cleaning of used inlet filters from high volume air conditioning installations reflecting average concentrations per three months in different large cities. This approach is expected to be upgraded and applied for global monitoring. Highly positive correlated elements were found in lichen such as K/S, Zn/P, the rare earth elements (REE) and a significant negative correlation between Fig and Cu was observed in these samples. The ratio of concentrations of elements in dust and Usnea spp. is highest for Cr, Zn, and Fe (400-200) and lowest for elements such as Ca, Rb, and Sr (20-10). (author)

  11. Particulate absorption properties in the Red Sea from hyperspectral particulate absorption spectra

    KAUST Repository

    Tiwari, Surya Prakash

    2018-03-16

    This paper aims to describe the variability of particulate absorption properties using a unique hyperspectral dataset collected in the Red Sea as part of the TARA Oceans expedition. The absorption contributions by phytoplankton (aph) and non-algal particles (aNAP) to the total particulate absorption coefficients are determined using a numerical decomposition method (NDM). The NDM is validated by comparing the NDM derived values of aph and aNAP with simulated values of aph and aNAP are found to be in excellent agreement for the selected wavelengths (i.e., 443, 490, 555, and 676nm) with high correlation coefficient (R2), low root mean square error (RMSE), mean relative error (MRE), and with a slope close to unity. Further analyses showed that the total particulate absorption coefficients (i.e., ap(443)average = 0.01995m−1) were dominated by phytoplankton absorption (i.e., aph(443)average = 0.01743m−1) with a smaller contribution by non-algal particles absorption (i.e., aNAP(443)average = 0.002524m−1). The chlorophyll a is computed using the absorption based Line Height Method (LHM). The derived chlorophyll-specific absorption ((a⁎ph = aph(λ)/ChlLH)) showed more variability in the blue part of spectrum as compared to the red part of spectrum representative of the package effect and changes in pigment composition. A new parametrization proposed also enabled the reconstruction of a⁎ph(λ) for the Red Sea. Comparison of derived spectral constants with the spectral constants of existing models showed that our study A(λ) values are consistent with the existing values, despite there is a divergence with the B(λ) values. This study provides valuable information derived from the particulate absorption properties and its spectral variability and this would help us to determine the relationship between the phytoplankton absorption coefficients and chlorophyll a and its host of variables for the Red Sea.

  12. Anthropogenic Threats and Conservation Needs of Blue Whales, Balaenoptera musculus indica, around Sri Lanka

    Directory of Open Access Journals (Sweden)

    A. de Vos

    2016-01-01

    Full Text Available Blue whales in the Northern Indian Ocean are a morphologically and acoustically distinct population restricted to these waters. Off Sri Lanka a portion of the population concentrates near shore where they are exposed to a range of anthropogenic threats. We review available data to determine anthropogenic threats/stressors faced by this population and assign subjective rankings for the population-level severity of each threat/stressor based on severity, scope, and immediacy. With the cessation of direct illegal catches on this population in the late 1960s, we ranked ship strike as the most important population-level threat. Incidental catch, which includes entanglement and bycatch, is also important as it can result in death. Other less important stressors that may negatively impact this population include threats resulting from oil and gas development and pollution. However, some stressors can have a long-term cumulative impact that is difficult to assess. The most important research needed for the conservation of these whales is to obtain an estimate of the size of the population using photo-identification methods.

  13. Comparative Analysis of Monitoring Devices for Particulate Content in Exhaust Gases

    Directory of Open Access Journals (Sweden)

    Beatrice Castellani

    2014-07-01

    Full Text Available The installation and operation of continuous particulate emission monitors in industrial processes has become well developed and common practice in industrial stacks and ducts over the past 30 years, reflecting regulatory monitoring requirements. Continuous emissions monitoring equipment is installed not only for regulatory compliance, but also for the monitoring of plant performance, calculation of emissions inventories and compilation of environmental impact assessments. Particulate matter (PM entrained in flue gases is produced by the combustion of fuels or wastes. The size and quantity of particles released depends on the type of fuel and the design of the plant. The present work provides an overview of the main industrial emission sources, a description of the main types of monitoring systems offered by manufacturers and a comparative analysis of the currently available technologies for measuring dust releases to atmosphere.

  14. Sampling/classification of gasifier particulates

    International Nuclear Information System (INIS)

    Wegrzyn, J.

    1984-01-01

    A high temperature and pressure real time extractive sampling probe for particulate monitoring was built at Brookhaven National Laboratory and tested on Morgantown Energy Technology Center's 42 inch fixed bed gasifier. The probe was specifically designed for the conditions of highly loaded particulate and condensable streams, that exist at the outlet of a fixed bed gasifier. Some of the salient features of the probe are: porous tube gas injection, aerodynamic particle classification in the presence of condensable vapors, β gauge particle detection, and micro processor control. Three of the key design problems were the separation of the particles from the vapor without promoting condensation, the prevention of plugging, and real time monitoring. Some plugging did occur over the seven day sampling period, but by over pressurizing and back purging the clog was blown back into the process stream. The tests validate the proof of concept of the sampling probe and indicated that the particulate output from the bed came in the form of bursts (several minutes in duration) rather than in the form of a steady stream

  15. Particulate and soluble 210Pd activities in the deep sea

    International Nuclear Information System (INIS)

    Somayajulu, B.L.K.; Craig, H.

    1976-01-01

    Particulate and soluble, 210 Pb activities have been measured by filtration of large-volume water samples at two stations in the South Atlantic. Particulate phase 210 Pb (caught by a 0.4-μm filter) varies from 0.3% of total 210 Pb in equatorial surface water to 15% in the bottom water. The 'absolute activity' of 210 Pb per unit mass of particulate matter is about 10 7 times the activity of soluble 210 Pb per unit mass of water, but because the mass ratio of particulate matter to water is about 10 -8 , the particulate phase carries only about 10% of the total activity. In Antarctic surface water the particulate phase carries 40% of the total 210 Pb activity; the absolute activity of this material is about the same as in other water masses and the higher fraction is due to the much larger concentration of suspended matter in surface water in this region. In the equatorial Atlantic the particulate phase 210 Pb activity increases with depth, by a factor of 40 from surface to bottom, and by a factor of 4 from the Antarctic Intermediate water core to the Antarctic Bottom Water. (Auth.)

  16. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  17. Use of health effect risk estimates and uncertainty in formal regulatory proceedings: a case study involving atmospheric particulates

    International Nuclear Information System (INIS)

    Habegger, L.J.; Oezkaynak, A.H.

    1984-01-01

    Coal combustion particulates are released to the atmosphere by power plants supplying electrical to the nuclear fuel cycle. This paper presents estimates of the public health risks associated with the release of these particulates at a rate associated with the annual nuclear fuel production requirements for a nuclear power plan. Utilization of these risk assessments as a new component in the formal evaluation of total risks from nuclear power plants is discussed. 23 references, 3 tables

  18. Glints from particulate media and wavy surfaces

    International Nuclear Information System (INIS)

    Borovoi, Anatoli; Konoshonkin, Alexander; Kolokolova, Ludmilla

    2012-01-01

    Glints are bright light spots created by particulate media like cirrus clouds, glaciers, and wavy water surfaces. They are seen around the specular reflection angle. In this paper, the glints from such scattering/reflecting media are described in a unified manner through the probability density for facet tilts. Various kinds of these probability densities for wavy surfaces are defined and classified. The concept of the differential scattering cross section (DSCS) for rough surfaces instead of the conventional bidirectional reflectance distribution function (BRDF) is introduced for characterization of the glints. The simple equations connecting the DSCS and the probability densities for facet tilts are derived. It is shown that the glints from particulate media and wavy surface are very similar at small incidence angles and they are significantly different at slant incidence. -- Highlights: ► Differential scattering cross section unifies particulate media and wavy surfaces. ► The glint pattern is a mapping of the probability density function for facet tilts. ► Shadowing is a crucial aspect of glint pattern formation. ► Glint patterns discriminate between the particulate media and wavy surfaces.

  19. Automated particulate sampler field test model operations guide

    Energy Technology Data Exchange (ETDEWEB)

    Bowyer, S.M.; Miley, H.S.

    1996-10-01

    The Automated Particulate Sampler Field Test Model Operations Guide is a collection of documents which provides a complete picture of the Automated Particulate Sampler (APS) and the Field Test in which it was evaluated. The Pacific Northwest National Laboratory (PNNL) Automated Particulate Sampler was developed for the purpose of radionuclide particulate monitoring for use under the Comprehensive Test Ban Treaty (CTBT). Its design was directed by anticipated requirements of small size, low power consumption, low noise level, fully automatic operation, and most predominantly the sensitivity requirements of the Conference on Disarmament Working Paper 224 (CDWP224). This guide is intended to serve as both a reference document for the APS and to provide detailed instructions on how to operate the sampler. This document provides a complete description of the APS Field Test Model and all the activity related to its evaluation and progression.

  20. Levels of particulate air pollution, its elemental composition, determinants and health effects in metro systems

    Science.gov (United States)

    Nieuwenhuijsen, M. J.; Gómez-Perales, J. E.; Colvile, R. N.

    The aim of this study was to review and summarise the levels of particulate air pollution, its elemental composition, its determinants, and its potential health effects in metro systems. A number of studies have been conducted to assess the levels of particulate matter and its chemical composition in metro systems. The monitoring equipment used varied and may have led to different reporting and makes it more difficult to compare results between metro systems. Some of the highest average levels of particulate matter were measured in the London metro system. Whereas some studies have reported higher levels of particulate matter in the metro system (e.g. London, Helsinki, Stockholm) compared to other modes of transport (London) and street canyons (Stockholm and Helsinki), other studies reported lower levels in the metro system (e.g. Hong Kong, Guangzhou, and Mexico City). The differences may be due to different material of the wheel, ventilation levels and breaking systems but there is no good evidence to what extent the differences may be explained by this, except perhaps for some elements (e.g. Fe, Mn). The dust in the metro system was shown to be more toxic than ambient airborne particulates, and its toxicity was compared with welding dust. The higher toxicity may be due to the higher iron content. Although the current levels of particulate matter and toxic matter are unlikely to lead to any significant excess health effects in commuters, they should be reduced where possible. It will be difficult to introduce measures to reduce the levels in older metro systems, e.g. by introducing air conditioning in London, but certainly they should be part of any new designs of metro systems.

  1. Migration of particulates in permeable rock columns

    International Nuclear Information System (INIS)

    Cropper, R.L.

    1982-01-01

    The migration of radioactive material through soil and permeable rock formations have become a major topic of concern due to the interest in the licensing of new radioactive waste disposal sites. Previously, research has been conducted in relation to deep repositories; however, similar situations arise in the vadose zone, where there is a higher probability of naturally-occurring particulates of organic nature and for the incursion of water. Test data has provided information which suggests that particulates will travel through porous media subject to various delay mechnisms and must be included in any consideration of waste migration. Data concerning particulate migration must and should be considered in the future when radioactive waste disposal sites are licensed

  2. Narcissism and other-derogation in the absence of ego threat.

    Science.gov (United States)

    Park, Sun W; Colvin, C Randall

    2015-06-01

    The relation between narcissism and other-derogation has been examined primarily in the context of ego threat. In three studies, we investigated whether narcissistic individuals derogate others in the absence of ego threat. In Study 1, 79 judges watched four videotaped dyadic interactions and rated the personality of the same four people. In Study 2, 66 judges rated the personality of a friend. In Study 3, 72 judges considered the average Northeastern University student and rated the personality of this hypothetical person. Across the three studies, targets' personality characteristics were described on the 100-item California Adult Q-Sort (CAQ; Block, 2008). Judges' ratings of targets were compared to a CAQ prototype of the optimally adjusted person to assess target-derogation. Judges' narcissism and other-derogation were positively related in Studies 1 and 2. Narcissism positively predicted and self-esteem negatively predicted target-derogation after controlling for each other in Study 3. Narcissistic individuals derogate others more than non-narcissistic individuals regardless of whether ego threat is present or absent. © 2014 Wiley Periodicals, Inc.

  3. Particulate absorption properties in the Red Sea from hyperspectral particulate absorption spectra

    KAUST Repository

    Tiwari, Surya Prakash; Zarokanellos, Nikolaos; Kheireddine, Malika; Shanmugam, Palanisamy; Jones, Burton

    2018-01-01

    This paper aims to describe the variability of particulate absorption properties using a unique hyperspectral dataset collected in the Red Sea as part of the TARA Oceans expedition. The absorption contributions by phytoplankton (aph) and non

  4. MEASURING THE PARTICULATE BACKSCATTERING OF INLAND WATERS: A COMPARISON OF TECHNIQUES

    Directory of Open Access Journals (Sweden)

    G. Campbell

    2012-07-01

    Full Text Available The objective of this work was to examine whether the standard particulate backscattering IOP (Inherent Optical Properties measurement method could be simplified. IOP measurements are essential for parameterising several forms of algorithms used to estimate water quality parameters from airborne and satellite images. Field measurements of the backscattering IOPs are more difficult to make than absorption measurements as correction of the raw Hydroscat-6 backscattering sensor observations is required to allow for the systematic errors associated with the water and water quality parameter absorption. The standard approach involves making simultaneous measurement of the absorption and attenuation of the water with an absorption and attenuation meter (ac-9 or making assumptions about the particulate backscattering probability. Recently, a number of papers have been published that use an alternative method to retrieve the particulate backscattering spectrum by using laboratory measured absorption values and in situ spectroradiometric observations. The alternative method inverts a model of reflectance iteratively using non-linear least squares fitting to solve for the particulate backscattering at 532 nm (bbp0(532 and the particulate backscattering spectral slope (γ. In this paper, eleven observations made at Burdekin Falls Dam, Australia are used to compare the alternative reflectance method to the conventional corrected Hydroscat-6 observations. Assessment of the alternative reflectance method showed that the result of the inversions were highly dependent on the starting conditions. To overcome this limitation, Particle Swarm Optimisation, a stochastic search technique which includes a random element in the search approach, was used. It was found that when compared to the conventionally corrected Hydroscat-6 observations, the alternative reflectance method underestimated bbp0(532 by approximately 50% and overestimated γ by approximately 40

  5. Stereotype threat and racial differences in citizens' experiences of police encounters.

    Science.gov (United States)

    Najdowski, Cynthia J; Bottoms, Bette L; Goff, Phillip Atiba

    2015-10-01

    We conducted 2 studies to investigate how cultural stereotypes that depict Blacks as criminals affect the way Blacks experience encounters with police officers, expecting that such encounters induce Blacks to feel stereotype threat (i.e., concern about being judged and treated unfairly by police because of the stereotype). In Study 1, we asked Black and White participants to report how they feel when interacting with police officers in general. As predicted, Blacks, but not Whites, reported concern that police officers stereotype them as criminals simply because of their race. In addition, this effect was found for Black men but not Black women. In Study 2, we asked Black and White men to imagine a specific police encounter and assessed potential downstream consequences of stereotype threat. Consistent with Study 1, Black but not White men anticipated feeling stereotype threat in the hypothetical police encounter. Further, racial differences in anticipated threat translated into racial differences in anticipated anxiety, self-regulatory efforts, and behavior that is commonly perceived as suspicious by police officers. By demonstrating that Blacks might expect to be judged and treated unfairly by police because of the negative stereotype of Black criminality, this research extends stereotype threat theory to the new domain of criminal justice encounters. It also has practical implications for understanding how the stereotype could ironically contribute to bias-based policing and racial disparities in the justice system. (c) 2015 APA, all rights reserved).

  6. Controlling particulate matter under the Clean Air Act: a menu of options

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-07-01

    This document was prepared by STAPPA and ALAPCO to help US state and local air pollution control officials understand the effects of particulate matter (PM) on human health and air quality, the relative contribution of various sources to particulate emissions, and the effectiveness and costs of various approaches - including innovative ones - to minimizing these emissions. The document covers particulate matter with a nominal diameter of 10 microns ({mu}m) or less (PM{sub 10}), including `fine` PM of 2.5 microns or less in diameter (PM{sub 2.5}). Sections cover: the effects of particulate matter on human health; regulatory issues; characterization of particulate matter; emission control strategies for mobile sources (diesel engines, small nonroad engines, alternative fuels etc.), particulates from stationary sources (electric utilities, industry and commercial fuel combustion; mineral products industry, metallurgical industry etc.); particulates from area sources; and market-based strategies for controlling particulate matter. 2 apps.

  7. Gel nano-particulates against radioactivity

    International Nuclear Information System (INIS)

    Deroin, Ph.

    2004-01-01

    The Argonne research center (USA) has developed a 'super-gel' compound, a polymer close to those used in baby's diapers, which can reach a 90% efficiency in the radioactive decontamination of porous materials, like bricks or concrete. The contaminated materials are sprayed with a mixture of polymer gel and wetting agent with nano-particulates in suspension. Under the action of the wetting agent, radioactivity migrates from the pores to the gel and is trapped by the nano-particulates. The drying and recycling of the gel allows to reduce the volume of radioactive wastes. Short paper. (J.S.)

  8. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  9. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  10. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  11. Urban tree effects on fine particulate matter and human health

    Science.gov (United States)

    David J. Nowak

    2014-01-01

    Overall, city trees reduce particulate matter and provide substantial health benefits; but under certain conditions, they can locally increase particulate matter concentrations. Urban foresters need to understand how trees affect particulate matter so they can select proper species and create appropriate designs to improve air quality. This article details trees'...

  12. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  13. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  14. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  15. Defending Against Advanced Persistent Threats Using Game-Theory.

    Science.gov (United States)

    Rass, Stefan; König, Sandra; Schauer, Stefan

    2017-01-01

    Advanced persistent threats (APT) combine a variety of different attack forms ranging from social engineering to technical exploits. The diversity and usual stealthiness of APT turns them into a central problem of contemporary practical system security, since information on attacks, the current system status or the attacker's incentives is often vague, uncertain and in many cases even unavailable. Game theory is a natural approach to model the conflict between the attacker and the defender, and this work investigates a generalized class of matrix games as a risk mitigation tool for an advanced persistent threat (APT) defense. Unlike standard game and decision theory, our model is tailored to capture and handle the full uncertainty that is immanent to APTs, such as disagreement among qualitative expert risk assessments, unknown adversarial incentives and uncertainty about the current system state (in terms of how deeply the attacker may have penetrated into the system's protective shells already). Practically, game-theoretic APT models can be derived straightforwardly from topological vulnerability analysis, together with risk assessments as they are done in common risk management standards like the ISO 31000 family. Theoretically, these models come with different properties than classical game theoretic models, whose technical solution presented in this work may be of independent interest.

  16. Identification of the mechanisms that drive the toxicity of TiO2 particulates: the contribution of physicochemical characteristics

    Directory of Open Access Journals (Sweden)

    Peters Sheona

    2009-12-01

    Full Text Available Abstract This review focuses on outlining the toxicity of titanium dioxide (TiO2 particulates in vitro and in vivo, in order to understand their ability to detrimentally impact on human health. Evaluating the hazards associated with TiO2 particles is vital as it enables risk assessments to be conducted, by combining this information with knowledge on the likely exposure levels of humans. This review has concentrated on the toxicity of TiO2, due to the fact that the greatest number of studies by far have evaluated the toxicity of TiO2, in comparison to other metal oxide particulates. This derives from historical reasons (whereby the size dependency of particulate toxicity was first realised for TiO2 and due to its widespread application within consumer products (such as sunscreens. The pulmonary and dermal hazards of TiO2 have been a particular focus of the available studies, due to the past use of TiO2 as a (negative control when assessing the pulmonary toxicity of particulates, and due to its incorporation within consumer products such as sunscreens. Mechanistic processes that are critical to TiO2 particulate toxicity will also be discussed and it is apparent that, in the main, the oxidant driven inflammatory, genotoxic and cytotoxic consequences associated with TiO2 exposure, are inherently linked, and are evident both in vivo and in vitro. The attributes of TiO2 that have been identified as being most likely to drive the observed toxicity include particle size (and therefore surface area, crystallinity (and photocatalytic activity, surface chemistry, and particle aggregation/agglomeration tendency. The experimental set up also influences toxicological outcomes, so that the species (or model used, route of exposure, experiment duration, particle concentration and light conditions are all able to influence the findings of investigations. In addition, the applicability of the observed findings for particular TiO2 forms, to TiO2 particulates in

  17. Hydrophilic Interaction Liquid Chromatography-Tandem Mass Spectrometry Analysis of Fosetyl-Aluminum in Airborne Particulate Matter

    Directory of Open Access Journals (Sweden)

    Francesca Buiarelli

    2018-01-01

    Full Text Available Fosetyl-aluminum is a synthetic fungicide administered to plants especially to prevent diseases caused by the members of the Peronosporales and several Phytophthora species. Herein, we present a selective liquid chromatography-tandem mass spectrometry (LC-MS/MS method to analyze residues of fosetyl-A1 in air particulate matter. This study was performed in perspective of an exposure assessment of this substance of health concern in environments where high levels of fosetly-Al, relatively to airborne particulate matter, can be found after spraying it. The cleanup procedure of the analyte, from sampled filters of atmospheric particulate matter, was optimized using a Strata X solid-phase extraction cartridge, after accelerated extraction by using water. The chromatographic separation was achieved using a polymeric column based on hydrophilic interaction in step elution with water/acetonitrile, whereas the mass spectrometric detection was performed in negative electrospray ionization. The proposed method resulted to be a simple, fast, and suitable method for confirmation purposes.

  18. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  19. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  20. 30 CFR 7.89 - Test to determine the particulate index.

    Science.gov (United States)

    2010-07-01

    ... 30 Mineral Resources 1 2010-07-01 2010-07-01 false Test to determine the particulate index. 7.89... Use in Underground Coal Mines § 7.89 Test to determine the particulate index. The test shall be... measured and recorded at each test mode. (ii) The data required for use in the particulate index...

  1. Inclusion of Premeditated Threats in the Safety Methodology for NPPs

    International Nuclear Information System (INIS)

    Levanon, I.

    2014-01-01

    classical one are: • Rate of change of the threat; • Design Basis Threat (DBT) and beyond it, including Defense in Depth (DID); • State and licensee responsibility; • Probabilistic Safety Assessment. These key issues are discussed below in light of the above two postulates and related publications, mainly of the US NRC (Nuclear Regulatory Commission). Problems are detailed and partial solutions are suggested

  2. Assessing Detecting and Deterring the Threat of Maritime Nuclear and Radiological Smuggling in the Western Indian Ocean Region

    Energy Technology Data Exchange (ETDEWEB)

    Khan, M. Umer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Cooperative Monitoring Center

    2017-03-01

    This paper proposes that current maritime smuggling routes in the western Indian Ocean region are similar to those in the past and that the motivations of terrorist groups and the presence of radioactive sources in the Indian Ocean littoral and other states present a significant security threat. The majority of regional terrorist groups have a hybrid structure, piggybacking on criminal activity to fund their terror activities. Additionally, states have used maritime routes in the Indian Ocean region to transport nuclear materials and missiles. Thus, the maritime dimension of such threats remains, and may be increasing. This paper focuses on issues, motivations, pathways, and methods to detect and interdict nuclear and radiological trafficking. It analyzes the potential use of maritime technology applications for radiation detection and presents recommendations for states and multinational nonproliferation advocacy organizations to address the threat in the Indian Ocean region.

  3. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  4. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    Science.gov (United States)

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  5. Acute effects of caffeine on threat-selective attention: moderation by anxiety and EEG theta/beta ratio.

    Science.gov (United States)

    van Son, Dana; Schalbroeck, Rik; Angelidis, Angelos; van der Wee, Nic J A; van der Does, Willem; Putman, Peter

    2018-05-21

    Spontaneous EEG theta/beta ratio (TBR) probably marks prefrontal cortical (PFC) executive control, and its regulation of attentional threat-bias. Caffeine at moderate doses may strengthen executive control through increased PFC catecholamine action, dependent on basal PFC function. To test if caffeine affects threat-bias, moderated by baseline frontal TBR and trait-anxiety. A pictorial emotional Stroop task was used to assess threat-bias in forty female participants in a cross-over, double-blind study after placebo and 200 mg caffeine. At baseline and after placebo, comparable relations were observed for negative pictures: high TBR was related to low threat-bias in low trait-anxious people. Caffeine had opposite effects on threat-bias in low trait-anxious people with low and high TBR. This further supports TBR as a marker of executive control and highlights the importance of taking baseline executive function into consideration when studying effects of caffeine on executive functions. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  7. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  8. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  9. Experimental estimation of snare detectability for robust threat monitoring.

    Science.gov (United States)

    O'Kelly, Hannah J; Rowcliffe, J Marcus; Durant, Sarah; Milner-Gulland, E J

    2018-02-01

    Hunting with wire snares is rife within many tropical forest systems, and constitutes one of the severest threats to a wide range of vertebrate taxa. As for all threats, reliable monitoring of snaring levels is critical for assessing the relative effectiveness of management interventions. However, snares pose a particular challenge in terms of tracking spatial or temporal trends in their prevalence because they are extremely difficult to detect, and are typically spread across large, inaccessible areas. As with cryptic animal targets, any approach used to monitor snaring levels must address the issue of imperfect detection, but no standard method exists to do so. We carried out a field experiment in Keo Seima Wildlife Reserve in eastern Cambodia with the following objectives: (1) To estimate the detection probably of wire snares within a tropical forest context, and to investigate how detectability might be affected by habitat type, snare type, or observer. (2) To trial two sets of sampling protocols feasible to implement in a range of challenging field conditions. (3) To conduct a preliminary assessment of two potential analytical approaches to dealing with the resulting snare encounter data. We found that although different observers had no discernible effect on detection probability, detectability did vary between habitat type and snare type. We contend that simple repeated counts carried out at multiple sites and analyzed using binomial mixture models could represent a practical yet robust solution to the problem of monitoring snaring levels both inside and outside of protected areas. This experiment represents an important first step in developing improved methods of threat monitoring, and such methods are greatly needed in southeast Asia, as well as in as many other regions.

  10. Year-round variations in the fluvial transport load of particulate 137Cs in a forested catchment affected by the Fukushima Daiichi Nuclear Power Plant accident

    International Nuclear Information System (INIS)

    Takeshi Matsunaga; Takahiro Nakanishi; Mariko Atarashi-Andoh; Erina Takeuchi; Kotomi Muto; Katsunori Tsuduki; Syusaku Nishimura; Jun Koarashi; Shigeyoshi Otosaka; Tsutomu Sato

    2016-01-01

    Particulate 137 Cs was collected from stream water for 2 years to assess the long-term trend of 137 Cs discharge from a forest after the Fukushima Nuclear Power Plant accident. A seasonal increase in the fluvial transport load of particulate 137 Cs in suspended solids (SS) was observed in July-October when rainfall was abundant. The 137 Cs load was controlled by the SS load. This control was attributed to cesium affinity for phyllosilicate clay minerals as verified by the low extractability of particulate 137 Cs. These findings indicate the fluvial particulate 137 Cs load is significantly related to the climate and geomorphological features of Japan. (author)

  11. Coolability of oxidized particulate debris bed accumulated in horizontal narrow gaps

    International Nuclear Information System (INIS)

    Arai, Y.; Sugiyama, K.; Narabayashi, T.

    2007-01-01

    When LOCA occurs in a nuclear reactor system, the coolability of the core would be kept as reported at a series of presentations in ICONE14. Therefore the probability of the core meltdown is negligible small. However, from the view point of defense in depth, it is necessary to be sure that the coolability of the bottom of reactor pressure vessel (RPV) is maintained even if a part of the core should melt and a substantial amount of debris should be deposited on the lower plenum. We carried out an experimental study in order to observe the coolability of particulate core-metal debris bed with 12 mm thickness accompanied with rapid heat generation because of oxidization, which was reported at ICONE14. The coolability was assured by a small amount of coolant supply because of high capillary force of oxidized fine particulate debris produced. In the present study, we examined the coolability of particulate debris bed deposited in narrower gap of 1 mm or 5 mm that coolant supply is hard. The particulate debris beds were piled up on the stainless steel sheet with 0.1 mm thickness, which was used to measure the bottom temperatures of particulate debris bed by using a thermo-video camera. We set up a heat supply section with heat input of 2.1 kW, which simulates the hard debris bed deposited on the particulate debris bed as reported for the TMI-2 accident. We measured the temperatures of the bottom surface of the heat supply section and the heat fluxes released into debris bed as well as the temperatures at the bottom of debris bed on the stainless steel sheet. It is found that when only the upper surface of particulate debris bed is in the film boiling, capillary force causes coolant supply to the particulate debris bed. Therefore, in the condition of thicker gap with small particulate debris, coolability of debris bed is improved. We find out that smaller particulate debris is moved by vapor movement. As a result, the area that high capillary force is caused because of

  12. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  13. The cytotoxicity and genotoxicity of particulate and soluble hexavalent chromium in leatherback sea turtle lung cells.

    Science.gov (United States)

    Speer, Rachel M; Wise, Catherine F; Young, Jamie L; Aboueissa, AbouEl-Makarim; Martin Bras, Mark; Barandiaran, Mike; Bermúdez, Erick; Márquez-D'Acunti, Lirio; Wise, John Pierce

    2018-05-01

    Hexavalent chromium [Cr(VI)] is a marine pollution of concern as recent studies show it has a global distribution, with some regions showing high Cr concentrations in marine animal tissue, and it is extensively used. Leatherback sea turtles (Dermochelys coriacea) are an endangered marine species that may experience prolonged exposures to environmental contaminants including Cr(VI). Human activities have led to global Cr(VI) contamination of the marine environment. While Cr(VI) has been identified as a known human carcinogen, the health effects in marine species are poorly understood. In this study, we assessed the cytotoxic and genotoxic effects of particulate and soluble Cr(VI) in leatherback sea turtle lung cells. Both particulate and soluble Cr(VI) induced a concentration-dependent increase in cytotoxicity. Next, using a chromosome aberration assay, we assessed the genotoxic effects of Cr(VI) in leatherback sea turtle lung cells. Particulate and soluble Cr(VI) induced a concentration-dependent increase in clastogenicity in leatherback sea turtle lung cells. These data indicate that Cr(VI) may be a health concern for leatherback sea turtles and other long-lived marine species. Additionally, these data provide foundational support to use leatherback sea turtles as a valuable model species for monitoring the health effects of Cr(VI) in the environment and possibly as an indicator species to assess environmental human exposures and effects. Copyright © 2018 Elsevier B.V. All rights reserved.

  14. Particulate emissions from diesel engines: correlation between engine technology and emissions.

    Science.gov (United States)

    Fiebig, Michael; Wiartalla, Andreas; Holderbaum, Bastian; Kiesow, Sebastian

    2014-03-07

    In the last 30 years, diesel engines have made rapid progress to increased efficiency, environmental protection and comfort for both light- and heavy-duty applications. The technical developments include all issues from fuel to combustion process to exhaust gas aftertreatment. This paper provides a comprehensive summary of the available literature regarding technical developments and their impact on the reduction of pollutant emission. This includes emission legislation, fuel quality, diesel engine- and exhaust gas aftertreatment technologies, as well as particulate composition, with a focus on the mass-related particulate emission of on-road vehicle applications. Diesel engine technologies representative of real-world on-road applications will be highlighted.Internal engine modifications now make it possible to minimize particulate and nitrogen oxide emissions with nearly no reduction in power. Among these modifications are cooled exhaust gas recirculation, optimized injections systems, adapted charging systems and optimized combustion processes with high turbulence. With introduction and optimization of exhaust gas aftertreatment systems, such as the diesel oxidation catalyst and the diesel particulate trap, as well as NOx-reduction systems, pollutant emissions have been significantly decreased. Today, sulfur poisoning of diesel oxidation catalysts is no longer considered a problem due to the low-sulfur fuel used in Europe. In the future, there will be an increased use of bio-fuels, which generally have a positive impact on the particulate emissions and do not increase the particle number emissions.Since the introduction of the EU emissions legislation, all emission limits have been reduced by over 90%. Further steps can be expected in the future. Retrospectively, the particulate emissions of modern diesel engines with respect to quality and quantity cannot be compared with those of older engines. Internal engine modifications lead to a clear reduction of the

  15. Particulate Matter Filtration Design Considerations for Crewed Spacecraft Life Support Systems

    Science.gov (United States)

    Agui, Juan H.; Vijayakumar, R.; Perry, Jay L.

    2016-01-01

    Particulate matter filtration is a key component of crewed spacecraft cabin ventilation and life support system (LSS) architectures. The basic particulate matter filtration functional requirements as they relate to an exploration vehicle LSS architecture are presented. Particulate matter filtration concepts are reviewed and design considerations are discussed. A concept for a particulate matter filtration architecture suitable for exploration missions is presented. The conceptual architecture considers the results from developmental work and incorporates best practice design considerations.

  16. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  17. Bio-derived fuels may ease the regeneration of diesel particulate traps

    Energy Technology Data Exchange (ETDEWEB)

    E. Coda Zabetta; M. Hupa; S. Niemi [Aabo Akademi Process Chemistry Centre, Turku (Finland)

    2006-12-15

    Particulate is the most problematic emission from diesel engines. To comply with environmental regulations, these engines are often equipped with particulate traps, which must be regenerated frequently for the sake of efficiency. The regeneration is commonly achieved by rising the temperature in the trap till the particulate self-ignites. However, this method implies energy losses and thermal shocks in the trap. Alternatively, catalysts and additives have been recently considered for reducing the ignition temperature of particulate, but these techniques suffer from poisoning and undesirable byproducts. The present experimental study shows that the ignition temperature of particulate from seed-derived oils (SO) and from blends of SO with diesel fuel oil (DO) can be lower than that of particulate from neat DO. If substantiated by more extensive studies, such finding could have noteworthy implications on the future of fuels and traps. Short communication. 8 refs., 3 figs., 2 tabs.

  18. Cervical transforaminal epidural steroid injection for the management of cervical radiculopathy: a comparative study of particulate versus non-particulate steroids

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Joon Woo; Kang, Heung Sik [Seoul National University Bundang Hospital, Department of Radiology, Gyeonggi-Do (Korea); Park, Kun Woo; Yeom, Jin S. [Seoul National University Bundang Hospital, Department of Orthopaedic Surgery, Gyeonggi-Do (Korea); Chung, Sang-Ki; Kim, Ki-Jeong; Kim, Hyun-Jib [Seoul National University Bundang Hospital, Department of Neurosurgery, Gyeonggi-do (Korea)

    2009-11-15

    To determine if a particulate steroid which has a risk for embolic infarct would be more effective than a non-particulate steroid for transforaminal epidural steroid injection (TFESI). The purpose of this study was (1) to compare the effect of cervical TFESI using particulate (e.g., triamcinolone) and non-particulate (e.g., dexamethasone) steroids and (2) to evaluate the effectiveness of cervical TFESI in general. From January 2006 to August 2008, 159 consecutive patients [male:female (M:F) 89:70; mean age 53 years, range 33-75 years] who underwent cervical TFESI were included in this non-randomized study. For cervical TFESI, triamcinolone was injected into 97 patients and dexamethasone into 62 patients. Short-term follow-up was conducted within 1 month. The outcome was classified as effective or ineffective. Fisher's exact test was used to analyze the difference of outcome according to the injected steroid (triamcinolone vs dexamethasone). Other possible outcome predictors, such as age, gender, duration of radiculopathy, predominant symptom, attack of radiculopathy, cause of radiculopathy, number of nerve root compression levels, previous operation, and failure of previous interlaminar epidural injection, were also analyzed. Cervical TFESI using triamcinolone (78/97, 80.4%) was slightly more effective than that using dexamethasone (43/62, 69.4%), which was not significant (P = 0.129). In general, cervical TFESIs were effective in 121 of 159 patients (76.1%) at short-term follow-up. The only significant outcome predictor was whether the patient had had a previous operation (6/13, 46/2%) or not (115/146, 78.8%) (P = 0.015). There was no significant difference between particulate or non-particulate steroid for the effect of cervical TFESI. Cervical TFESI was effective in managing cervical radiculopathy in general. (orig.)

  19. Cervical transforaminal epidural steroid injection for the management of cervical radiculopathy: a comparative study of particulate versus non-particulate steroids

    International Nuclear Information System (INIS)

    Lee, Joon Woo; Kang, Heung Sik; Park, Kun Woo; Yeom, Jin S.; Chung, Sang-Ki; Kim, Ki-Jeong; Kim, Hyun-Jib

    2009-01-01

    To determine if a particulate steroid which has a risk for embolic infarct would be more effective than a non-particulate steroid for transforaminal epidural steroid injection (TFESI). The purpose of this study was (1) to compare the effect of cervical TFESI using particulate (e.g., triamcinolone) and non-particulate (e.g., dexamethasone) steroids and (2) to evaluate the effectiveness of cervical TFESI in general. From January 2006 to August 2008, 159 consecutive patients [male:female (M:F) 89:70; mean age 53 years, range 33-75 years] who underwent cervical TFESI were included in this non-randomized study. For cervical TFESI, triamcinolone was injected into 97 patients and dexamethasone into 62 patients. Short-term follow-up was conducted within 1 month. The outcome was classified as effective or ineffective. Fisher's exact test was used to analyze the difference of outcome according to the injected steroid (triamcinolone vs dexamethasone). Other possible outcome predictors, such as age, gender, duration of radiculopathy, predominant symptom, attack of radiculopathy, cause of radiculopathy, number of nerve root compression levels, previous operation, and failure of previous interlaminar epidural injection, were also analyzed. Cervical TFESI using triamcinolone (78/97, 80.4%) was slightly more effective than that using dexamethasone (43/62, 69.4%), which was not significant (P = 0.129). In general, cervical TFESIs were effective in 121 of 159 patients (76.1%) at short-term follow-up. The only significant outcome predictor was whether the patient had had a previous operation (6/13, 46/2%) or not (115/146, 78.8%) (P = 0.015). There was no significant difference between particulate or non-particulate steroid for the effect of cervical TFESI. Cervical TFESI was effective in managing cervical radiculopathy in general. (orig.)

  20. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  1. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  2. Ferruginous compounds in the airborne particulate matter of the metropolitan area of Belo Horizonte, Minas Gerais, Brazil.

    Science.gov (United States)

    Tavares, Fernanda Vasconcelos Fonseca; Ardisson, José Domingos; Rodrigues, Paulo César Horta; Fabris, José Domingos; Fernandez-Outon, Luis Eugenio; Feliciano, Vanusa Maria Delage

    2017-08-01

    Samples of soil, iron ore, and airborne particulate matter (size airborne particulate matter in the metropolitan area of Belo Horizonte, Minas Gerais, Brazil, are either from natural origin, as, for instance, re-suspension of particles from soil, or due to anthropogenic activities, meaning that it would be originated from the many iron ore minings surrounding the metropolitan area. Numerical simulations were used to model the atmospheric dispersion of the airborne particulate matter emitted by iron mining located at the Iron Quadrangle geodomain, Minas Gerais. Results from these numerical simulations supported identifying the sites with the highest concentrations of airborne particulate matter in the metropolitan area. Samples of these suspended materials were collected at the selected sites by using high-volume air samplers. The physicochemical features of the solid materials were assessed by X-ray fluorescence, X-ray diffraction, magnetometry, and 57 Fe Mössbauer spectroscopy. The soil materials were found to be rich in quartz, aluminum, organic matter, and low contents of iron, mainly as low crystalline iron oxides. The samples of the iron ores, on the other hand, contain high concentration of iron, dominantly as relatively pure and crystalline hematite (α-Fe 2 O 3 ). The samples of the airborne particulate matter are rich in iron, mainly as hematite, but contained also quartz, aluminum, and calcium. Mössbauer spectroscopy was used to evaluate the hyperfine structure of 57 Fe of the hematite both from the iron ore and the soil samples. The structural characteristics of the hematite of these particulate materials were further explored. The direct influence of the iron ore mining on the composition of the airborne particulate matter was clearly evidenced based on the trace ability of hematite to its source of emission. Even the atmospheric air on regions relatively far away from the mining activities is also significantly influenced.

  3. The particulate matter dispersion studies from a local palm oil mill

    International Nuclear Information System (INIS)

    Abdullah, L.C.; Wong, L. L.; Amnorzahira, A.; Sa'ari, M.; Abdul Rashid, M. S.; Salmiaton Ali

    2006-01-01

    The appearance of industrial emissions and the degradation of scenic vistas are two characteristics of air pollution that humans object. Reduction in visibility suggests worsening pollution levels. The emissions from mobile source and stationary source are the major source of air pollutions contribution in Malaysia. Suspended particulate matter (SPM). The consequence of increasing the particulate concentrations, the particulate matter dissolves with vapour and grows into droplets when the humidity exceeds approximately 70% and causing opaque situation know as haze. This work focuses on the dispersion particulate matter from palm oil mill. The data obtained serves the purpose of modeling the transport of particulate matter for obtaining permits and prevention of significant deterioration (PSD) to the environment. Gaussian Plume Model from a point source, subject to various atmospheric conditions is used to calculate particulate matter concentration then display the distribution of plume dispersion using geographic information system (GIS). The calculated particulate matter concentration is evaluated using Transilient Matrice function. Atmospheric Stability, mixing height, wind direction, wind speed, natural and artificial features play an important role in dispersion process. High concentration area exhibits immediately under prevailing wind direction. (Author)

  4. Trace elemental analysis of the aerosol particulates in northern Punjab

    International Nuclear Information System (INIS)

    Iqbal, M.Z.

    2002-01-01

    Trace elemental analysis of the aerosol particulates was studied in the atmosphere of Lahore, Faisalabad, Islamabad, Sheikhupura, Wah Cantt. And Khanispur. The amount of the aerosol particulates in the above mentioned areas was compared to the U.S. EPA maximum permissible limits. Scavenging mechanism of the aerosol particulates through precipitation was studied in the atmosphere of Lahore and Sheikhupura by using HPLC and ICP-AES techniques. The site distribution and morphological structure of the aerosol particulates was studied by using Scanning Electron Microscope model JSM-35CF. Trace elemental composition of the aerosol particulates in the atmosphere of the selected areas of Pakistan was carried out by using NAA. The elements thus studied were Ce, Yb, Se, Cr, Hf, Cs, Sc, Fe, Co, Eu, Sb, Mo, Ba, Zn, Hg, Br, Na, Gd, Sm, Nd and In while Pb and Cd were estimated by using ASS technique. (author)

  5. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  6. Interaction of PM2.5 airborne particulates with ZnO and TiO2 nanoparticles and their effect on bacteria.

    Science.gov (United States)

    Baysal, Asli; Saygin, Hasan; Ustabasi, Gul Sirin

    2017-12-21

    A significant knowledge gap in nanotechnology is the absence of standardized protocols for examining and comparison the effect of metal oxide nanoparticles on different environment media. Despite the large number of studies on ecotoxicity of nanoparticles, most of them disregard the particles physicochemical transformation under real exposure conditions and interaction with different environmental components like air, soil, water, etc. While one of the main exposure ways is inhalation and/or atmosphere for human and environment, there is no investigation between airborne particulates and nanoparticles. In this study, some metal oxide nanoparticle (ZnO and TiO 2 ) transformation and behavior in PM2.5 air particulate media were examined and evaluated by the influence on nanoparticle physicochemical properties (size, surface charge, surface functionalization) and on bacterium (Gram-positive Bacillus subtilis, Staphylococcus aureus/Gram-negative Escherichia coli, Pseudomonas aeruginosa bacteria) by testing in various concentrations of PM2.5 airborne particulate media to contribute to their environmental hazard and risk assessment in atmosphere. PM2.5 airborne particulate media affected their toxicity and physicochemical properties when compared the results obtained in controlled conditions. ZnO and TiO 2 surfaces were functionalized mainly with sulfoxide groups in PM2.5 air particulates. In addition, tested particles were not observed to be toxic in controlled conditions. However, these were observed inhibition in PM2.5 airborne particulates media by the exposure concentration. These observations and dependence of the bacteria viability ratio explain the importance of particulate matter-nanoparticle interaction.

  7. K-Basins particulate water content, and behavior

    International Nuclear Information System (INIS)

    DUNCAN, D.R.

    1999-01-01

    This analysis summarizes the state of knowledge of K-basins spent nuclear fuel oxide (film, particulate or sludge) and its chemically bound water in order to estimate the associated multi-canister overpack (MCO) water inventory and to describe particulate dehydration behavior. This information can be used to evaluate the thermal and chemical history of an MCO and its contents during cold vacuum drying (CVD), shipping, and interim storage

  8. K-Basins particulate water content, and behavior

    Energy Technology Data Exchange (ETDEWEB)

    DUNCAN, D.R.

    1999-02-25

    This analysis summarizes the state of knowledge of K-basins spent nuclear fuel oxide (film, particulate or sludge) and its chemically bound water in order to estimate the associated multi-canister overpack (MCO) water inventory and to describe particulate dehydration behavior. This information can be used to evaluate the thermal and chemical history of an MCO and its contents during cold vacuum drying (CVD), shipping, and interim storage.

  9. A laser particulate spectrometer for a space simulation facility

    Science.gov (United States)

    Schmitt, R. J.; Boyd, B. A.; Linford, R. M. F.; Richmond, R. G.

    1975-01-01

    A laser particulate spectrometer (LPS) system was developed to measure the size and speed distributions of particulate contaminants. Detection of the particulates is achieved by means of light scattering and extinction effects using a single laser beam to cover a size range of 0.8 to 275 microns diameter and a speed range of 0.2 to 20 meters/second. The LPS system was designed to operate in the high-vacuum environment of a space simulation chamber with cold shroud temperatures ranging from 77 to 300 K.

  10. Why there is a need to revise the design basis threat concept

    International Nuclear Information System (INIS)

    Kondratov, S.; Steinhaeusler, F.

    2005-01-01

    Full text: The coordinated terrorist attacks in the United States on September 11, 2001, necessitated the review of the proven concept of the Design Basis Threat (DBT) for nuclear installations. It is safe to assume that revised and upgraded DBT will result in costly technical solutions. Since infrastructure deficits and financial limitations in many countries have already limited the practical application of the DBT in many instances, the revised threat assessment is likely to worsen the current dissatisfactory situation further. Therefore, a new realism in the use of the DBT concept is proposed, based on a three-level approach. This will enable countries to tailor the design of their physical protection systems in accordance with their means by implementing either a minimum required security level protecting only against the most probable threat, or aiming for an intermediate protection level reflecting the newly introduced AHARA - as high as reasonably achievable - principle, or providing the optimum protection level based on an externally reviewed, fully comprehensive DBT. (author)

  11. Why there is a need to revise the Design Basis Threat concept

    International Nuclear Information System (INIS)

    Kondratov, S.; Steinhausler, F.

    2006-01-01

    The terrorist attacks in the USA on 11 September 2001 necessitated a review of the proven concept of the Design Basis Threat (DBT) for nuclear installations. It can be assumed that revised and upgraded DBT will result in costly technical solutions. Since infrastructure deficits and financial limitations in many countries have already limited the practical application of the DBT, the revised threat assessment is likely to worsen the current unsatisfactory situation. Therefore, a new realism in the use of the DBT concept is proposed based on a three-level approach. This will enable countries to tailor the design of their physical protection systems in accordance with their means by implementing either a minimum required security level protecting only against the most probable threat, or an intermediate protection level reflecting the newly introduced AHARA (As High As Reasonably Achievable) principle, or the optimum protection level based on an externally reviewed, fully comprehensive DBT. (author)

  12. Airborne soil particulates as vehicles for Salmonella contamination of tomatoes.

    Science.gov (United States)

    Kumar, Govindaraj Dev; Williams, Robert C; Al Qublan, Hamzeh M; Sriranganathan, Nammalwar; Boyer, Renee R; Eifert, Joseph D

    2017-02-21

    The presence of dust is ubiquitous in the produce growing environment and its deposition on edible crops could occur. The potential of wind-distributed soil particulate to serve as a vehicle for S. Newport transfer to tomato blossoms and consequently, to fruits, was explored. Blossoms were challenged with previously autoclaved soil containing S. Newport (9.39log CFU/g) by brushing and airborne transfer. One hundred percent of blossoms brushed with S. Newport-contaminated soil tested positive for presence of the pathogen one week after contact (PCompressed air was used to simulate wind currents and direct soil particulates towards blossoms. Airborne soil particulates resulted in contamination of 29% of the blossoms with S. Newport one week after contact. Biophotonic imaging of blossoms post-contact with bioluminescent S. Newport-contaminated airborne soil particulates revealed transfer of the pathogen on petal, stamen and pedicel structures. Both fruits and calyxes that developed from blossoms contaminated with airborne soil particulates were positive for presence of S. Newport in both fruit (66.6%) and calyx (77.7%). Presence of S. Newport in surface-sterilized fruit and calyx tissue tested indicated internalization of the pathogen. These results show that airborne soil particulates could serve as a vehicle for Salmonella. Hence, Salmonella contaminated dust and soil particulate dispersion could contribute to pathogen contamination of fruit, indicating an omnipresent yet relatively unexplored contamination route. Copyright © 2016 Elsevier B.V. All rights reserved.

  13. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  14. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  15. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  16. Particulate emission factor: A case study of a palm oil mill boiler

    International Nuclear Information System (INIS)

    Chong, W.C.; Rashid, M.; Ramli, M.; Zainura, Z.N.; NorRuwaida, J.

    2010-01-01

    A study to investigate the particulate emission from a boiler of a palm oil mill plant equipped with a multi-cyclones particulate arrest or was performed and reported in this paper. The particulate emission concentration was measured at the outlet of a 8 mt/ hr capacity water-tube typed boiler of a palm oil mill plant processing 27mt/ hr of fresh fruit bunch (FFB). The particulate sample was collected iso-kinetically using the USEPA method 5 sampling train through a sampling port made at the duct of the exiting flue gas between the boiler and a multi-cyclones unit. Results showed that the particulate emission rates exiting the boiler varied from 0.09 to 0.60 g/s with an average of 0.29 + 0.18 g/ s. While the average particulate emission concentration exiting the boiler was 12.1 + 7.36 g/ Nm 3 (corrected to 7 % oxygen concentration), ranging from 3.62 to 25.3 g/ Nm 3 (at 7 % O 2 ) of the flue gas during the measurement. Based on the 27 mt/ hr FFB processed and the capacity of the boiler of 8mt steam/ hr, the calculated particulate emission factor was 39 g particulate/ mt FFB processed or 131 g particulate/ mt boiler capacity, respectively. In addition, based on the finding and in order to comply with the emission limits of 0.4 g/ Nm 3 , the collection efficiency of any given particulate emission pollution control system to consider for the mill will be from 87 to 98 %, which is not easily achievable with the existing multi-cyclones unit. A considerable amount of efforts are still needed pertaining to the particulate emission control problem in the industry. (author)

  17. Electrification of particulate entrained fluid flows-Mechanisms, applications, and numerical methodology

    Science.gov (United States)

    Wei, Wei; Gu, Zhaolin

    2015-10-01

    Particulates in natural and industrial flows have two basic forms: liquid (droplet) and solid (particle). Droplets would be charged in the presence of the applied electric field (e.g. electrospray). Similar to the droplet charging, particles can also be charged under the external electric field (e.g. electrostatic precipitator), while in the absence of external electric field, tribo-electrostatic charging is almost unavoidable in gas-solid two-phase flows due to the consecutive particle contacts (e.g. electrostatic in fluidized bed or wind-blown sand). The particle charging may be beneficial, or detrimental. Although electrostatics in particulate entrained fluid flow systems have been so widely used and concerned, the mechanisms of particulate charging are still lack of a thorough understanding. The motivation of this review is to explore a clear understanding of particulate charging and movement of charged particulate in two-phase flows, by summarizing the electrification mechanisms, physical models of particulate charging, and methods of charging/charged particulate entrained fluid flow simulations. Two effective methods can make droplets charged in industrial applications: corona charging and induction charging. The droplet charge to mass ratio by corona charging is more than induction discharge. The particle charging through collisions could be attributed to electron transfer, ion transfer, material transfer, and/or aqueous ion shift on particle surfaces. The charges on charged particulate surface can be measured, nevertheless, the charging process in nature or industry is difficult to monitor. The simulation method might build a bridge of investigating from the charging process to finally charged state on particulate surface in particulate entrained fluid flows. The methodology combining the interface tracking under the action of the applied electric with the fluid flow governing equations is applicable to the study of electrohydrodynamics problems. The charge

  18. Electrification of particulate entrained fluid flows—Mechanisms, applications, and numerical methodology

    Energy Technology Data Exchange (ETDEWEB)

    Wei, Wei [School of Energy and Power Engineering, Wuhan University of Technology, Wuhan, Hubei, 430063 (China); School of Human Settlements and Civil Engineering, Xi’an Jiaotong University, Xi’an, Shaanxi, 710049 (China); Gu, Zhaolin, E-mail: guzhaoln@mail.xjtu.edu.cn [School of Human Settlements and Civil Engineering, Xi’an Jiaotong University, Xi’an, Shaanxi, 710049 (China)

    2015-10-28

    Particulates in natural and industrial flows have two basic forms: liquid (droplet) and solid (particle). Droplets would be charged in the presence of the applied electric field (e.g. electrospray). Similar to the droplet charging, particles can also be charged under the external electric field (e.g. electrostatic precipitator), while in the absence of external electric field, tribo-electrostatic charging is almost unavoidable in gas–solid two-phase flows due to the consecutive particle contacts (e.g. electrostatic in fluidized bed or wind-blown sand). The particle charging may be beneficial, or detrimental. Although electrostatics in particulate entrained fluid flow systems have been so widely used and concerned, the mechanisms of particulate charging are still lack of a thorough understanding. The motivation of this review is to explore a clear understanding of particulate charging and movement of charged particulate in two-phase flows, by summarizing the electrification mechanisms, physical models of particulate charging, and methods of charging/charged particulate entrained fluid flow simulations. Two effective methods can make droplets charged in industrial applications: corona charging and induction charging. The droplet charge to mass ratio by corona charging is more than induction discharge. The particle charging through collisions could be attributed to electron transfer, ion transfer, material transfer, and/or aqueous ion shift on particle surfaces. The charges on charged particulate surface can be measured, nevertheless, the charging process in nature or industry is difficult to monitor. The simulation method might build a bridge of investigating from the charging process to finally charged state on particulate surface in particulate entrained fluid flows. The methodology combining the interface tracking under the action of the applied electric with the fluid flow governing equations is applicable to the study of electrohydrodynamics problems. The

  19. Electrification of particulate entrained fluid flows—Mechanisms, applications, and numerical methodology

    International Nuclear Information System (INIS)

    Wei, Wei; Gu, Zhaolin

    2015-01-01

    Particulates in natural and industrial flows have two basic forms: liquid (droplet) and solid (particle). Droplets would be charged in the presence of the applied electric field (e.g. electrospray). Similar to the droplet charging, particles can also be charged under the external electric field (e.g. electrostatic precipitator), while in the absence of external electric field, tribo-electrostatic charging is almost unavoidable in gas–solid two-phase flows due to the consecutive particle contacts (e.g. electrostatic in fluidized bed or wind-blown sand). The particle charging may be beneficial, or detrimental. Although electrostatics in particulate entrained fluid flow systems have been so widely used and concerned, the mechanisms of particulate charging are still lack of a thorough understanding. The motivation of this review is to explore a clear understanding of particulate charging and movement of charged particulate in two-phase flows, by summarizing the electrification mechanisms, physical models of particulate charging, and methods of charging/charged particulate entrained fluid flow simulations. Two effective methods can make droplets charged in industrial applications: corona charging and induction charging. The droplet charge to mass ratio by corona charging is more than induction discharge. The particle charging through collisions could be attributed to electron transfer, ion transfer, material transfer, and/or aqueous ion shift on particle surfaces. The charges on charged particulate surface can be measured, nevertheless, the charging process in nature or industry is difficult to monitor. The simulation method might build a bridge of investigating from the charging process to finally charged state on particulate surface in particulate entrained fluid flows. The methodology combining the interface tracking under the action of the applied electric with the fluid flow governing equations is applicable to the study of electrohydrodynamics problems. The

  20. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  1. Frequently updated noise threat maps created with use of supercomputing grid

    Directory of Open Access Journals (Sweden)

    Szczodrak Maciej

    2014-09-01

    Full Text Available An innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed serviceswere developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers. Selected experimental results achieved by the usage of the services proposed were presented. The assessment of the environmental noise threats includes creation of the noise maps using either ofline or online data, acquired through a grid of the monitoring stations. A concept of estimation of the source model parameters based on the measured sound level for the purpose of creating frequently updated noise maps was presented. Connecting the noise mapping grid service with a distributed sensor network enables to automatically update noise maps for a specified time period. Moreover, a unique attribute of the developed software is the estimation of the auditory effects evoked by the exposure to noise. The estimation method uses a modified psychoacoustic model of hearing and is based on the calculated noise level values and on the given exposure period. Potential use scenarios of the grid services for research or educational purpose were introduced. Presentation of the results of predicted hearing threshold shift caused by exposure to excessive noise can raise the public awareness of the noise threats.

  2. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  3. Maladaptive social information processing in childhood predicts young men's atypical amygdala reactivity to threat.

    Science.gov (United States)

    Choe, Daniel Ewon; Shaw, Daniel S; Forbes, Erika E

    2015-05-01

    Maladaptive social information processing, such as hostile attributional bias and aggressive response generation, is associated with childhood maladjustment. Although social information processing problems are correlated with heightened physiological responses to social threat, few studies have examined their associations with neural threat circuitry, specifically amygdala activation to social threat. A cohort of 310 boys participated in an ongoing longitudinal study and completed questionnaires and laboratory tasks assessing their social and cognitive characteristics the boys were between 10 and 12 years of age. At age 20, 178 of these young men underwent functional magnetic resonance imaging and a social threat task. At age 22, adult criminal arrest records and self-reports of impulsiveness were obtained. Path models indicated that maladaptive social information-processing at ages 10 and 11 predicted increased left amygdala reactivity to fear faces, an ambiguous threat, at age 20 while accounting for childhood antisocial behavior, empathy, IQ, and socioeconomic status. Exploratory analyses indicated that aggressive response generation - the tendency to respond to threat with reactive aggression - predicted left amygdala reactivity to fear faces and was concurrently associated with empathy, antisocial behavior, and hostile attributional bias, whereas hostile attributional bias correlated with IQ. Although unrelated to social information-processing problems, bilateral amygdala reactivity to anger faces at age 20 was unexpectedly predicted by low IQ at age 11. Amygdala activation did not mediate associations between social information processing and number of criminal arrests, but both impulsiveness at age 22 and arrests were correlated with right amygdala reactivity to anger facial expressions at age 20. Childhood social information processing and IQ predicted young men's amygdala response to threat a decade later, which suggests that childhood social

  4. Homogenized thermal conduction model for particulate foods

    OpenAIRE

    Chinesta , Francisco; Torres , Rafael; Ramón , Antonio; Rodrigo , Mari Carmen; Rodrigo , Miguel

    2002-01-01

    International audience; This paper deals with the definition of an equivalent thermal conductivity for particulate foods. An homogenized thermal model is used to asses the effect of particulate spatial distribution and differences in thermal conductivities. We prove that the spatial average of the conductivity can be used in an homogenized heat transfer model if the conductivity differences among the food components are not very large, usually the highest conductivity ratio between the foods ...

  5. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  6. Methodological Aspects of In Vitro Assessment of Bio-accessible Risk Element Pool in Urban Particulate Matter

    Czech Academy of Sciences Publication Activity Database

    Sysalová, J.; Száková, J.; Tremlová, J.; Kašparovská, Kateřina; Kotlík, B.; Tlustoš, P.; Svoboda, Petr

    2014-01-01

    Roč. 161, č. 2 (2014), s. 216-222 ISSN 0163-4984 Grant - others:GA ČR(CZ) GA521/09/1150; GA ČR(CZ) GAP503/12/0682 Program:GA; GA Institutional support: RVO:67985823 Keywords : risk elements * urban particulate matter * in vitro tests * bio-accessibility Subject RIV: CB - Analytical Chemistry, Separation Impact factor: 1.748, year: 2014

  7. Contrasts in oxidative potential and other particulate matter characteristics collected near major streets and background locations

    NARCIS (Netherlands)

    Boogaard, H.; Janssen, N.A.H.; Fischer, P.H.; Kos, G.P.A.; Weijers, E.P.; Cassee, F.R.; van der Zee, S.C.; Hartog, J. de; Brunekreef, B.; Hoek, G.

    2012-01-01

    BACKGROUND: Measuring the oxidative potential of airborne particulate matter (PM) may provide a more health-based exposure measure by integrating various biologically relevant properties of PM into a single predictor of biological activity. OBJECTIVES: We aimed to assess the contrast in oxidative

  8. Contrasts in oxidative potential and other particulate matter characteristics collected near major streets and background locations.

    NARCIS (Netherlands)

    Boogaard, H.; Janssen, N.A.; Fischer, P.H.; Kos, G.P.; Weijers, E.P.; Cassee, F.R.; Zee, S.C. van der; Hartog, J.J. de; Brunekreef, B.; Hoek, G.

    2012-01-01

    BACKGROUND: Measuring the oxidative potential of airborne particulate matter (PM) may provide a more health-based exposure measure by integrating various biologically relevant properties of PM into a single predictor of biological activity. OBJECTIVES: We aimed to assess the contrast in oxidative

  9. Method and apparatus for removing volatile hydrocarbons from particulate soils

    International Nuclear Information System (INIS)

    Mendenhall, R.L.

    1992-01-01

    This patent describes an apparatus for heating solid particulate mineral compositions. It comprises: a counterflow ratable drum having a first end and an opposite second end, a first portion of the drum extending from the first end for a first length and having a first diameter along the first length, and a second portion of the drum secured to and extending from the first portion to the second end for a second length and having a second diameter along the second length, the second diameter being less than the first diameter, a burner adjacent the first end for introducing and directing hot gases of combustion into the first portion of the drum toward the second end, means for introducing particulate composition into the drum at the second end, means for directing the particulate composition along the drum from the second end toward the first end, and means for recovering composition at the first end, means for removing a gaseous mixture of organic volatiles, gases of combustion and fine particles of the particulate composition adjacent the second drum end, means for separating fine particles of the particulate composition from the gaseous mixture, and means for returning the separated fine particulate composition particles to the first portion of the drum

  10. Simulating power integration in Latin America to assess challenges, opportunities, and threats

    International Nuclear Information System (INIS)

    Ochoa, Camila; Dyner, Isaac; Franco, Carlos J.

    2013-01-01

    Integration of electricity markets started to spread under the world-wide trend to economic liberalization. While some regions are managing better than others, lessons, both political and technical, highlight challenges ahead that need to be overcome. Since the early 2000s, Panama, Colombia, Ecuador, and Peru have decided to integrate their electricity markets, eventually creating an enormous Latin American electricity exchange, ranging from Mexico to Chile. This poses opportunities and threats to the region as it involves cooperation, trust, and the will to overcome difficulties that may arise. In this direction, we developed a system dynamics model, linked to an iterative algorithm, to assess the likely effects of integration on both system expansion and security of supply. The model helps us understand the logic of the long-term system behavior under different policies, assuming Market Coupling as the dispatch mechanism. Based on theoretical grounds and after analyzing simulation results under different scenarios, we conclude that the integration of electricity markets may render important opportunities regarding security of supply and efficiency; and consequently energy might be supplied at lower prices, using “cleaner” technologies. However, benefits largely depend on policy, regulation, and technical issues. - Highlights: • We model the likely long-term dynamics of regional integration in Latin America. • The approach includes a dispatch algorithm linked to a system dynamics model. • The model simulates the evolution of installed capacity and prices. • We conclude: electricity integration may provide security of supply and efficiency. • Benefits of integration largely depend on policy, regulation, and technical issues

  11. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  12. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Directory of Open Access Journals (Sweden)

    Lucas B. Fortini

    2017-07-01

    Full Text Available For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also found other (but not all anthropogenic threats are also similarly associated with more threats. Our findings serve as a reminder that ecological research should seriously consider these potential threat interactions, especially for species under elevated conservation concern.

  13. At a global scale, do climate change threatened species also face a greater number of non-climatic threats?

    Science.gov (United States)

    Fortini, Lucas B.; Dye, Kaipo

    2017-01-01

    For many species the threats of climate change occur in a context of multiple existing threats. Given the current focus of global change ecology in identifying and understanding species vulnerable to climate change, we performed a global analysis to characterize the multi-threat context for species threatened by climate change. Utilizing 30,053 species from the International Union for Conservation of Nature’s (IUCN) Red List of Threatened Species, we sought to evaluate if species threatened by climate change are more likely threatened by a greater number of non-climatic threats than species not threatened by climate change. Our results show that species threatened by climate change are generally impacted by 21% more non-climatic threats than species not threatened by climate change. Across all species, this pattern is related to IUCN risk status, where endangered species threatened by climate change face 33% more non-climatic threats than endangered species not threatened by climate change. With the clear challenges of assessing current and projected impacts of climate change on species and ecosystems, research often requires reductionist approaches that result in downplaying this multi-threat context. This cautionary note bears relevance beyond climate change threatened species as we also

  14. Characteristics of thin and coarse particulates of urban and natural brazilian aerosols

    International Nuclear Information System (INIS)

    Orsini, C.Q.; Tabacnics, M.H.; Artaxo, P.; Andrade, M.F.; Kerr, A.S.

    1994-01-01

    Thin and coarse particulate were sampled during the period 1982-1985 in a natural coastal forest (Jureia), and five urban-industrial regions (Vitoria, Salvador, Porto Alegre, Sao Paulo and Belo Horizonte). The time variation of the concentration in the air, and the relative elementary composition of the thin and coarse particulate, sampled by thin and Coarse Particulate Sampler (AFG), were determined by gravimetric method and PIXE analysis respectively. The results demonstrated that the ground dust and salt from the sea are unequivocally one of the largest sources of coarse particulate, and also the ground is a significant thin particulate source. 25 refs, 22 figs, 28 tabs. (L.C.J.A.)

  15. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation

  16. Dynamics of Charged Particulate Systems Modeling, Theory and Computation

    CERN Document Server

    Zohdi, Tarek I

    2012-01-01

    The objective of this monograph is to provide a concise introduction to the dynamics of systems comprised of charged small-scale particles. Flowing, small-scale, particles ("particulates'') are ubiquitous in industrial processes and in the natural sciences. Applications include electrostatic copiers, inkjet printers, powder coating machines, etc., and a variety of manufacturing processes. Due to their small-scale size, external electromagnetic fields can be utilized to manipulate and control charged particulates in industrial processes in order to achieve results that are not possible by purely mechanical means alone. A unique feature of small-scale particulate flows is that they exhibit a strong sensitivity to interparticle near-field forces, leading to nonstandard particulate dynamics, agglomeration and cluster formation, which can strongly affect manufactured product quality. This monograph also provides an introduction to the mathematically-related topic of the dynamics of swarms of interacting objects, ...

  17. Threat/reward-sensitivity and hypomanic-personality modulate cognitive-control and attentional neural processes to emotional stimuli.

    Science.gov (United States)

    Pornpattananangkul, Narun; Hu, Xiaoqing; Nusslock, Robin

    2015-11-01

    Temperamental-traits (e.g. threat/reward-sensitivity) are found to modulate cognitive-control and attentional-processes. Yet, it is unclear exactly how these traits interact with emotional-stimuli in the modulation of cognitive-control, as reflected by the N2 event-related potential (ERP), and attentional-processes, as reflected by the P2 and P3 ERPs. Here in an ERP emotional-Go/NoGo task, 36 participants were instructed to inhibit their response to Fearful- and Happy-faces. Individual-differences in threat-sensitivity, reward-sensitivity and hypomanic-personality were assessed through self-report. Hypomanic-personality was assessed, given its relationship with reward-sensitivity and relevance to mood-disorder symptoms. Concerning cognitive-control, individuals with elevated threat-sensitivity displayed more-negative N2s to Happy-NoGo (relative to Fearful-NoGo) faces, whereas both individuals with elevated reward-sensitivity and hypomanic-personality displayed more-negative N2s to Fearful-NoGo (relative to Happy-NoGo) faces. Accordingly, when cognitive-control is required (during Go/NoGo), a mismatch between one's temperament and the valence of the NoGo-stimulus elevates detection of the need for cognitive-control. Conversely, the modulation of attentional-processing was specific to threat-sensitivity, as there was no relationship between either reward-sensitivity or hypomanic-personality and attentional-processing. Elevated threat-sensitivity was associated with enhanced early (P2s) and later (P3s) attentional-processing to Fearful-NoGo (relative to Happy-NoGo) faces. These latter findings support the negative attentional-bias model relating elevated threat-sensitivity with attentional-biases toward negative-stimuli and away from positive-stimuli. © The Author (2015). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  18. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    Science.gov (United States)

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  19. Influence of Acidification on the Partitioning of Steroid Hormones among Filtrate, Filter Media, and Retained Particulate Matter.

    Science.gov (United States)

    Havens, Sonya M; Hedman, Curtis J; Hemming, Jocelyn D C; Mieritz, Mark G; Shafer, Martin M; Schauer, James J

    2016-09-01

    Hormone contamination of aquatic systems has been shown to have deleterious effects on aquatic biota. However, the assessment of hormone contamination of aquatic environments requires a quantitative evaluation of the potential effects of sample preservation on hormone concentrations. This study investigated the influence of acidification (pH 2) of surface water samples on the partitioning of hormones among filtrate, filter media, and filter-retained particulate matter. Hormones were spiked into unpreserved and sulfuric acid-preserved ultrapure water and surface water runoff samples. The samples were filtered, and hormones were extracted from the filter and filtrate and analyzed by high-performance liquid chromatography. Acidification did not influence the partitioning of hormones onto the filter media. For the majority of the hormones investigated in this study, the partitioning of hormones to the filter-retained particulate matter was not influenced by acidification. Acidification increased the partitioning of progesterone and melengestrol acetate onto the retained particulate matter (about 25% for both analytes). Incorporation of an isotopically labeled internal standard (ISTD) for progesterone accounted for the loss of progesterone to the filter-retained particulates and resulted in accurate concentrations of progesterone in the filtrate. The incorporation of an ISTD for melengestrol acetate, however, was unable to account for the loss of melengestrol acetate to the retained particulates and resulted in underestimations of melengestrol acetate in the filtrate. Our results indicate that the analysis of melengestrol acetate in acid preserved surface runoff samples should be conducted on the filter-retained particulates as well as the filtrate. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  20. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  1. Detachment of particulate iron sulfide during shale-water interaction

    Science.gov (United States)

    Emmanuel, S.; Kreisserman, Y.

    2017-12-01

    Hydraulic fracturing, a commonly used technique to extract oil and gas from shales, is controversial in part because of the threat it poses to water resources. The technique involves the injection into the subsurface of large amounts of fluid, which can become contaminated by fluid-rock interaction. The dissolution of pyrite is thought to be a primary pathway for the contamination of fracturing fluids with toxic elements, such as arsenic and lead. In this study, we use direct observations with atomic force microscopy to show that the dissolution of carbonate minerals in Eagle Ford shale leads to the physical detachment of embedded pyrite grains. To simulate the way fluid interacts with a fractured shale surface, we also reacted rock samples in a flow-through cell, and used environmental scanning electron microscopy to compare the surfaces before and after interaction with water. Crucially, our results show that the flux of particulate iron sulfide into the fluid may be orders of magnitude higher than the flux of pyrite from chemical dissolution. This result suggests that mechanical detachment of pyrite grains could be the dominant mode by which arsenic and other inorganic elements are mobilized in the subsurface. Thus, during hydraulic fracturing operations and in groundwater systems containing pyrite, the transport of many toxic species may be controlled by the transport of colloidal iron sulfide particles.

  2. Value-Added Models for Teacher Preparation Programs: Validity and Reliability Threats, and a Manageable Alternative

    Science.gov (United States)

    Brady, Michael P.; Heiser, Lawrence A.; McCormick, Jazarae K.; Forgan, James

    2016-01-01

    High-stakes standardized student assessments are increasingly used in value-added evaluation models to connect teacher performance to P-12 student learning. These assessments are also being used to evaluate teacher preparation programs, despite validity and reliability threats. A more rational model linking student performance to candidates who…

  3. Electrically heated particulate filter regeneration methods and systems for hybrid vehicles

    Science.gov (United States)

    Gonze, Eugene V.; Paratore, Jr., Michael J.

    2010-10-12

    A control system for controlling regeneration of a particulate filter for a hybrid vehicle is provided. The system generally includes a regeneration module that controls current to the particulate filter to initiate regeneration. An engine control module controls operation of an engine of the hybrid vehicle based on the control of the current to the particulate filter.

  4. Pollution, habitat loss, fishing, and climate change as critical threats to penguins.

    Science.gov (United States)

    Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara

    2015-02-01

    Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales. © 2014 The Authors. Conservation Biology

  5. Particulate matter sensor with a heater

    Science.gov (United States)

    Hall, Matthew [Austin, TX

    2011-08-16

    An apparatus to detect particulate matter. The apparatus includes a sensor electrode, a shroud, and a heater. The electrode measures a chemical composition within an exhaust stream. The shroud surrounds at least a portion of the sensor electrode, exclusive of a distal end of the sensor electrode exposed to the exhaust stream. The shroud defines an air gap between the sensor electrode and the shroud and an opening toward the distal end of the sensor electrode. The heater is mounted relative to the sensor electrode. The heater burns off particulate matter in the air gap between the sensor electrode and the shroud.

  6. Assessment of population exposure to particulate matter pollution in Chongqing, China.

    Science.gov (United States)

    Wang, Shuxiao; Zhao, Yu; Chen, Gangcai; Wang, Fei; Aunan, Kristin; Hao, Jiming

    2008-05-01

    To determine the population exposure to PM(10) in Chongqing, China, we developed an indirect model by combining information on the time activity patterns of various demographic subgroups with estimates of the PM(10) concentrations in different microenvironments (MEs). The spatial and temporal variations of the exposure to PM(10) were illustrated in a geographical information system (GIS). The population weighted exposure (PWE) for the entire population was 229, 155 and 211 microg/m(3), respectively, in winter, summer and as the annual average. Indoor PM(10) level at home was the largest contributor to the PWE, especially for the rural areas where high pollution levels were found due to solid fuels burning. Elder people had higher PM(10) exposure than adults and youth, due to more time spent in indoor MEs. The highest health risk due to particulate was found in the city zone and northeast regions, suggesting that pollution abatement should be prioritized in these areas.

  7. Assessment of population exposure to particulate matter pollution in Chongqing, China

    Energy Technology Data Exchange (ETDEWEB)

    Shuxiao Wang; Yu Zhao; Gangcai Chen; Fei Wang; Aunan Kristin; Jiming Hao [Tsinghua University, Beijing (China). Department of Environmental Science and Engineering

    2008-05-15

    To determine the population exposure to PM10 in Chongqing, China, we developed an indirect model by combining information on the time activity patterns of various demographic subgroups with estimates of the PM10 concentrations in different microenvironments (MEs). The spatial and temporal variations of the exposure to PM10 were illustrated in a geographical information system (GIS). The population weighted exposure (PWE) for the entire population was 229, 155 and 211 {mu}g/m{sup 3}, respectively, in winter, summer and as the annual average. Indoor PM10 level at home was the largest contributor to the PWE, especially for the rural areas where high pollution levels were found due to solid fuels burning. Elder people had higher PM10 exposure than adults and youth, due to more time spent in indoor MEs. The highest health risk due to particulate was found in the city zone and northeast regions, suggesting that pollution abatement should be prioritized in these areas.

  8. Assessing the Two-Plasmon Decay Threat Through Simulations and Experiments on the NIKE Laser System

    Science.gov (United States)

    Phillips, Lee; Weaver, J. L.; Oh, J.; Schmitt, A. J.; Obenschain, S.

    2010-11-01

    NIKE is a Krf laser system at the Naval Research Laboratory used to explore hydrodynamic stability, equation of state, and other physics problems arising in IFE research. The comparatively short KrF wavelength is expected to raise the threshold of most parametric instabilities. We report on simulations performed using the FAST3d radiation hydrocode to design TPD experiments that have have allowed us to explore the validity of simple threshold formulas and help establish the accuracy of our simulations. We have also studied proposed high-gain shock ignition designs and devised experiments that can approach the relevant scalelength-temperature regime, allowing us a potential experimental method to study the LPI threat to these designs by direct observation. Through FAST3d studies of shock-ignited and conventional direct-drive designs with KrF (248 nm) and 3rd harmonic (351nm) drivers, we examine the benefits of the shorter wavelength KrF light in reducing the LPI threat.

  9. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  10. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  11. An evaluation of security measures implemented to address physical threats to water infrastructure in the state of Mississippi.

    Science.gov (United States)

    Barrett, Jason R; French, P Edward

    2013-01-01

    The events of September 11, 2001, increased and intensified domestic preparedness efforts in the United States against terrorism and other threats. The heightened focus on protecting this nation's critical infrastructure included legislation requiring implementation of extensive new security measures to better defend water supply systems against physical, chemical/biological, and cyber attacks. In response, municipal officials have implemented numerous safeguards to reduce the vulnerability of these systems to purposeful intrusions including ongoing vulnerability assessments, extensive personnel training, and highly detailed emergency response and communication plans. This study evaluates fiscal year 2010 annual compliance assessments of public water systems with security measures that were implemented by Mississippi's Department of Health as a response to federal requirements to address these potential terrorist threats to water distribution systems. The results show that 20 percent of the water systems in this state had at least one security violation on their 2010 Capacity Development Assessment, and continued perseverance from local governments is needed to enhance the resiliency and robustness of these systems against physical threats.

  12. Elucidating the mechanisms of nickel compound uptake: A review of particulate and nano-nickel endocytosis and toxicity

    Energy Technology Data Exchange (ETDEWEB)

    Muñoz, Alexandra; Costa, Max, E-mail: Max.Costa@nyumc.org

    2012-04-01

    Nickel (Ni) is a worldwide pollutant and contaminant that humans are exposed to through various avenues resulting in multiple toxic responses — most alarming is its clear carcinogenic nature. A variety of particulate Ni compounds persist in the environment and can be distinguished by characteristics such as solubility, structure, and surface charge. These characteristics influence cellular uptake and toxicity. Some particulate forms of Ni are carcinogenic and are directly and rapidly endocytized by cells. A series of studies conducted in the 1980s observed this process, and we have reanalyzed the results of these studies to help elucidate the molecular mechanism of particulate Ni uptake. Originally the process of uptake observed was described as phagocytosis, however in the context of recent research we hypothesize that the process is macropinocytosis and/or clathrin mediated endocytosis. Primary considerations in determining the route of uptake here include calcium dependence, particle size, and inhibition through temperature and pharmacological approaches. Particle characteristics that influenced uptake include size, charge, surface characteristics, and structure. This discussion is relevant in the context of nanoparticle studies and the emerging interest in nano-nickel (nano-Ni), where toxicity assessments require a clear understanding of the parameters of particulate uptake and where establishment of such parameters is often obscured through inconsistencies across experimental systems. In this regard, this review aims to carefully document one system (particulate nickel compound uptake) and characterize its properties.

  13. Characteristics and source appointment of atmospheric particulate mercury over East China Sea: Implication on the deposition of atmospheric particulate mercury in marine environment.

    Science.gov (United States)

    Duan, Lian; Cheng, Na; Xiu, Guangli; Wang, Fujiang; Chen, Ying

    2017-05-01

    Total Suspended Particulate (TSP) samples were collected at Huaniao Island in northern East China Sea (ECS) from March 2012 to January 2013. Chemical analysis were conducted to measure the concentration of total particulate mercury (TPM) and speciated particulate mercury including HCl-soluble particulate mercury (HPM), elemental particulate mercury (EPM) and residual particulate mercury (RPM). The bromine (Br) and iodine (I) on particles were also detected. The mean concentration of TPM during the study period was 0.23 ± 0.15 ng m -3 , while the obviously seasonal variation was found that the concentrations of TPM in spring, summer, fall and winter were 0.34 ± 0.20 ng m -3 , 0.15 ± 0.03 ng m -3 , 0.15 ± 0.05 ng m -3 and 0.27 ± 0.26 ng m -3 , respectively. The statistically strong correlation of bromine and iodine to HPM was only found in spring with r = 0.81 and 0.77 (p mercury due to the deposition of mercury over the sea. The cluster of air mass across the sea had low concentration of HPM in winter, which suggested that the oxidation of mercury in winter might be related to other oxidants. During the whole sampling period, the air mass from the north of China contributed to the higher concentration of TPM in Huaniao Island. Copyright © 2016 Elsevier Ltd. All rights reserved.

  14. Diesel engine exhaust particulate filter with intake throttling incineration control

    Energy Technology Data Exchange (ETDEWEB)

    Ludecke, O.; Rosebrock, T.

    1980-07-08

    A description is given of a diesel engine exhaust filter and particulate incineration system in combination with a diesel engine having a normally unthrottled air induction system for admitting combustion air to the engine and an exhaust system for carrying off spent combustion products exhausted from the engine, said filter and incineration system comprising: a combustion resistant filter disposed in the exhaust system and operative to collect and retain portions of the largely carbonaceous particulate matter contained in the engine exhaust products, said fiber being capable of withstanding without substantial damage internal temperatures sufficient to burn the collected particulate matter, a throttle in the indication system and operable to restrict air flow into the engine to reduce the admittance of excess combustion air and thereby increase engine exhaust gas temperature, and means to actuate said throttle periodically during engine operation to an air flow restricting burn mode capable of raising the particulates in said filter to their combustion temperature under certain engine operating conditions and to maintain said throttle mode for an interval adequate to burn retained particulates in the filter.

  15. Laboratory Measurements of Particulate Matter Concentrations from Asphalt Pavement Abrasion

    Directory of Open Access Journals (Sweden)

    Fullová Daša

    2016-12-01

    Full Text Available The issue of emissions from road traffic is compounded by the fact that the number of vehicles and driven kilometres increase each year. Road traffic is one of the main sources of particulate matter and traffic volume is still increasing and has unpleasant impact on longevity of the pavements and the environment. Vehicle motions cause mechanical wearing of the asphalt pavement surface - wearing course by vehicle tyres. The contribution deals with abrasion of bituminous wearing courses of pavements. The asphalt mixtures of wearing courses are compared in terms of mechanically separated particulate matter. The samples of asphalt mixtures were rutted in wheel tracking machine. The particulate matter measurements were performed in laboratory conditions. The experimental laboratory measurements make it possible to sample particulates without contamination from exhaust emissions, abraded particles from vehicles, resuspension of road dust and climate affects. The contribution offers partial results of measurements on six trial samples of asphalt mixtures with different composition. It presents particulate matter morphology and the comparison of rutted asphalt samples in terms of PM mass concentrations and chemical composition.

  16. The Influence of Combat Experience on Psychologically Healthy Soldiers' Attentiveness to Environmental Threats.

    Science.gov (United States)

    Ranes, Bethany; Long, Chris P; Traynham, Stephanie; Hayes, Amanda

    2017-07-01

    In contrast to previous research that has primarily examined how psychological disorders (e.g., post-traumatic stress disorder [PTSD], anxiety) are affected by and affect individuals' threat perceptions, this study examines the relationship between combat experience and threat-monitoring in psychologically healthy Soldiers. Existing research has established how prolonged or intense experiences with war-related stressors can lead individuals to undergo an unconscious fear-conditioning process that affects the circuitry of the prefrontal cortex, hippocampus, amygdala, and anterior cingulate cortex regions of the brain. We predict that the intensity of one's combat experience positively influences Soldiers' attention to environmental threats. Participants included U. S. Army Soldiers with a score of 50 or below on the PTSD Checklist-Military Version. Participants completed the Combat Exposure Scale and the State-Trait Anxiety Inventory. The experimental prediction task we employed assesses the expectation of an intrusively loud white noise sound that occurred on three variable patterns in a pseudorandomized order. Each tone pattern was used 20 times over a total of 60 trials. The experimental prediction task included two neutral tones (700 and 1,300 Hz) that were presented in a repeated pattern along with a 100-dB burst of white noise (0.5-second duration). In each trial, one of three possible tone combinations was presented. To assess their attentiveness to threats, participants were asked to continuously rate their expectancy of the burst of white noise using a visual analogue scale (VAS) ranging from 0 to 100. VAS ratings were collected at controlled points throughout the task. None of the participants reported scores on any of the diagnostic surveys that met standards for clinical significance. A repeated-measures analysis of variance was conducted to assess the overall effect of the three prediction conditions on participants' VAS ratings. There was a significant

  17. Real-time chemical characterization of atmospheric particulate matter in China: A review

    Science.gov (United States)

    Li, Yong Jie; Sun, Yele; Zhang, Qi; Li, Xue; Li, Mei; Zhou, Zhen; Chan, Chak K.

    2017-06-01

    Atmospheric particulate matter (PM) pollution has become a major health threat accompanying the rapid economic development in China. For decades, filter-based offline chemical analyses have been the most widely adopted means to investigate PM and have provided much information for understanding this type of pollution in China. However, offline analyses have low time resolutions and the chemical information thus obtained fail to reflect the dynamic nature of the sources and the rapid processes leading to the severe PM pollution in China. In recent years, advances in real-time PM chemical characterization have created a new paradigm for PM studies in China. In this review, we summarize those advances, focusing on the most widely used mass spectrometric and ion chromatographic techniques. We describe the findings from those studies in terms of spatiotemporal variabilities, degree of neutralization and oxygenation, source apportionment, secondary formation, as well as collocated measurements of the chemical and physical (hygroscopic and optical) properties of PM. We also highlight the new insights gained from those findings and suggest future directions for further advancing our understanding of PM pollution in China via real-time chemical characterization.

  18. Application of strengths, weaknesses, opportunities and threats analysis in the development of a health technology assessment program.

    Science.gov (United States)

    Gibis, B; Artiles, J; Corabian, P; Meiesaar, K; Koppel, A; Jacobs, P; Serrano, P; Menon, D

    2001-10-01

    There has been recent interest in developing a health technology assessment (HTA) function in Estonia. A group of individuals knowledgeable about HTA in Canada, Germany, Romania and Spain, along with representatives of the University of Tartu, Estonia, was convened by the Institute of Health Economics in Edmonton, Canada, to consider options for such a function. In a one-day workshop strengths, weaknesses, opportunities and threats (SWOT) analyses of HTA were conducted, first at a 'global' level, and then of the Estonian situation. The 'global' SWOT analysis yielded a large number of items that pertain to institutionalized HTA in a generic sense, i.e. not based on any individual HTA agency. The 'Estonian' SWOT yielded a subset of items, which pertain to development of HTA in that country. Ten actionable steps were then developed on the basis of this subset, which could be used to initiate the creation of an HTA body in Estonia.

  19. Ports and pests: Assessing the threat of aquatic invasive species introduced by maritime shipping activity in Cuba.

    Science.gov (United States)

    O'Brien, Charleen E; Johnston, Matthew W; Kerstetter, David W

    2017-12-15

    Aquatic invasive species (AIS) are biological pollutants that cause detrimental ecological, economic, and human-health effects in their introduced communities. With increasing globalization through maritime trade, ports are vulnerable to AIS exposure via commercial vessels. The Cuban Port of Mariel is poised to become a competitive transshipment hub in the Caribbean and the intent of this study was to evaluate present and potential impacts AIS pose with the likely future increase in shipping activity. We utilized previous assessment frameworks and publicly accessible information to rank AIS by level of threat. Fifteen AIS were identified in Cuba and one, the Asian green mussel Perna viridis (Linnaeus, 1758), had repeated harmful economic impacts. Five species associated with trade partners of Port Mariel were considered potentially detrimental to Cuba if introduced through shipping routes. The results presented herein identify species of concern and emphasize the importance of prioritizing AIS prevention and management within Cuba. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. Approximation of personal exposure to fine particulate matters (PM2.5) during cooking using solid biomass fuels in the kitchens of rural West Bengal, India.

    Science.gov (United States)

    Nayek, Sukanta; Padhy, Pratap Kumar

    2018-03-27

    More than 85% of the rural Indian households use traditional solid biofuels (SBFs) for daily cooking. Burning of the easily available unprocessed solid fuels in inefficient earthen cooking stoves produce large quantities of particulate matters. Smaller particulates, especially with aerodynamic diameter of 2.5 μm or less (PM 2.5 ), largely generated during cooking, are considered to be health damaging in nature. In the present study, kitchen level exposure of women cooks to fine particulate matters during lunch preparation was assessed considering kitchen openness as surrogate to the ventilation condition. Two-way ANCOVA analysis considering meal quantity as a covariate revealed no significant interaction between the openness and the seasons explaining the variability of the personal exposure to the fine particulate matters in rural kitchen during cooking. Multiple linear regression analysis revealed the openness as the only significant predictor for personal exposure to the fine particulate matters. In the present study, the annual average fine particulate matter exposure concentration was found to be 974 μg m -3 .

  1. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  2. Assessment of volatile organic compounds and particulate matter in a dental clinic and health risks to clinic personnel.

    Science.gov (United States)

    Hong, Yu-Jue; Huang, Yen-Ching; Lee, I-Long; Chiang, Che-Ming; Lin, Chitsan; Jeng, Hueiwang Anna

    2015-01-01

    This study was conducted to assess (1) levels of volatile organic compounds (VOCs) and particulate matter (PM) in a dental clinic in southern Taiwan and (2) dental care personnel's health risks associated with due to chronic exposure to VOCs. An automatic, continuous sampling system and a multi-gas monitor were employed to quantify the air pollutants, along with environmental comfort factors, including temperature, CO2, and relative humidity at six sampling sites in the clinic over eight days. Specific VOC compounds were identified and their concentrations were quantified. Both non-carcinogenic and carcinogenic VOC compounds were assessed based on the US Environmental Protection Agency's Principles of Health Risk Assessment in terms of whether those indoor air pollutants increased health risks for the full-time dental care professionals at the clinic. Increased levels of VOCs were recorded during business hours and exceeded limits recommended by the Taiwan Environmental Protection Agency. A total of 68 VOC compounds were identified in the study area. Methylene methacrylate (2.8 ppm) and acetone (0.176 ppm) were the only two non-carcinogenic compounds that posed increased risks for human health, yielding hazard indexes of 16.4 and 4.1, respectively. None of the carcinogenic compounds increased cancer risk. All detected PM10 levels ranged from 20 to 150 μg/m(3), which met the Taiwan EPA and international limits. The average PM10 level during business hours was significantly higher than that during non-business hours (P = 0.04). Improved ventilation capacity in the air conditioning system was recommended to reduce VOCs and PM levels.

  3. Digital resilience is your company ready for the next cyber threat?

    CERN Document Server

    Rothrock, Ray A

    2018-01-01

    Cybersecurity expert Ray Rothrock, lays bare tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks, but thriving even while under assault. Fascinating and highly readable, this book helps businesses: Understand the threats they face * Assess the resilience of their networks against attacks * Identify and address weaknesses * Respond to exploits swiftly and effectively.

  4. Membrane Characteristics for Removing Particulates in PFC Wastes

    International Nuclear Information System (INIS)

    Kim, Gye Nam; Lee, Sung Yeol; Won, Hui Jun; Jung, Chong Hun; Oh, Won Zin; Park, Jin Ho

    2005-01-01

    Pc (Per fluorocarbon) decontamination process is one of best methods to remove hot particulate adhered at inside surface of hot cell and surface of equipment in hot cell. It was necessary to develop a particulate filtration equipment to reuse Pc solution used on Pc decontamination due to its high cost and to minimize the volume of second wastewater. Contamination characteristics of hot particulate were investigated and then a filtration process was presented to remove hot particulate in Pc solution generated through Pc decontamination process. The removal efficiency of Pvdf (Poly vinylidene fluoride), Pp (Polypropylene), Ceramic (Al 2 O 3 ) filter showed more than 95%. The removal efficiency of Pvdf filter was a little lower than those of other kiters at same pressure (3 psi). A ceramic filter showed a higher removal efficiency with other filters, while a little lower flux rate than other filters. Due to inorganic composition, a ceramic filter was highly stable against radio nuclides in comparison with Pvdf and Pp membrane, which generate H 2 gas in α-radioactivity atmosphere. Therefore, the adoption of ceramic filter is estimated to be suitable for the real nitration process.

  5. Particulate matter urban air pollution from traffic car

    Science.gov (United States)

    Filip, G. M.; Brezoczki, V. M.

    2017-05-01

    The particulate matters (PM) are very important compounds of urban air pollution. There are a lot of air pollution sources who can generate PM and one of the most important of them it is urban traffic car. Air particulate matters have a major influence on human health so everywhere are looking for PM reducing solutions. It is knows that one of the solution for reduce the PM content from car traffic on ambient urban air is the fluidity of urban traffic car by introduction the roundabout intersections. This paper want to present some particulate matter determinations for PM10 and PM2.5 conducted on the two types of urban intersection respectively traffic light and roundabout intersections in Baia Mare town in the approximate the same work conditions. The determinations were carried out using a portable particulate matter monitor Haz - Dust model EPAM - 5000, who can provide a real time data for PM10, PM 2.5.Determinations put out that there are differences between the two locations regarding the PM content on ambient air. On roundabout intersection the PM content is less than traffic light intersection for both PM10 and PM 2.5 with more than 30%.

  6. DIII-D dust particulate characterization (June 1998 Vent)

    International Nuclear Information System (INIS)

    Carmack, W.J.

    1999-01-01

    Dust is a key component of fusion power device accident source term. Understanding the amount of dust expected in fusion power devices and its physical and chemical characteristics is needed to verify assumptions currently used in safety analyses. An important part of this safety research and development work is to characterize dust from existing experimental tokamaks. In this report, the authors present the collection, data analysis methods used, and the characterization of dust particulate collected from various locations inside the General Atomics DIII-D vacuum vessel following the June 1998 vent. The collected particulate was analyzed at the Idaho National Engineering and Environmental Laboratory (INEEL). Two methods were used to collect particulate with the goal of preserving the particle size distribution and physical characteristics of the particulate. Choice of collection technique is important because the sampling method used can bias the particle size distribution collected. Vacuum collection on substrates and adhesion removal with metallurgical replicating tape were chosen as non-intrusive sampling methods. Seventeen samples were collected including plasma facing surfaces in lower, upper, and horizontal locations, surfaces behind floor tiles, surfaces behind divert or tiles, and surfaces behind ceiling tiles. The results of the analysis are presented

  7. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    International Nuclear Information System (INIS)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill

    2016-01-01

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis

  8. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis.

  9. Analysis of atmospheric particulate samples via instrumental neutron activation analysis

    International Nuclear Information System (INIS)

    Greenberg, R.R.

    1990-01-01

    Instrumental neutron activation analysis (INAA) is a powerful analytical technique for the elemental characterization of atmospheric particulate samples. It is a true multielement technique with adequate sensitivity to determine 30 to 40 elements in a sample of atmospheric particulate material. Its nondestructive nature allows sample reanalysis by the same or a different analytical technique. In this paper as an example of the applicability of INAA to the study of atmospheric particulate material, a study of the emissions from municipal incinerators is described

  10. Chemical characterization and toxicity assessment of fine particulate matters emitted from the combustion of petrol and diesel fuels.

    Science.gov (United States)

    Wu, Di; Zhang, Fei; Lou, Wenhao; Li, Dan; Chen, Jianmin

    2017-12-15

    Fuel consumption is one of the major contributors to air pollution worldwide. Plenty of studies have demonstrated that the diesel and petrol exhaust fine particulate matters (FPMs) are associated with increases of various diseases. However, the influences of different fuel types and their chemical components on toxicity have been less investigated. In this study, four kinds of fuels that widely used in China were burned in a laboratory simulation, and the FPMs were collected and analyzed. Transmission electron microscopy showed that black carbon was mainly soot with a dendritic morphology. For light diesel oil, marine heavy diesel oil, 93 octane petrol and 97 octane petrol diesel oil, the emission factors of FPMs were 3.05±0.29, 3.21±0.54, 2.36±0.33, and 2.28±0.25g/kg fuel, respectively. And the emission factors for the "16 US EPA" PAHs of FPM were 0.45±0.20, 0.80±0.22, 1.00±0.20, and 1.05±0.19mg/g FPMs, respectively. Fe is the most abundant metal in these FPMs, and the emission factors of FPMs were 2.58±1.70, 4.45±0.11, 8.18±0.58, and 9.24±0.17mg/g FPMs, respectively. We ranked the cytotoxicity of the FPMs emission from fuels combustion: marine heavy diesel oil>97 octane petrol>93 octane petrol>light diesel oil, and the genotoxicity of FPMs emission from fuels combustion: marine heavy diesel oil>light diesel oil>93 octane petrol>97 octane petrol. Significant correlations were found between PAH concentrations and reactive oxygen species (ROS) generation. Our results demonstrated that fuels exhaust FPMs have strong association with ROS activity, cytotoxicity and genotoxicity. These results indicated that fuels exhaust FPMs pose a potentially serious health, and emphasized the importance of assessing the health risks posed by the particulate pollutants in vehicle exhausts. Copyright © 2017. Published by Elsevier B.V.

  11. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  12. Elemental quantification of airborne particulate matter in Bandung and Lembang area

    International Nuclear Information System (INIS)

    Sutisna; Achmad Hidayat; Dadang Supriatna

    2004-01-01

    ELEMENTAL QUANTIFICATION OF AIRBORNE PARTICULATE MATTER IN BANDUNG AND LEMBANG REGION: The contaminated airborne particulates by toxic gases and elements have a potential affect to the human health. Some toxic elements related to air pollution have carcinogenic affect. The quantification of those elements is important to monitor a level of pollutant contained in the airborne particulate. The aim of this work is to analyze the air particulate sample using instrumental neutron activation analysis and other related technique. Two sampling points of Bandung and Lembang that represent and urban and rural area respectively have been chosen to collect the air particulate sample. The samplings were carried out using Gent Stacked Filter Unit Sampler for 24 hours, and two cellulose filters of 8 μm and 0.45 μm pore size were used. Trace elements in the sample collected were determined using NAA based on a comparative method. Elemental distribution on PM 2.5 and PM 10 fraction of airborne particulate was analyzed, the enrichment factor was calculated using Al as reference elements, and the black carbons contents were determined using FEL Smoke Stain Reflectometer analyzed. The results are presented and discussed. (author)

  13. Using National Ambient Air Quality Standards for fine particulate matter to assess regional wildland fire smoke and air quality management.

    Science.gov (United States)

    Schweizer, Don; Cisneros, Ricardo; Traina, Samuel; Ghezzehei, Teamrat A; Shaw, Glenn

    2017-10-01

    Wildland fire is an important ecological process in the California Sierra Nevada. Personal accounts from pre-20th century describe a much smokier environment than present day. The policy of suppression beginning in the early 20th century and climate change are contributing to increased megafires. We use a single particulate monitoring site at the wildland urban interface to explore impacts from prescribed, managed, and full suppression wildland fires from 2006 to 2015 producing a contextual assessment of smoke impacts over time at the landscape level. Prescribed fire had little effect on local fine particulate matter (PM 2.5 ) air quality with readings typical of similar non-fire times; hourly and daily good to moderate Air Quality Index (AQI) for PM 2.5 , maximum hourly concentrations 21-103 μg m -3 , and mean concentrations between 7.7 and 13.2 μg m -3 . Hourly and daily AQI was typically good or moderate during managed fires with 3 h and one day reaching unhealthy while the site remained below National Ambient Air Quality Standards (NAAQS), with maximum hourly concentrations 27-244 μg m -3 , and mean concentrations 6.7-11.7 μg m -3 . The large high intensity fire in this area created the highest short term impacts (AQI unhealthy for 4 h and very unhealthy for 1 h), 11 unhealthy for sensitive days, and produced the only annual value (43.9 μg m -3 ) over the NAAQS 98th percentile for PM 2.5 (35 μg m -3 ). Pinehurst remained below the federal standards for PM 2.5 when wildland fire in the local area was managed to 7800 ha (8-22% of the historic burn area). Considering air quality impacts from smoke using the NAAQS at a landscape level over time can give land and air managers a metric for broader evaluation of smoke impacts particularly when assessing ecologically beneficial fire. Allowing managers to control the amount and timing of individual wildland fire emissions can help lessen large smoke impacts to public health from a megafire

  14. Particulate Matter Emission Factors for Biomass Combustion

    Directory of Open Access Journals (Sweden)

    Simone Simões Amaral

    2016-10-01

    Full Text Available Emission factor is a relative measure and can be used to estimate emissions from multiple sources of air pollution. For this reason, data from literature on particulate matter emission factors from different types of biomass were evaluated in this paper. Initially, the main sources of particles were described, as well as relevant concepts associated with particle measurements. In addition, articles about particle emissions were classified and described in relation to the sampling environment (open or closed and type of burned biomass (agricultural, garden, forest, and dung. Based on this analysis, a set of emission factors was presented and discussed. Important observations were made about the main emission sources of particulate matter. Combustion of compacted biomass resulted in lower particulate emission factors. PM2.5 emissions were predominant in the burning of forest biomass. Emission factors were more elevated in laboratory burning, followed by burns in the field, residences and combustors.

  15. Polarimetric Remote Sensing of Atmospheric Particulate Pollutants

    Science.gov (United States)

    Li, Z.; Zhang, Y.; Hong, J.

    2018-04-01

    Atmospheric particulate pollutants not only reduce atmospheric visibility, change the energy balance of the troposphere, but also affect human and vegetation health. For monitoring the particulate pollutants, we establish and develop a series of inversion algorithms based on polarimetric remote sensing technology which has unique advantages in dealing with atmospheric particulates. A solution is pointed out to estimate the near surface PM2.5 mass concentrations from full remote sensing measurements including polarimetric, active and infrared remote sensing technologies. It is found that the mean relative error of PM2.5 retrieved by full remote sensing measurements is 35.5 % in the case of October 5th 2013, improved to a certain degree compared to previous studies. A systematic comparison with the ground-based observations further indicates the effectiveness of the inversion algorithm and reliability of results. A new generation of polarized sensors (DPC and PCF), whose observation can support these algorithms, will be onboard GF series satellites and launched by China in the near future.

  16. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  17. The role of riverine particulate material on the global cycles of the elements

    International Nuclear Information System (INIS)

    Oelkers, Eric H.; Gislason, Sigurdur R.; Eiriksdottir, Eydis Salome; Jones, Morgan; Pearce, Christopher R.; Jeandel, Catherine

    2011-01-01

    Highlights: → Particulate transport dominates dissolved transport of the elements to the ocean. → Particulate material readily dissolves in sea water releasing its elements. → Particulate element release can rapidly affect the isotopic composition of seawater. → Ocean Nd, Fe, Si, and Sr isotopic ratios are likely affected strongly by this process. - Abstract: A review of the relative masses of continental weathering products transported to the oceans indicates that particulate fluxes dominate dissolved fluxes for most elements. The degree to which this particulate material plays a role in the compositional evolution of seawater depends on its dissolution rate, which appears to be rapid due to its high surface area. Consideration of the results of batch experiments and mineral saturation state calculations suggest that much of the mass dissolved into seawater from particulate material dissolution is rapidly removed by the precipitation of secondary minerals. Although this process limits the degree to which the overall concentration of elements in seawater are affected by the addition of particulate material, the dissolution of isotopically distinct particulate phases may affect the isotopic composition of seawater over remarkably short timescales.

  18. Evaluation of city buses installed diesel particulate filter systems on fleet test; Diesel particulate filter system wo tosaishita rosen bus no soko chosa

    Energy Technology Data Exchange (ETDEWEB)

    Sudo, H [Japan Automobile Research Institute Inc., Tsukuba (Japan)

    1997-10-01

    An environmental air quality of suspended particulate matter is insufficient in the big city area. To reduce the particulate matter, improvement of engine and development of the Diesel Particulate Filter (DPF) system are carrying. The purpose of this report is to investigate a possibility of practical use of the city buses installed DPF systems. From March 1995, investigation for practical use of these DPF systems on a route buses was carried in regular service operation of the Tokyo and Yokohama Transportation Bureau. The investigation items are service situation, smoke density and preparation inspection. From the result for 2 years service operation, each DPF systems needed some failure correspondence. but these were not fatal problem on using the DPF system. Then the subject of relative to durability and reliability became clear, and the performance of a low particulate emission DPF system obtained the high value evaluation for users. 9 refs., 4 figs., 2 tabs.

  19. Women are not less field independent than men-the role of stereotype threat.

    Science.gov (United States)

    Drążkowski, Dariusz; Szwedo, Jakub; Krajczewska, Aleksandra; Adamczuk, Anna; Piątkowski, Krzysztof; Jadwiżyc, Marcin; Rakowski, Adam

    2017-10-01

    Prior research has shown that females are less field independent (FI) than males. However, when gender identity is salient, performance on tests assessing constructs similar to FI may be hindered, because of stereotype threat. This study examined the impact of stereotype threat on gender differences in FI. We expected that (a) reporting one's own gender prior to FI testing and (b) having an opposite-gender experimenter would activate stereotype threat, and in turn result in lower performance on a test of FI among females. Overall, 170 participants were randomly assigned to one of eight conditions in a between-participants design varying the participant's gender, experimenter's gender and timing of the gender question (before vs. after test). Results showed that reporting one's gender before the FI test led to lower FI performance among females. Furthermore, females achieved higher FI when experimenters were females and gender questions were administered after the FI test. © 2015 International Union of Psychological Science.

  20. Zone heated inlet ignited diesel particulate filter regeneration

    Science.gov (United States)

    Gonze, Eugene V [Pinckney, MI; Ament, Frank [Troy, MI

    2012-06-26

    An exhaust system that processes exhaust generated by an engine is provided. The system includes: a particulate filter (PF) that is disposed downstream of the engine and that filters particulates from the exhaust; and a grid that includes electrically resistive material that is segmented by non-conductive material into a plurality of zones and wherein the grid is applied to an exterior upstream surface of the PF.