WorldWideScience

Sample records for sea lice threats

  1. A field efficacy evaluation of emamectin benzoate for the control of sea lice on Atlantic salmon.

    Science.gov (United States)

    Armstrong, R; MacPhee, D; Katz, T; Endris, R

    2000-08-01

    This study evaluated the efficacy of emamectin benzoate, 0.2% aquaculture premix, against sea lice on Atlantic salmon in eastern Canada. Salmon pens received either emamectin benzoate, orally, in feed at 50 micrograms/kg body weight/day for 7 consecutive days, or the same diet with no added medication. The site veterinarian had the option of administering a bath treatment with azamethiphos to any pen in the trial. The mean number of lice per fish was lower (P emamectin benzoate was palatable and highly effective for control of sea lice on salmon.

  2. The drivers of sea lice management policies and how best to integrate them into a risk management strategy: An ecosystem approach to sea lice management.

    Science.gov (United States)

    Jackson, D; Moberg, O; Stenevik Djupevåg, E M; Kane, F; Hareide, H

    2018-06-01

    The control of sea lice infestations on cultivated Atlantic salmon is a major issue in many regions of the world. The numerous drivers which shape the priorities and objectives of the control strategies vary for different regions/jurisdictions. These range from the animal welfare and economic priorities of the producers, to the mitigation of any potential impacts on wild stocks. Veterinary ethics, environmental impacts of therapeutants, and impacts for organic certification of the produce are, amongst others, additional sets of factors which should be considered. Current best practice in both EU and international environmental law advocates a holistic ecosystem approach to assessment of impacts and risks. The issues of biosecurity and ethics, including the impacts on the stocks of species used as cleaner fish, are areas for inclusion in such a holistic ecosystem assessment. The Drivers, Pressures, State, Impacts, Responses (DPSIR) process is examined as a decision-making framework and potential applications to sea lice management are outlined. It is argued that this is required to underpin any integrated sea lice management (ISLM) strategy to balance pressures and outcomes and ensure a holistic approach to managing the issue of sea lice infestations on farmed stock on a medium to long-term basis. © 2017 The Authors. Journal of Fish Diseases Published by John Wiley & Sons Ltd.

  3. A field efficacy evaluation of emamectin benzoate for the control of sea lice on Atlantic salmon.

    OpenAIRE

    Armstrong, R; MacPhee, D; Katz, T; Endris, R

    2000-01-01

    This study evaluated the efficacy of emamectin benzoate, 0.2% aquaculture premix, against sea lice on Atlantic salmon in eastern Canada. Salmon pens received either emamectin benzoate, orally, in feed at 50 micrograms/kg body weight/day for 7 consecutive days, or the same diet with no added medication. The site veterinarian had the option of administering a bath treatment with azamethiphos to any pen in the trial. The mean number of lice per fish was lower (P < 0.05) in the experimental group...

  4. A fixed-dose approach to conducting emamectin benzoate tolerance assessments on field-collected sea lice, Lepeophtheirus salmonis.

    Science.gov (United States)

    Whyte, S K; Westcott, J D; Elmoslemany, A; Hammell, K L; Revie, C W

    2013-03-01

    In New Brunswick, Canada, the sea louse, Lepeophtheirus salmonis, poses an on-going management challenge to the health and productivity of commercially cultured Atlantic salmon, Salmo salar. While the in-feed medication, emamectin benzoate (SLICE® ; Merck), has been highly effective for many years, evidence of increased tolerance has been observed in the field since late 2008. Although bioassays on motile stages are a common tool to monitor sea lice sensitivity to emamectin benzoate in field-collected sea lice, they require the collection of large numbers of sea lice due to inherent natural variability in the gender and stage response to chemotherapeutants. In addition, sensitive instruments such as EC(50) analysis may be unnecessarily complex to characterize susceptibility subsequent to a significant observed decline in efficacy. This study proposes an adaptation of the traditional, dose-response format bioassay to a fixed-dose method. Analysis of 657 bioassays on preadult and adult stages of sea lice over the period 2008-2011 indicated a population of sea lice in New Brunswick with varying degrees of susceptibility to emamectin benzoate. A seasonal and spatial effect was observed in the robustness of genders and stages of sea lice, which suggest that mixing different genders and stages of lice within a single bioassay may result in pertinent information being overlooked. Poor survival of adult female lice in bioassays, particularly during May/June, indicates it may be prudent to consider excluding this stage from bioassays conducted at certain times of the year. This work demonstrates that fixed-dose bioassays can be a valuable technique in detecting reduced sensitivity in sea lice populations with varying degrees of susceptibility to emamectin benzoate treatments. © 2013 Blackwell Publishing Ltd.

  5. Optimization and field use of a bioassay to monitor sea lice Lepeophtheirus salmonis sensitivity to emamectin benzoate.

    Science.gov (United States)

    Westcott, Jillian D; Stryhn, Henrik; Burka, John F; Hammell, K Larry

    2008-04-01

    A bioassay for sea lice Lepeophtheirus salmonis sensitivity towards emamectin benzoate (EMB) was validated for field use. A probit regression model with natural responsiveness was used for the number of affected (moribund or dead) sea lice in bioassays involving different concentrations of EMB. Bioassay optimization included an evaluation of the inter-rater reliability of sea lice responsiveness to EMB and an evaluation of gender-related differences in susceptibility. Adoption of a set of bioassay response criteria improved the concordance (evaluated using the concordance correlation coefficient) between raters' assessments and the model estimation of EC50 values (the 'effective concentration' leading to a response of 50% of the lice not prone to natural response). An evaluation of gender-related differences in EMB susceptibility indicated that preadult stage female sea lice exhibited a significantly larger sensitivity towards EMB in 12 of 19 bioassays compared to preadult males. In order to evaluate sea lice sensitivity to EMB in eastern Canada, the intensive salmon farming area in the Bay of Fundy in southwestern New Brunswick was divided into 4 distinct regions based on industry health management practices and hydrographics. A total of 38 bioassays were completed from 2002 to 2005 using populations of preadult stage sea lice collected from Atlantic salmon Salmo salar farms within the 4 described regions. There was no significant overall effect of region or year on EC50 values; however, analysis of variance indicated a significant effect of time of year on EC50 values in 2002 and a potential effect in 2004 to 2005. Although the range of EC50 values obtained in this 3 yr study did not appear sufficient to affect current clinical success in the control of sea lice, the results suggest a seasonal- or temperature-associated variation in sensitivity to EMB. This will need to be considered if changes in EMB efficacy occur in the future.

  6. Considerations in developing an integrated pest management programme for control of sea lice on farmed salmon in Pacific Canada.

    Science.gov (United States)

    Brooks, K M

    2009-01-01

    In the development of integrated pest management (IPM) plans for the control of sea lice there are some components that are common to many areas. However, effective plans must be tailored to regionally varying environmental and biological factors affecting the severity of sea lice infections. This paper describes factors that would be involved in the development of an IPM plan for sea lice in the Broughton Archipelago, British Columbia. Temperature, salinity and currents affect the production, dispersion and competence of larvae of sea lice, Lepeophtheirus salmonis (Krøyer), as they develop to the infective copepodid stage. This information can be coupled with oceanographic conditions in the Broughton Archipelago and emerging computer models to define zones of infection where infections of new hosts are most likely. Salinity and temperature depend, in part, on river discharge in estuarine systems. River discharge depends on precipitation, snow pack and ambient temperatures, which can be monitored to help forecast the intensity of sea lice infections associated with both farmed and wild hosts. One of the goals of IPM planning is to reduce reliance on pesticides to avoid development of resistance in targeted parasites and to minimize environmental residues. Recommendations for developing an IPM plan specific to the Broughton Archipelago are provided along with a discussion of the additional information needed to refine IPM plans in this and other areas.

  7. Evaluating bath treatment effectiveness in the control of sea lice burdens on Atlantic salmon in New Brunswick, Canada.

    Science.gov (United States)

    Gautam, R; Vanderstichel, R; Boerlage, A S; Revie, C W; Hammell, K L

    2017-07-01

    The use of medicinal bath treatment for sea lice is becoming more common, due to increasing resistance to in-feed treatments with emamectin benzoate. Common treatment modalities in New Brunswick, Canada, include Salmosan administered by tarpaulin or wellboat, and Paramove administered by wellboat. In this study, we assessed the effectiveness of these treatment modalities in the field between 2010 and 2015 using a web-based sea lice data management system (Fish-iTrends © ). Effectiveness was evaluated for adult female (AF) and for pre-adult and adult male (PAAM) life stages separately. We also investigated the impact of variability in pretreatment lead and post-treatment lag time on effectiveness measures. There were 1185 treatment events at 57 farms that uniquely matched our pre- and post-treatment count criteria. The effectiveness of treatment modality was significantly influenced by season, pretreatment level of sea lice and by lead and lag times. In summer, Salmosan administered by tarpaulin had the greatest effectiveness on both AF and PAAM, when pretreatment levels were above 10 sea lice; whereas in autumn, the performance of treatment modalities varied significantly, depending on the pretreatment levels for the life stages. Ignoring the lead or lag time effect generally resulted in an underestimation of treatment effectiveness. © 2016 John Wiley & Sons Ltd.

  8. Body Lice

    Science.gov (United States)

    What are body lice? Body lice (also called clothes lice) are tiny insects which live and lay nits (lice eggs) on clothing. They are parasites, ... usually only move to the skin to feed. Body lice are one of the three types of ...

  9. Commercial trials using emamectin benzoate to control sea lice Lepeophtheirus salmonis infestations in Atlantic salmon Salmo salar.

    Science.gov (United States)

    Stone, J; Sutherland, I H; Sommerville, C; Richards, R H; Varma, K J

    2000-06-19

    Two trials were conducted at commercial salmon farms to evaluate the efficacy of emamectin benzoate (Slice, 0.2% aquaculture pre-mix, Schering-Plough Animal Health) as a treatment for sea lice Lepeophtheirus salmonis (Krøyer) and Caligus elongatus Nordmann infestations in Atlantic salmon Salmo salar L. Trials were carried out in 15 m2 commercial sea pens, at temperatures of 5.5 to 7.5 degrees C and 10.8 to 13.8 degrees C. Each pen was stocked with 14,000 to 17,500 fish with mean weights of 0.44 to 0.74 and 1.33 to 1.83 kg. Fish were naturally infested with sea lice at the start of each trial. At Day -1, samples of 10 or 15 fish were taken from each pen to determine pre-treatment numbers of lice. Emamectin benzoate was administered in feed, to 4 replicate pens, at a dose of 50 micrograms kg-1 biomass d-1 for 7 consecutive days (Days 0 to 6). Sea lice were counted again, between Days 7 and 77, and comparisons made with untreated control fish. Despite adverse weather conditions, wide variations in fish weights and exposure to new infestations, treatment was effective against chalimus and motile stages of L. salmonis. In the autumn trial, efficacy at Day 27 was 89%, and lice numbers remained lower on treated fish than on control fish 64 d from the start of treatment. In the winter trial, reductions in lice numbers at low temperatures were slower but good efficacy was achieved by Day 35. Although control fish had to be treated with hydrogen peroxide at Day 21, fish treated only with emamectin benzoate on Days 0 to 6 still had 89% fewer lice than control fish at Day 35. There were very few C. elongatus present, but at the end of both trials numbers were lower on treated fish. No adverse effects were associated with treatment of fish with emamectin benzoate.

  10. High level efficacy of lufenuron against sea lice (Lepeophtheirus salmonis) linked to rapid impact on moulting processes.

    Science.gov (United States)

    Poley, Jordan D; Braden, Laura M; Messmer, Amber M; Igboeli, Okechukwu O; Whyte, Shona K; Macdonald, Alicia; Rodriguez, Jose; Gameiro, Marta; Rufener, Lucien; Bouvier, Jacques; Wadowska, Dorota W; Koop, Ben F; Hosking, Barry C; Fast, Mark D

    2018-03-13

    Drug resistance in the salmon louse Lepeophtheirus salmonis is a global issue for Atlantic salmon aquaculture. Multiple resistance has been described across most available compound classes with the exception of the benzoylureas. To target this gap in effective management of L. salmonis and other species of sea lice (e.g. Caligus spp.), Elanco Animal Health is developing an in-feed treatment containing lufenuron (a benzoylurea) to be administered prior to seawater transfer of salmon smolts and to provide long-term protection of salmon against sea lice infestations. Benzoylureas disrupt chitin synthesis, formation, and deposition during all moulting events. However, the mechanism(s) of action are not yet fully understood and most research completed to date has focused on insects. We exposed the first parasitic stage of L. salmonis to 700 ppb lufenuron for three hours and observed over 90% reduction in survival to the chalimus II life stage on the host, as compared to vehicle controls. This agrees with a follow up in vivo administration study on the host, which showed >95% reduction by the chalimus I stage. Transcriptomic responses of salmon lice exposed to lufenuron included genes related to moulting, epithelial differentiation, solute transport, and general developmental processes. Global metabolite profiles also suggest that membrane stability and fluidity is impacted in treated lice. These molecular signals are likely the underpinnings of an abnormal moulting process and cuticle formation observed ultrastructurally using transmission electron microscopy. Treated nauplii-staged lice exhibited multiple abnormalities in the integument, suggesting that the coordinated assembly of the epi- and procuticle is impaired. In all cases, treatment with lufenuron had rapid impacts on L. salmonis development. We describe multiple experiments to characterize the efficacy of lufenuron on eggs, larvae, and parasitic stages of L. salmonis, and provide the most comprehensive

  11. Using observed load distributions with a simple model to analyse the epidemiology of sea lice (Lepeophtheirus salmonis) on sea trout (Salmo trutta).

    Science.gov (United States)

    Murray, Alexander G

    2002-06-01

    Sea lice are ectoparasites of salmonids that have been associated with the recent decline in sea trout numbers in north-west Europe. Observed patterns of louse load distribution between sea trout in the seas surrounding the UK, Ireland and Norway and a simple model have been used to analyse the epidemiology of lice. Loads are aggregated and deviate strongly from the Poisson distribution, although less than is observed with many other parasites. The louse numbers on fish from offshore sites are slightly less variable than for fish from coastal sites with comparable mean loads. Analysis of louse development stages and sexes shows that selection between hosts by sea lice plays a limited role. If host selection is absent, then associated poor condition would be caused by, not the cause of, high louse burdens; however the absence of such selection is not proved. Scenarios with infection that is patchy in space and time best generate the aggregated load patterns observed; these patches accord with observed swarms of copepodids. Prevalence patterns may indicate the movement of trout between environments. Control of copepodids in infection 'hot spots', either directly or through control of louse egg production in their catchment, may reduce louse loads on wild sea trout and, in particular, extreme and damaging loads.

  12. Variation in pre-treatment count lead time and its effect on baseline estimates of cage-level sea lice abundance.

    Science.gov (United States)

    Gautam, R; Boerlage, A S; Vanderstichel, R; Revie, C W; Hammell, K L

    2016-11-01

    Treatment efficacy studies typically use pre-treatment sea lice abundance as the baseline. However, the pre-treatment counting window often varies from the day of treatment to several days before treatment. We assessed the effect of lead time on baseline estimates, using historical data (2010-14) from a sea lice data management programme (Fish-iTrends). Data were aggregated at the cage level for three life stages: (i) chalimus, (ii) pre-adult and adult male and (iii) adult female. Sea lice counts were log-transformed, and mean counts by lead time relative to treatment day were computed and compared separately for each life stage, using linear mixed models. There were 1,658 observations (treatment events) from 56 sites in 5 Bay Management Areas. Our study showed that lead time had a significant effect on the estimated sea lice abundance, which was moderated by season. During the late summer and autumn periods, counting on the day of treatment gave significantly higher values than other days and would be a more appropriate baseline estimate, while during spring and early summer abundance estimates were comparable among counts within 5 days of treatment. A season-based lead time window may be most appropriate when estimating baseline sea lice levels. © 2016 John Wiley & Sons Ltd.

  13. Sea lice population and sex differences in P-glycoprotein expression and emamectin benzoate resistance on salmon farms in the Bay of Fundy, New Brunswick, Canada.

    Science.gov (United States)

    Igboeli, Okechukwu O; Burka, John F; Fast, Mark D

    2014-06-01

    Parasitic sea lice are a major challenge for salmon aquaculture. This is especially due to the recent development of resistance to emamectin benzoate (EMB) in the parasite. We investigated: (1) whether EMB treatment success in Grand Manan, Bay of Fundy, NB, Canada can be explained through EMB bioassay and P-glycoprotein (P-gp) mRNA expression studies; (2) if other populations of sea lice not under EMB selective pressure possess similar EMB sensitivity as Grand Manan sea lice populations; and (3) the heritability of EMB resistance in Lepeophtheirus salmonis. EMB bioassay results indicated population, species, sex and temporal differences in EMB EC50 values. RT-qPCR analyses revealed population and sex differences in P-gp mRNA levels, correlating with the bioassay results. Laboratory-reared sea lice maintained their EMB sensitivity status up to the F3 generation. Caligus elongatus, collected from Grand Manan showed more than twofold lower EMB EC50 values compared with L. salmonis collected from the same site. Concurrent exposure to EMB and verapamil yielded no increase in C. elongatus sensitivity to the parasiticide. Sea lice bioassay and P-gp mRNA studies can be used to track EMB resistance and sex differences in EMB sensitivity and P-gp mRNA levels exist in the parasite. © 2013 Society of Chemical Industry.

  14. Field trials in Norway with SLICE (0.2% emamectin benzoate) for the oral treatment of sea lice infestation in farmed Atlantic salmon Salmo salar.

    Science.gov (United States)

    Ramstad, A; Colquhoun, D J; Nordmo, R; Sutherland, I H; Simmons, R

    2002-06-21

    Four commercial salmon farms on the West coast of Norway were recruited to a programme of field trials in which the efficacy of SLICE (0.2% emamectin benzoate; Schering-Plough Animal Health) was compared with a commercially available product, EKTOBANN (teflubenzuron 2 g kg(-1); Skretting A/S) in treating natural sea lice Lepeophtheirus salmonis infections in Atlantic salmon Salmo salmar L. At each test site, 3 fish pens were treated with each product. In total, nearly 1.2 million first-year-class fish were included in the trial, of which approximately 561,000 received emamectin benzoate at a dosage of 50 microg kg(-1) body wt d(-1), while approximately 610,000 received teflubenzuron at a dosage of 10 mg kg(-1) body wt d(-1). Medicated feed was provided at 0.5% body wt d(-1) over 7 consecutive days. Feed containing emamectin benzoate was generally well accepted by the fish and no problems were encountered in feeding the medicated diet at the desired dose. Lice numbers were counted 2 d before and 1, 7, 14 and 21 d after commencement of treatment. While treatment with both substances rapidly reduced lice numbers, pens treated with emamectin benzoate were found to harbour significantly fewer lice 14 and 21 d post-treatment. Twenty-one days following treatment with emamectin benzoate the lice abundance was reduced on average by 94%. Limited sampling outside the main study period indicated that emamectin benzoate protects against sea-lice infestation over longer periods.

  15. Head Lice

    Science.gov (United States)

    ... nits. You should also use hot water to wash any bed linens, towels, and clothing recently worn by the person who had head lice. Vacuum anything that can’t be washed, such as the couch, carpets, your child’s car seat, and any stuffed animals. Because head lice ...

  16. Detection of emamectin benzoate tolerance emergence in different life stages of sea lice, Lepeophtheirus salmonis, on farmed Atlantic salmon, Salmo salar L.

    Science.gov (United States)

    Jones, P G; Hammell, K L; Gettinby, G; Revie, C W

    2013-03-01

    Emamectin benzoate has been used to treat sea lice, Lepeophtheirus salmonis, infestations on farmed Atlantic salmon, Salmo salar. Recent evidence suggests a reduction in effectiveness in some locations. A major challenge in the detection of tolerance emergence can be the typically low proportion of resistant individuals in a population during the early phases. The objectives of this study were to develop a method for determining differences in temporal development of tolerance between sea lice life stages and to explore how these differences might be used to improve the monitoring of treatment effectiveness in a clinical setting. This study examined two data sets based on records of sea lice abundance following emamectin benzoate treatments from the west coast of Scotland (2002-2006) and from New Brunswick, Canada (2004-2008). Life stages were categorized into two groups (adult females and the remaining mobile stages) to examine the trends in mean abundance and treatment effectiveness. Differences in emamectin benzoate effectiveness were found between the two groups by year and location, suggesting that an important part of monitoring drug resistance development in aquatic ectoparasites may be the need to focus on key life stages. © 2013 Blackwell Publishing Ltd.

  17. The Biodiversity of the Mediterranean Sea: Estimates, Patterns, and Threats

    OpenAIRE

    Coll, Marta; Piroddi, Chiara; Steenbeek, Jeroen; Kaschner, Kristin; Ben Rais Lasram, Frida; Aguzzi, Jacopo; Ballesteros, Enric; Bianchi, Carlo Nike; Corbera, Jordi; Dailianis, Thanos; Danovaro, Roberto; Estrada, Marta; Froglia, Carlo; Galil, Bella S.; Gasol, Josep M.

    2010-01-01

    The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterra- nean Sea. However, our estimates of marine...

  18. Efficacy of emamectin benzoate against sea lice infestations of Atlantic salmon, Salmo salar L.: evaluation in the absence of an untreated contemporary control.

    Science.gov (United States)

    Gustafson, L; Ellis, S; Robinson, T; Marenghi, F; Endris, R

    2006-10-01

    The efficacy of emamectin benzoate (SLICE) against sea lice infestations of Atlantic salmon, Salmo salar L., is typically assessed using untreated fish, or fish treated with alternative therapeutants, as controls. The State of Maine, USA, is currently under active management for the OIE-notifiable pathogen, infectious salmon anaemia virus (ISAV); consequently, neither control group is feasible in this region. Untreated salmon risk extensive damage from the ectoparasites, and threaten to increase vector-borne exposure or susceptibility of farms to ISAV; and the only treatment presently available in Maine is SLICE. However, because sea lice infestations are unlikely to resolve spontaneously, and response to treatment occurs within weeks, use of a pretreatment baseline is a reasonable alternative for confirmatory studies. We evaluated SLICE efficacy on Atlantic salmon farms in Cobscook Bay 2002-2005, in the absence of untreated controls, using pretreatment lice loads as a reference for calculation. Maximum efficacy ranged from 68% to 100% reduction from initial levels. Time-to-maximum efficacy ranged from 1 to 8 weeks after treatment initiation. Efficacy duration, measured between first reduction and first progressive rise in counts, ranged from 4 to 16 weeks.

  19. Evaluation of emamectin benzoate and substance EX against salmon lice in sea-ranched Atlantic salmon smolts.

    Science.gov (United States)

    Skilbrei, Ove Tommy; Espedal, Per Gunnar; Nilsen, Frank; Garcia, Enrique Perez; Glover, Kevin A

    2015-04-08

    Experimental releases of Atlantic salmon smolts treated with emamectin benzoate (EB) against salmon lice have previously been used to estimate the significance of salmon lice on the survival of migrating smolts. In recent years, the salmon louse has developed reduced sensitivity to EB, which may influence the results of such release experiments. We therefore tested the use of 2 anti-lice drugs: EB was administered to salmon smolts in high doses by intra-peritoneal injection and the prophylactic substance EX (SubEX) was administered by bathing. A third, untreated control group was also established. Salmon were challenged with copepodids of 2 strains of salmon lice (1 EB-sensitive strain and 1 with reduced EB-sensitivity) in mixed-group experimental tanks. At 31 d post-challenge, the numbers of pre-adult lice on treated fish were around 20% compared with the control fish, with minor or no differences between the 2 treatments and lice strains. Both treatments therefore appeared to give the smolts a high degree of protection against infestation of copepodids of salmon lice. However, significantly lower growth of the EB-treatment group indicates that bathing the fish in SubEX is less stressful for smolts than intra-peritoneal injection of EB.

  20. Short-Term Effects of the Anti-sea Lice Therapeutant Emamectin Benzoate on Clam Worms (Nereis virens).

    Science.gov (United States)

    McBriarty, G J; Kidd, K A; Burridge, L E

    2018-05-01

    The polychaete Nereis virens occurs commonly in marine sediments, is widely distributed, and is a popular bait species, as well as a potential replacement for wild-caught fish in commercial fish feed preparations. It is being considered as a potential co-extractive species for culture in integrated multi-trophic aquaculture operations. However, it is not known whether pesticides or drugs used to treat sea lice on farmed salmon, such as emamectin benzoate (EB), would adversely affect cultured or wild worms, because these compounds may persist in the environment. To determine the potential effects of EB to N. virens, bioassays were performed wherein worms were exposed in sand for 30 days to a concentration of 400 µg/kg dw (nominal). While no treatment-related mortality occurred, significant decreases in worm mass and marked behavioral changes (lack of burrowing) were observed in EB-treated sand compared with controls. These lab-based observations suggest a potential hazard to worms at sites where EB treatments have occurred.

  1. Evidence for changes in the transcription levels of two putative P-glycoprotein genes in sea lice (Lepeophtheirus salmonis) in response to emamectin benzoate exposure.

    Science.gov (United States)

    Tribble, Nicholas D; Burka, John F; Kibenge, Frederick S B

    2007-05-01

    Overexpression of P-glycoproteins (Pgps) is assumed to be a principal mechanism of resistance of nematodes and arthropods to macrocyclic lactones. Quantitative RT-PCR (Q-RT-PCR) was used to demonstrate changes in transcription levels of two putative P-glycoprotein genes, designated here as SL0525 and SL-Pgp1, in sea lice (Lepeophtheirus salmonis) following exposure to emamectin benzoate (EMB). Pre-adult L. salmonis were challenged in an EMB bioassay for 24h and gene expression was studied from lice surviving EMB concentrations of 0, 10, and 30ppb. Gene expression was measured using Q-RT-PCR with elongation factor 1 (eEF1alpha) as an internal reference gene. The results show that both target genes, SL0525 and SL-Pgp1, had significantly increased levels of expression with exposure to 10ppb EMB (p=0.11 and p=0.17, respectively) whereas the group exposed to 30ppb was on the verge of being significant (p=0.053) only in the expression of SL-Pgp1. Gene expression for SL0525 and SL-Pgp1 were increased over five-fold at 10ppb EMB. Therefore, the upregulation of these target genes may offer protection by increasing Pgp expression when lice are exposed to EMB. Our optimized Q-RT-PCR can be used to determine if over-expression of these genes could be the basis for development of resistance in sea lice and thus allow suitable alternative chemotherapeutic options to be assessed.

  2. Lice work

    DEFF Research Database (Denmark)

    Benali, Amira; Ren, Carina Bregnholm

    2018-01-01

    and Nepalese everyday life and show how these are deployed, contested and reconfigured onsite by volunteer tourism actors. By exploring patterns of absences and presences and using the concept of ontological choreography as an analytical resource, we show how the situated lice work of human and non...... at the orphanage. This post-human approach decenters the volunteer and destabilises the host and guest binary, while adding to our understanding of tourism practices as complex and materially distributed endeavours. We first analyse two configurations of head lice enacted through a Western morality of hygiene...

  3. Genotyping of human lice suggests multiple emergencies of body lice from local head louse populations.

    Directory of Open Access Journals (Sweden)

    Wenjun Li

    human populations may allow the formation of new populations of body lice, then head louse populations are potentially a greater threat to humans than previously assumed.

  4. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Science.gov (United States)

    Coll, Marta; Piroddi, Chiara; Steenbeek, Jeroen; Kaschner, Kristin; Ben Rais Lasram, Frida; Aguzzi, Jacopo; Ballesteros, Enric; Bianchi, Carlo Nike; Corbera, Jordi; Dailianis, Thanos; Danovaro, Roberto; Estrada, Marta; Froglia, Carlo; Galil, Bella S; Gasol, Josep M; Gertwagen, Ruthy; Gil, João; Guilhaumon, François; Kesner-Reyes, Kathleen; Kitsos, Miltiadis-Spyridon; Koukouras, Athanasios; Lampadariou, Nikolaos; Laxamana, Elijah; López-Fé de la Cuadra, Carlos M; Lotze, Heike K; Martin, Daniel; Mouillot, David; Oro, Daniel; Raicevich, Sasa; Rius-Barile, Josephine; Saiz-Salinas, Jose Ignacio; San Vicente, Carles; Somot, Samuel; Templado, José; Turon, Xavier; Vafidis, Dimitris; Villanueva, Roger; Voultsiadou, Eleni

    2010-08-02

    The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular, the Strait of

  5. The biodiversity of the Mediterranean Sea: estimates, patterns, and threats.

    Directory of Open Access Journals (Sweden)

    Marta Coll

    Full Text Available The Mediterranean Sea is a marine biodiversity hot spot. Here we combined an extensive literature analysis with expert opinions to update publicly available estimates of major taxa in this marine ecosystem and to revise and update several species lists. We also assessed overall spatial and temporal patterns of species diversity and identified major changes and threats. Our results listed approximately 17,000 marine species occurring in the Mediterranean Sea. However, our estimates of marine diversity are still incomplete as yet-undescribed species will be added in the future. Diversity for microbes is substantially underestimated, and the deep-sea areas and portions of the southern and eastern region are still poorly known. In addition, the invasion of alien species is a crucial factor that will continue to change the biodiversity of the Mediterranean, mainly in its eastern basin that can spread rapidly northwards and westwards due to the warming of the Mediterranean Sea. Spatial patterns showed a general decrease in biodiversity from northwestern to southeastern regions following a gradient of production, with some exceptions and caution due to gaps in our knowledge of the biota along the southern and eastern rims. Biodiversity was also generally higher in coastal areas and continental shelves, and decreases with depth. Temporal trends indicated that overexploitation and habitat loss have been the main human drivers of historical changes in biodiversity. At present, habitat loss and degradation, followed by fishing impacts, pollution, climate change, eutrophication, and the establishment of alien species are the most important threats and affect the greatest number of taxonomic groups. All these impacts are expected to grow in importance in the future, especially climate change and habitat degradation. The spatial identification of hot spots highlighted the ecological importance of most of the western Mediterranean shelves (and in particular

  6. Repeated sublethal exposures to the sea lice pesticide Salmosan® (azamethiphos) on adult male lobsters (Homarus americanus) causes neuromuscular dysfunction, hypoxia, metabolic disturbances and mortality.

    Science.gov (United States)

    Dounia, Daoud; Andrea, Battison; Lefort, Natalie; Van Geest, Jordana Lynne

    2016-12-01

    In Atlantic Canada and other salmon-growing regions, treatment of sea lice infestations in salmon aquaculture is necessary to protect fish health. The product Salmosan®, which contains the organophosphate azamethiphos as the active ingredient, is a pesticide presently used for treatment against sea lice. It is applied as a bath treatment and then released into the surrounding seawater. The potential for lethality to non-target species following acute and chronic exposures to Salmosan® has been studied over the past decade, however, the potential for sublethal effects on lobsters remains a concern. Adult male lobsters were exposed to 0.06, 0.5, and 5µgL -1 azamethiphos for one hour, repeated five times, over 48h. Lobsters were assessed immediately after exposure and over six days of recovery. Inhibition of muscle cholinesterase activity was detected in lobsters exposed to 0.5 and 5µgL -1 azamethiphos. The 5µgL -1 dose was considered lethal (93% cumulative mortality). Significant changes in hemolymph plasma biochemistry were most apparent in the 5µgL -1 exposure group in the immediate post-exposure samples. Citrate synthase activity was significantly lower in muscles of the 0.5µgL -1 exposure group compared to control lobsters. Mean electron transport system and standard metabolic rates tended to be lower in muscle tissue of the 0.5µgL -1 exposure group than control group lobsters. These results suggest that sublethal effects on lobster energetics may occur under laboratory exposure conditions (i.e., concentrations and duration) considered environmentally relevant, which could result in impairment under natural conditions. Copyright © 2016 Elsevier Inc. All rights reserved.

  7. Identifying salmon lice transmission characteristics between Faroese salmon farms

    DEFF Research Database (Denmark)

    Kragesteen, Trondur J.; Simonsen, Knud; Visser, AW

    2018-01-01

    Sea lice infestations are an increasing challenge in the ever-growing salmon aquaculture sector and cause large economic losses. The high salmon production in a small area creates a perfect habitat for parasites. Knowledge of how salmon lice planktonic larvae disperse and spread the infection...... between farms is of vital importance in developing treatment management plans to combat salmon lice infestations. Using a particle tracking model forced by tidal currents, we show that Faroese aquaculture farms form a complex network. In some cases as high as 10% of infectious salmon lice released at one...... for the entire Faroese salmon industry...

  8. Body Lice Frequently Asked Questions (FAQs)

    Science.gov (United States)

    ... diagnosed? How are body lice treated? What are body lice? Body lice are parasitic insects that live ... to freshly laundered clothing and bedding. What do body lice look like? Body lice have three forms: ...

  9. Salmon lice – impact on wild salmonids and salmon aquaculture

    Science.gov (United States)

    Torrissen, O; Jones, S; Asche, F; Guttormsen, A; Skilbrei, O T; Nilsen, F; Horsberg, T E; Jackson, D

    2013-01-01

    Salmon lice, Lepeophtheirus salmonis, are naturally occurring parasites of salmon in sea water. Intensive salmon farming provides better conditions for parasite growth and transmission compared with natural conditions, creating problems for both the salmon farming industry and, under certain conditions, wild salmonids. Salmon lice originating from farms negatively impact wild stocks of salmonids, although the extent of the impact is a matter of debate. Estimates from Ireland and Norway indicate an odds ratio of 1.1:1-1.2:1 for sea lice treated Atlantic salmon smolt to survive sea migration compared to untreated smolts. This is considered to have a moderate population regulatory effect. The development of resistance against drugs most commonly used to treat salmon lice is a serious concern for both wild and farmed fish. Several large initiatives have been taken to encourage the development of new strategies, such as vaccines and novel drugs, for the treatment or removal of salmon lice from farmed fish. The newly sequenced salmon louse genome will be an important tool in this work. The use of cleaner fish has emerged as a robust method for controlling salmon lice, and aquaculture production of wrasse is important towards this aim. Salmon lice have large economic consequences for the salmon industry, both as direct costs for the prevention and treatment, but also indirectly through negative public opinion. PMID:23311858

  10. Using expert opinion surveys to rank threats to endangered species: a case study with sea turtles.

    Science.gov (United States)

    Donlan, C Josh; Wingfield, Dana K; Crowder, Larry B; Wilcox, Chris

    2010-12-01

    Little is known about how specific anthropogenic hazards affect the biology of organisms. Quantifying the effect of regional hazards is particularly challenging for species such as sea turtles because they are migratory, difficult to study, long lived, and face multiple anthropogenic threats. Expert elicitation, a technique used to synthesize opinions of experts while assessing uncertainty around those views, has been in use for several decades in the social science and risk assessment sectors. We conducted an internet-based survey to quantify expert opinion on the relative magnitude of anthropogenic hazards to sea turtle populations at the regional level. Fisheries bycatch and coastal development were most often ranked as the top hazards to sea turtle species in a geographic region. Nest predation and direct take followed as the second and third greatest threats, respectively. Survey results suggest most experts believe sea turtles are threatened by multiple factors, including substantial at-sea threats such as fisheries bycatch. Resources invested by the sea turtle community, however, appear biased toward terrestrial-based impacts. Results from the survey are useful for conservation planning because they provide estimates of relative impacts of hazards on sea turtles and a measure of consensus on the magnitude of those impacts among researchers and practitioners. Our survey results also revealed patterns of expert bias, which we controlled for in our analysis. Respondents with no experience with respect to a sea turtle species tended to rank hazards affecting that sea turtle species higher than respondents with experience. A more-striking pattern was with hazard-based expertise: the more experience a respondent had with a specific hazard, the higher the respondent scored the impact of that hazard on sea turtle populations. Bias-controlled expert opinion surveys focused on threatened species and their hazards can help guide and expedite species recovery plans.

  11. Body Lice Prevention and Control

    Science.gov (United States)

    ... and General Public. Contact Us Parasites Home Prevention & Control Recommend on Facebook Tweet Share Compartir Body lice ... that can be taken to help prevent and control the spread of body lice: Bathe regularly and ...

  12. Physiological effects of simultaneous, abrupt seawater entry and sea lice (Lepeophtheirus salmonis) infestation of wild, sea-run brown trout (Salmo trutta) smolts

    NARCIS (Netherlands)

    Wells, A.; Grierson, C.E.; MacKenzie, M.A.; Russon, I.; Middlemiss, C.; Bjorn, P.A.; Finstad, B.; Wendelaar Bonga, S.E.; Todd, C.D.; Hazon, N.

    2006-01-01

    For wild, sea-run brown trout (Salmo trutta) smolts, the physiological consequences of abrupt transfer to seawater and simultaneous challenge with copepodid larvae of the sea louse, Lepeophtheirus salmonis (Kr�yer, 1837), were investigated in the laboratory. Analysis of osmoregulatory, metabolic,

  13. Why infest the loved ones--inherent human behaviour indicates former mutualism with head lice.

    Science.gov (United States)

    Rózsa, Lajos; Apari, Péter

    2012-05-01

    Head lice transmit to new hosts when people lean their heads together. Humans frequently touch their heads to express friendship or love, while this behaviour is absent in apes. We hypothesize that this behaviour was adaptive because it enabled people to acquire head lice infestations as early as possible to provoke an immune response effective against both head lice and body lice throughout the subsequent periods of their life. This cross-immunity could provide some defence against the body-louse-borne lethal diseases like epidemic typhus, trench fever, relapsing fever and the classical plague. Thus the human 'touching heads' behaviour probably acts as an inherent and unconscious 'vaccination' against body lice to reduce the threat exposed by the pathogens they may transmit. Recently, the eradication of body-louse-borne diseases rendered the transmission of head lice a maladaptive, though still widespread, behaviour in developed societies.

  14. Size as indicator of origin of salmon lice Lepeophtheirus salmonis (Copepoda: Caligidae)

    NARCIS (Netherlands)

    Nordhagen, J.R.; Heuch, P.A.; Schram, T.A.

    2000-01-01

    Salmon lice Lepeophtheirus salmonis (Krøyer, 1837) from farmed Atlantic salmon have been implicated in the drastic sea trout and salmon stock declines found in Ireland and Norway. Can salmon lice from farmed and wild fish be distinguished? The hypothesis has been advanced that the treatment of

  15. Apes, lice and prehistory.

    Science.gov (United States)

    Weiss, Robin A

    2009-01-01

    Although most epidemic human infectious diseases are caused by recently introduced pathogens, cospeciation of parasite and host is commonplace for endemic infections. Occasional host infidelity, however, provides the endemic parasite with an opportunity to survive the potential extinction of its host. Such infidelity may account for the survival of certain types of human lice, and it is currently exemplified by viruses such as HIV.

  16. Barents Sea polar bears (Ursus maritimus: population biology and anthropogenic threats

    Directory of Open Access Journals (Sweden)

    Magnus Andersen

    2016-07-01

    Full Text Available This paper examines how anthropogenic threats, such as disturbance, pollution and climate change, are linked to polar bear (Ursus maritimus population biology in the Svalbard and Barents Sea area, with the aim to increase our understanding of how human activity may impact the population. Overharvesting drastically reduced the population of polar bears in the Barents Sea region from about 1870 to 1970. After harvesting was stopped—in 1956 in Russia and 1973 in Norway—the population grew to an estimated 2650 individuals (95% confidence interval 1900–3600 in 2004, and maternity denning in the Svalbard Archipelago became more widely distributed. During recent decades, the population has faced challenges from a variety of new anthropogenic impacts: a range of pollutants, an increasing level of human presence and activity as well as changes in ice conditions. Contaminants bioaccumulate up through the marine food web, culminating in this top predator that consumes ringed, bearded and harp seals. Females with small cubs use land-fast sea ice for hunting and are therefore vulnerable to disturbance by snowmobile drivers. Sea-ice diminution, associated with climate change, reduces polar bears’ access to denning areas and could negatively affect the survival of cubs. There are clear linkages between population biology and current anthropogenic threats, and we suggest that future research and management should focus on and take into consideration the combined effects of several stressors on polar bears.

  17. Migratory routes and at-sea threats to Pink-footed Shearwaters

    Science.gov (United States)

    Adams, Josh; Felis, Jonathan J.; Hodum, Peter; Colodro, Valentina; Carle, Ryan; López, Verónica

    2016-01-01

    The Pink-footed Shearwater (Ardenna creatopus) is a seabird with a breeding range restricted to three islands in Chile and an estimated world population of approximately 56,000 breeding individuals (Muñoz 2011, Oikonos unpublished data). Due to multiple threats on breeding colonies and at-sea, Pink-footed Shearwaters are listed as Endangered by the government of Chile (Reglamento de Clasificación de Especies, 2011), Threatened by the government of Canada (Environment Canada 2008), and are listed under Appendix 1 of the Agreement on the Conservation of Albatrosses and Petrels (ACAP 2013). A principal conservation concern for the species is mortality from fisheries bycatch during the breeding and non-breeding seasons; thus, identification of areas of overlap between at-sea use by Pink-footed Shearwaters and fisheries is a high priority conservation objective (Hinojosa Sáez and Hodum 1997, Mangel et al. 2013, ACAP 2013). During the non-breeding period, Pink-footed Shearwaters range as far north as Canada, although little was known until recently about migration routes and important wintering areas where fisheries bycatch could be a risk. Additionally, Pink-footed Shearwaters face at-sea threats during the non-breeding season off the west coast of North America. Recently, areas used by wintering Pink-footed Shearwaters have been identified as areas of interest for developing alternative energy offshore in North America (e.g., floating wind generators; Trident Winds 2016). The goal of our study was to track Pink-footed Shearwater post-breeding movements with satellite tags to identify timing and routes of migration, locate important non-breeding foraging habitats, and determine population distribution among different wintering regions.

  18. Head Lice: Prevention and Control

    Science.gov (United States)

    ... and General Public. Contact Us Parasites Home Prevention & Control Language: English (US) Español (Spanish) Recommend on Facebook ... that can be taken to help prevent and control the spread of head lice: Avoid head-to- ...

  19. The threat from sea and land. Regional report 2: the Bay of Bengal.

    Science.gov (United States)

    1994-01-01

    This article reports on the environmental threat caused by the Bay of Bengal on the economic situation in Bangladesh and India. More than four-fifths of Bangladesh amount to an extended delta at the confluence of one of the largest river systems in the world, comprising the Ganges, Brahmaputra, and Meghna. In the Brahmaputra watershed, the rate of deforestation caused soil erosion in the Himalayas is five times as much as in the geological past. This sediment loading is often considered to be a prime factor in downstream flooding. Because of this, Bangladesh agriculture products were damaged, which led to economic instability. Furthermore, as a result of the combined impacts of population growth, poverty, no land, and inadequate food supplies, many migrated into the neighboring Indian areas. Moreover, the susceptibility of the Bay of Bengal to cyclones has caused a great number of deaths leaving millions of people homeless. Cyclone episodes are expected to be more frequent as global warming continues. Furthermore, Bangladesh was estimated to be only 5 meters above sea level, which is considered vulnerable to sea level rise. On top of these problems, trouble from the other side of Bangladesh was also predicted with the combined outflow of the Ganges, Brahmaputra, and Meghna leading to more national damage.

  20. The current threat level of fish in river network of individual sea-drainage areas in the Czech Republic

    Directory of Open Access Journals (Sweden)

    Lusk Stanislav

    2015-12-01

    Full Text Available The assessment of changes in the population spread of individual ichthyofauna species (lampreys and fishes as well as the identification of unfavourable impacts is the necessary prerequisite for the correct selection of corrective measures. The river network in the Czech Republic belongs to the three sea-drainage areas (North Sea, Baltic Sea, and Black Sea. The species composition of the original ichthyofauna and the extent of the threat to some species differs in the individual sea-drainage areas. The original ichthyofauna in the Czech Republic consists of 4 lamprey species and 55 fish species. Out of this, only one lamprey species and 31 fish species originate in all three sea-drainage areas. There are 37 fish species considered as the original ones in the North Sea drainage area, there of 4 species are EX, 1 species EW, and 11 species (29.7% are threatened. In the Baltic Sea drainage area, there are 4 species EX, 1 species EW, and 8 species (22.8% threatened out of the total 35 assessed species. Out of 49 species in the Black Sea drainage area, there are 4 species EX and 23 species (46.9 % threatened.

  1. A vulnerability assessment of 300 species in Florida: threats from sea level rise, land use, and climate change.

    Directory of Open Access Journals (Sweden)

    Joshua Steven Reece

    Full Text Available Species face many threats, including accelerated climate change, sea level rise, and conversion and degradation of habitat from human land uses. Vulnerability assessments and prioritization protocols have been proposed to assess these threats, often in combination with information such as species rarity; ecological, evolutionary or economic value; and likelihood of success. Nevertheless, few vulnerability assessments or prioritization protocols simultaneously account for multiple threats or conservation values. We applied a novel vulnerability assessment tool, the Standardized Index of Vulnerability and Value, to assess the conservation priority of 300 species of plants and animals in Florida given projections of climate change, human land-use patterns, and sea level rise by the year 2100. We account for multiple sources of uncertainty and prioritize species under five different systems of value, ranging from a primary emphasis on vulnerability to threats to an emphasis on metrics of conservation value such as phylogenetic distinctiveness. Our results reveal remarkable consistency in the prioritization of species across different conservation value systems. Species of high priority include the Miami blue butterfly (Cyclargus thomasi bethunebakeri, Key tree cactus (Pilosocereus robinii, Florida duskywing butterfly (Ephyriades brunnea floridensis, and Key deer (Odocoileus virginianus clavium. We also identify sources of uncertainty and the types of life history information consistently missing across taxonomic groups. This study characterizes the vulnerabilities to major threats of a broad swath of Florida's biodiversity and provides a system for prioritizing conservation efforts that is quantitative, flexible, and free from hidden value judgments.

  2. Navigational threats by derelict fishing gear to navy ships in the Korean seas.

    Science.gov (United States)

    Hong, Sunwook; Lee, Jongmyoung; Lim, Sehan

    2017-06-30

    This study assessed the impact of derelict fishing gear (DFG) on navigation. The Republic of Korea's navy (ROKN) recorded every case of approximately 170 naval ships associated with propeller entanglement by DFG from January 2010 to December 2015. The frequency of cases was 2.3 per ship and 397.7 (±37.5) per year. The amount of DFG disentangled was 0.025tons per ship and 10.0 (±1.7) tons per year. The frequency temporally decreased whereas the amount increased over these six years. To disentangle propellers, 3.1 divers were needed on average per case. Propeller entanglement occurred in all local seas and some of these areas showed increases over time. Our study highlights that the impact of DFG on navigational threats has been persistent and ubiquitous and can potentially be reduced by preventing DFG in fishing areas, with a focus on improved management by fishermen and government and with more efficient retrieval of DFG. Copyright © 2017. Published by Elsevier Ltd.

  3. September 1975 Lice, Turkey Images

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — Eastern Turkey. A magnitude 6.7 earthquake that struck the Turkish district of Lice at 12:20 local time (09:20 UTC) on September 6, 1975, killing 2,311 people. The...

  4. Lice Aren't So Nice

    Science.gov (United States)

    ... it's a good idea for an adult to wash all your bedding, hats, clothing, and stuffed animals in hot water. Or he or she can seal these things in airtight bags for 10 days. That also will kill the lice and their eggs. Vacuuming the carpets, upholstery, and car seats will take care of any lice that ...

  5. High Ancient Genetic Diversity of Human Lice, Pediculus humanus, from Israel Reveals New Insights into the Origin of Clade B Lice.

    Science.gov (United States)

    Amanzougaghene, Nadia; Mumcuoglu, Kosta Y; Fenollar, Florence; Alfi, Shir; Yesilyurt, Gonca; Raoult, Didier; Mediannikov, Oleg

    2016-01-01

    The human head louse, Pediculus humanus capitis, is subdivided into several significantly divergent mitochondrial haplogroups, each with particular geographical distributions. Historically, they are among the oldest human parasites, representing an excellent marker for tracking older events in human evolutionary history. In this study, ancient DNA analysis using real-time polymerase chain reaction (qPCR), combined with conventional PCR, was applied to the remains of twenty-four ancient head lice and their eggs from the Roman period which were recovered from Israel. The lice and eggs were found in three combs, one of which was recovered from archaeological excavations in the Hatzeva area of the Judean desert, and two of which found in Moa, in the Arava region, close to the Dead Sea. Results show that the head lice remains dating approximately to 2,000 years old have a cytb haplogroup A, which is worldwide in distribution, and haplogroup B, which has thus far only been found in contemporary lice from America, Europe, Australia and, most recently, Africa. More specifically, this haplogroup B has a B36 haplotype, the most common among B haplogroups, and has been present in America for at least 4,000 years. The present findings confirm that clade B lice existed, at least in the Middle East, prior to contacts between Native Americans and Europeans. These results support a Middle Eastern origin for clade B followed by its introduction into the New World with the early peoples. Lastly, the presence of Acinetobacter baumannii DNA was demonstrated by qPCR and sequencing in four head lice remains belonging to clade A.

  6. Management and Treatment of Human Lice

    Directory of Open Access Journals (Sweden)

    Abdoul Karim Sangaré

    2016-01-01

    Full Text Available Of the three lice (head, body, and pubic louse that infest humans, the body louse is the species involved in epidemics of louse-borne typhus, trench fever, and relapsing fever, but all the three cause pediculosis. Their infestations occur today in many countries despite great efforts to maintain high standards of public health. In this review, literature searches were performed through PubMed, Medline, Google Scholar, and EBSCOhost, with key search words of “Pediculus humanus”, “lice infestation”, “pediculosis”, and “treatment”; and controlled clinical trials were viewed with great interest. Removing lice by hand or with a lice comb, heating infested clothing, and shaving the scalp were some of the oldest methods of controlling human lice. Despite the introduction of other resources including cresol, naphthalene, sulfur, mercury, vinegar, petroleum, and insecticides, the numbers of lice infestation cases and resistance have increased. To date, viable alternative treatments to replace insecticides have been developed experimentally in vitro. Today, the development of new treatment strategies such as symbiotic treatment and synergistic treatment (antibiotics + ivermectin in vitro has proved effective and is promising. Here, we present an overview on managing and treating human lice and highlight new strategies to more effectively fight pediculosis and prevent resistance.

  7. Head Lice: Malathion Frequently Asked Questions

    Science.gov (United States)

    ... be checked for signs of infestation. Does malathion kill head lice eggs? Yes. The malathion lotion (Ovide*) ... Privacy FOIA No Fear Act OIG 1600 Clifton Road Atlanta , GA 30329-4027 USA 800-CDC-INFO ( ...

  8. Pubic "Crab" Lice Prevention and Control

    Science.gov (United States)

    ... and General Public. Contact Us Parasites Home Prevention & Control Recommend on Facebook Tweet Share Compartir Pubic ("crab") ... that can be taken to help prevent and control the spread of pubic ("crab") lice: All sexual ...

  9. Primates, Lice and Bacteria: Speciation and Genome Evolution in the Symbionts of Hominid Lice.

    Science.gov (United States)

    Boyd, Bret M; Allen, Julie M; Nguyen, Nam-Phuong; Vachaspati, Pranjal; Quicksall, Zachary S; Warnow, Tandy; Mugisha, Lawrence; Johnson, Kevin P; Reed, David L

    2017-07-01

    Insects with restricted diets rely on symbiotic bacteria to provide essential metabolites missing in their diet. The blood-sucking lice are obligate, host-specific parasites of mammals and are themselves host to symbiotic bacteria. In human lice, these bacterial symbionts supply the lice with B-vitamins. Here, we sequenced the genomes of symbiotic and heritable bacterial of human, chimpanzee, gorilla, and monkey lice and used phylogenomics to investigate their evolutionary relationships. We find that these symbionts have a phylogenetic history reflecting the louse phylogeny, a finding contrary to previous reports of symbiont replacement. Examination of the highly reduced symbiont genomes (0.53-0.57 Mb) reveals much of the genomes are dedicated to vitamin synthesis. This is unchanged in the smallest symbiont genome and one that appears to have been reorganized. Specifically, symbionts from human lice, chimpanzee lice, and gorilla lice carry a small plasmid that encodes synthesis of vitamin B5, a vitamin critical to the bacteria-louse symbiosis. This plasmid is absent in an old world monkey louse symbiont, where this pathway is on its primary chromosome. This suggests the unique genomic configuration brought about by the plasmid is not essential for symbiosis, but once obtained, it has persisted for up to 25 My. We also find evidence that human, chimpanzee, and gorilla louse endosymbionts have lost a pathway for synthesis of vitamin B1, whereas the monkey louse symbiont has retained this pathway. It is unclear whether these changes are adaptive, but they may point to evolutionary responses of louse symbionts to shifts in primate biology. © The Author 2017. Published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution.

  10. Lice infesting horses in three agroecological zones in central Oromia.

    Science.gov (United States)

    Tafese, Adane; Jibat, Tariku; Aklilu, Nigatu; Zewdu, Hanna; Kumsa, Bersissa

    2014-12-01

    A cross-sectional study was conducted to determine the prevalence and species composition of lice infesting horses in three agroecological zones in seven different districts in central Oromia from November 2011 to April 2012. For this purpose, a total of 420 horses were thoroughly examined for presence of lice. Collected lice were identified to species level under a microscope. The study showed an overall prevalence of 28.8 % (121/420) lice infestation on horses. We identified two spp. of lice on horses namely, Bovicola (Werneckiella) equi and Haematopinus asini with an overall prevalence of 22.9 % (96/420) and 5.9 % (25/420), respectively. The overall prevalence of lice infestation on horses in districts was 48.3, 43.3, 33.3, 23.3, 21.7, 18.3 and 13.3 %, in Debre Brehan, Shashemene, Hawassa, Akaki, Adama, Modjo and Bishoftu, respectively. B. equi was encountered as the predominant species on horses in all districts. Higher overall prevalence of lice infestation was recorded in highland agroecology than mid and lowland agroecological zones. Similarly, our study revealed significantly higher overall prevalence of lice on saddle horses than on cart horses. In view of the findings of the present study two species of lice are responsible for health and welfare problems of horses in all the districts. Detailed epidemiological studies on the significance, prevalence and role of lice as vectors of zoonotic pathogens in different agroecological zones, breeds and management systems warrant urgent attention. Animal owners and veterinarians should consider lice control in horses as part of the ectoparasite control in other species of animals.

  11. Fleas and lice of mammals in New Mexico

    Science.gov (United States)

    Paulette L. Ford; Richard A. Fagerlund; Donald W. Duszynski; Paul J. Polechla

    2004-01-01

    All available records are compiled for three orders of ectoparasites of mammals in New Mexico: fleas (Siphonaptera), sucking lice (Anoplura), and chewing lice (Mallophaga). We have drawn from records at the University of New Mexico's Museum of Southwestern Biology, the Vector Control Program of the New Mexico Environment Department, the Environmental Health...

  12. Effects of salmon lice infection and salmon lice protection on fjord migrating Atlantic salmon and brown trout post-smolts

    DEFF Research Database (Denmark)

    Sivertsgard, Rolf; Thorstad, Eva B.; Okland, Finn

    2007-01-01

    Effects of artificial salmon lice infection and pharmaceutical salmon lice prophylaxis on survival and rate of progression of Atlantic salmon (n = 72) and brown trout post-smolts (n = 72) during their fjord migration, were studied by telemetry. The infected groups were artificially exposed...... to infective salmon lice larvae in the laboratory immediately before release in the inner part of the fjord to simulate a naturally high infection pressure. Groups of infected Atlantic salmon (n = 20) and brown trout (n = 12) were also retained in the hatchery to control the infection intensity and lice...... development during the study period. Neither salmon lice infection nor pharmaceutical prophylaxis had any effects on survival and rate of progression of fjord migrating Atlantic salmon post-smolts compared to control fish. Atlantic salmon spent on average only 151.2 h (maximum 207.3 h) in passing the 80 km...

  13. Chewing lice (Insecta: Phthiraptera) associated with vertebrates in Mexico.

    Science.gov (United States)

    SÁnchez-Montes, Sokani; Colunga-Salas, Pablo; Álvarez-Castillo, LucÍa; GuzmÁn-Cornejo, Carmen; Montiel-Parra, Griselda

    2018-01-15

    The chewing lice (Insecta: Phthiraptera: Amblycera and Ischnocera) of Mexico have been little studied and many publications include isolated records. This paper summarizes current knowledge of chewing lice recorded from Mexico resulting from an exhaustive search of the literature published from 1866 to 2017. We found 342 louse species associated with 206 bird and 28 mammal species. As a result, we provide a checklist of the chewing lice recorded from Mexico, including a host-parasite list and their geographical distribution within the country.

  14. Kiel Canal: Past and future threats for shipping resulting from precipitation, wind surge and sea level rise

    Science.gov (United States)

    Ganske, Anette; Hüttl-Kabus, Sabine; Möller, Jens; Schade, Nils; Heinrich, Hartmut; Tinz, Birger

    2017-04-01

    The Kiel Canal is the most frequented artificial waterway in the world. It connects the North Sea and the Hamburg Harbor with the Baltic Sea and has a length of about 100 km. The Canal receives its water from the upper catchment of the river Eider. Discharge from the Canal towards the North Sea is via the sluices at Brunsbüttel (90%) into river Elbe and into the Baltic Sea via the sluices at Kiel-Holtenau. A risk of closure of the Canal occurs when high precipitation in the catchment meets high water levels in the river Elbe and/or the Baltic preventing the discharge of excess Canal water. Future sea level rise jointly with other effects such as possibly increasing wind surge and precipitation will close the gap between the inner and outer water levels, so that someday the outside levels will surmount the inner one. The German Federal Ministry of Transport and Digital Infrastructure (BMVI) tasked its internal Network of Experts to run a case study on the evolution of critical water levels in order to estimate risks and vulnerabilities for adaptation measures. First step of the investigation is a search for factors or combination of factors responsible for closures in the past. Candidates are factors such as higher water levels at low tides, high precipitation events on land, soil moisture and human factors like preventive water management measures. Second step will be the search for the natural criteria in climate projections. Here we report on the results of the first step of the case study with a focus on the exit towards the North Sea. There, discharge is possible only during low tide. Presently still sufficient difference in height exists between the levels in the Canal and the river Elbe allowing for a free flow of excess Canal water. Shipping is ceased when levels in the Canal surpass safety limits due to high precipitation events in the catchment jointly with high outer water levels. We used atmospheric data from ERA-Interim reanalysis instead of gauge data

  15. Evidence that head and body lice on homeless persons have the same genotype.

    Directory of Open Access Journals (Sweden)

    Aurélie Veracx

    Full Text Available Human head lice and body lice are morphologically and biologically similar but have distinct ecologies. They were shown to have almost the same basic genetic content (one gene is absent in head lice, but differentially express certain genes, presumably responsible for the vector competence. They are now believed to be ecotypes of the same species (Pediculus humanus and based on mitochondrial studies, body lice have been included with head lice in one of three clades of human head lice (Clade A. Here, we tested whether head and body lice collected from the same host belong to the same population by examining highly polymorphic intergenic spacers. This study was performed on lice collected from five homeless persons living in the same shelter in which Clade A lice are prevalent. Lice were individually genotyped at four spacer loci. The genetic identity and diversity of lice from head and body populations were compared for each homeless person. Population genetic structure was tested between lice from the two body regions and between the lice from different host individuals.We found two pairs of head and body lice on the same homeless person with identical multi locus genotypes. No difference in genetic diversity was found between head and body louse populations and no evidence of significant structure between the louse populations was found, even after controlling for a possible effect of the host individual. More surprisingly, no structure was obvious between lice of different homeless persons.We believe that the head and body lice collected from our five subjects belong to the same population and are shared between people living in the same shelter. These findings confirm that head and body lice are two ecotypes of the same species and show the importance of implementing measures to prevent lice transmission between homeless people in shelters.

  16. Talk About Nitpicking! Back-to-School and Head Lice

    Centers for Disease Control (CDC) Podcasts

    2008-05-30

    Head lice are a fairly common problem, especially in preschool and elementary school children. This podcast will help you understand how people get head lice, and how to get rid of them!  Created: 5/30/2008 by National Center for Zoonotic, Vector-Borne, and Enteric Diseases (NCZVED), Division of Parasitic Diseases (DPD).   Date Released: 8/4/2008.

  17. Talk About Nitpicking! Summer Camp and Head Lice

    Centers for Disease Control (CDC) Podcasts

    2008-05-30

    Head lice are a fairly common problem, especially in preschool and elementary school children. This podcast will help you understand how people get head lice, and how to get rid of them!  Created: 5/30/2008 by National Center for Zoonotic, Vector-Borne, and Enteric Diseases (NCZVED), Division of Parasitic Diseases (DPD).   Date Released: 6/4/2008.

  18. Distribution of chewing lice upon the polygynous peacock Pavo cristatus.

    Science.gov (United States)

    Stewart, I R; Clark, F; Petrie, M

    1996-04-01

    An opportunistic survey of louse distribution upon the peacock Pavo cristatus was undertaken following a cull of 23 birds from an English zoo. After complete skin and feather dissolution, 2 species of lice were retrieved, Goniodes pavonis and Amyrsidea minuta. The distribution of both louse species could be described by a negative binomial model. The significance of this is discussed in relation to transmission dynamics of lice in the atypical avian mating system found in the peacock, which involves no male parental care.

  19. Salmon lice (Lepeophtheirus salmonis) showing varying emamectin benzoate susceptibilities differ in neuronal acetylcholine receptor and GABA-gated chloride channel mRNA expression.

    Science.gov (United States)

    Carmichael, Stephen N; Bron, James E; Taggart, John B; Ireland, Jacqueline H; Bekaert, Michaël; Burgess, Stewart Tg; Skuce, Philip J; Nisbet, Alasdair J; Gharbi, Karim; Sturm, Armin

    2013-06-18

    Caligid copepods, also called sea lice, are fish ectoparasites, some species of which cause significant problems in the mariculture of salmon, where the annual cost of infection is in excess of €300 million globally. At present, caligid control on farms is mainly achieved using medicinal treatments. However, the continued use of a restricted number of medicine actives potentially favours the development of drug resistance. Here, we report transcriptional changes in a laboratory strain of the caligid Lepeophtheirus salmonis (Krøyer, 1837) that is moderately (~7-fold) resistant to the avermectin compound emamectin benzoate (EMB), a component of the anti-salmon louse agent SLICE® (Merck Animal Health). Suppression subtractive hybridisation (SSH) was used to enrich transcripts differentially expressed between EMB-resistant (PT) and drug-susceptible (S) laboratory strains of L. salmonis. SSH libraries were subjected to 454 sequencing. Further L. salmonis transcript sequences were available as expressed sequence tags (EST) from GenBank. Contiguous sequences were generated from both SSH and EST sequences and annotated. Transcriptional responses in PT and S salmon lice were investigated using custom 15 K oligonucleotide microarrays designed using the above sequence resources. In the absence of EMB exposure, 359 targets differed in transcript abundance between the two strains, these genes being enriched for functions such as calcium ion binding, chitin metabolism and muscle structure. γ-aminobutyric acid (GABA)-gated chloride channel (GABA-Cl) and neuronal acetylcholine receptor (nAChR) subunits showed significantly lower transcript levels in PT lice compared to S lice. Using RT-qPCR, the decrease in mRNA levels was estimated at ~1.4-fold for GABA-Cl and ~2.8-fold for nAChR. Salmon lice from the PT strain showed few transcriptional responses following acute exposure (1 or 3 h) to 200 μg L-1 of EMB, a drug concentration tolerated by PT lice, but toxic for S lice

  20. Use of scanning electron microscopy to confirm the identity of lice infesting communally grazed goat herds

    OpenAIRE

    P.J. Sebei; C.M.E. McCrindle; E.D. Green; M.L. Turner

    2004-01-01

    Lice have been described on goats in commercial farming systems in South Africa but not from flocks on communal grazing. During a longitudinal survey on the causes of goat kid mortality, conducted in Jericho district, North West Province, lice were collected from communally grazed indigenous goats. These lice were prepared for and viewed by scanning electron microscopy, and micromorphological taxonomic details are described. Three species of lice were found in the study area and identif...

  1. Acute prurigo simplex in humans caused by pigeon lice.

    Science.gov (United States)

    Stolf, Hamilton Ometto; Reis, Rejane d'Ávila; Espósito, Ana Cláudia Cavalcante; Haddad Júnior, Vidal

    2018-03-01

    Pigeon lice are insects that feed on feathers of these birds; their life cycle includes egg, nymph and adult and they may cause dermatoses in humans. Four persons of the same family, living in an urban area, presented with widespread intensely pruritic erythematous papules. A great number of lice were seen in their house, which moved from a nest of pigeons located on the condenser of the air-conditioning to the dormitory of one of the patients. Even in urban environments, dermatitis caused by parasites of birds is a possibility in cases of acute prurigo simplex. Pigeon lice are possible etiological agents of this kind of skin eruption, although they are often neglected, even by dermatologists.

  2. Use of scanning electron microscopy to confirm the identity of lice infesting communally grazed goat herds

    Directory of Open Access Journals (Sweden)

    P.J. Sebei

    2004-11-01

    Full Text Available Lice have been described on goats in commercial farming systems in South Africa but not from flocks on communal grazing. During a longitudinal survey on the causes of goat kid mortality, conducted in Jericho district, North West Province, lice were collected from communally grazed indigenous goats. These lice were prepared for and viewed by scanning electron microscopy, and micromorphological taxonomic details are described. Three species of lice were found in the study area and identified as Bovicola caprae, Bovicola limbatus and Linognathus africanus. Sucking and biting lice were found in ten of the 12 herds of goats examined. Lice were found on both mature goats and kids. Bovicola caprae and L. africanus were the most common biting and sucking lice respectively in all herds examined. Scanning electron microscopy revealed additional features which aided in the identification of the louse species. Photomicrographs were more accurate aids to identification than the line drawings in the literature and facilitated identification using dissecting microscope.

  3. Use of scanning electron microscopy to confirm the identity of lice infesting communally grazed goat herds.

    Science.gov (United States)

    Sebei, P J; McCrindle, C M E; Green, E D; Turner, M L

    2004-06-01

    Lice have been described on goats in commercial farming systems in South Africa but not from flocks on communal grazing. During a longitudinal survey on the causes of goat kid mortality, conducted in Jericho district, North West Province, lice were collected from communally grazed indigenous goats. These lice were prepared for and viewed by scanning electron microscopy, and micro-morphological taxonomic details are described. Three species of lice were found in the study area and identified as Bovicola caprae, Bovicola limbatus and Linognathus africanus. Sucking and biting lice were found in ten of the 12 herds of goats examined. Lice were found on both mature goats and kids. Bovicola caprae and L. africanus were the most common biting and sucking lice respectively in all herds examined. Scanning electron microscopy revealed additional features which aided in the identification of the louse species. Photomicrographs were more accurate aids to identification than the line drawings in the literature and facilitated identification using dissecting microscope.

  4. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  5. Genetic recombination events between sympatric Clade A and Clade C lice in Africa.

    Science.gov (United States)

    Veracx, Aurélie; Boutellis, Amina; Raoult, Didier

    2013-09-01

    Human head and body lice have been classified into three phylogenetic clades (Clades A, B, and C) based on mitochondrial DNA. Based on nuclear markers (the 18S rRNA gene and the PM2 spacer), two genotypes of Clade A head and body lice, including one that is specifically African (Clade A2), have been described. In this study, we sequenced the PM2 spacer of Clade C head lice from Ethiopia and compared these sequences with sequences from previous works. Trees were drawn, and an analysis of genetic diversity based on the cytochrome b gene and the PM2 spacer was performed for African and non-African lice. In the tree drawn based on the PM2 spacer, the African and non-African lice formed separate clusters. However, Clade C lice from Ethiopia were placed within the African Clade A subcluster (Clade A2). This result suggests that recombination events have occurred between Clade A2 lice and Clade C lice, reflecting the sympatric nature of African lice. Finally, the PM2 spacer and cytochrome b gene sequences of human lice revealed a higher level of genetic diversity in Africa than in other regions.

  6. Chewing lice from wild birds in northern Greece.

    Science.gov (United States)

    Diakou, Anastasia; Pedroso Couto Soares, José Bernardo; Alivizatos, Haralambos; Panagiotopoulou, Maria; Kazantzidis, Savas; Literák, Ivan; Sychra, Oldřich

    2017-10-01

    Greece represents an important area for wild birds due to its geographical position and habitat diversity. Although the bird species in Greece are well recorded, the information about the chewing lice that infest them is practically non-existent. Thus, the aim of the present study was to record the species of lice infesting wild birds in northern Greece and furthermore, to associate the infestation prevalence with factors such as the age, sex, migration and social behaviour of the host as well as the time of the year. In total 729 birds, (belonging to 9 orders, 32 families and 68 species) were examined in 7 localities of northern Greece, during 9 ringing sessions from June 2013 until October 2015. Eighty (11%) of the birds were found to be infested with lice. In 31 different bird species, 560 specimens of lice, belonging to 33 species were recorded. Mixed infestations were recorded in 11 cases where birds were infested with 2-3 different lice species. Four new host-parasite associations were recorded i.e. Menacanthus curuccae from Acrocephalus melanopogon, Menacanthus agilis from Cettia cetti, Myrsidea sp. from Acrocephalus schoenobaenus, and Philopretus citrinellae from Spinus spinus. Moreover, Menacanthus sinuatus was detected on Poecile lugubris, rendering this report the first record of louse infestation in this bird species. The statistical analysis of the data collected showed no association between parasitological parameters (prevalence, mean and median intensity and mean abundance) in two different periods of the year (breeding vs post-breeding season). However, there was a statistically significant difference in the prevalence of infestation between a) migrating and sedentary passerine birds (7.4% vs 13.2%), b) colonial and territorial birds (54.5% vs 9.6%), and c) female and male birds in breeding period (2.6% vs 15.6%). Copyright © 2017. Published by Elsevier B.V.

  7. Chewing Lice of Swan Geese (Anser cygnoides): New Host-Parasite Associations

    DEFF Research Database (Denmark)

    Choi, Chang-Yong; Takekawa, John Y.; Prosser, Diann J.

    2016-01-01

    Chewing lice (Phthiraptera) that parasitize the globally threatened swan goose Anser cygnoides have been long recognized since the early 19th century, but those records were probably biased towards sampling of captive or domestic geese due to the small population size and limited distribution...... of its wild hosts. To better understand the lice species parasitizing swan geese that are endemic to East Asia, we collected chewing lice from 14 wild geese caught at 3 lakes in northeastern Mongolia. The lice were morphologically identified as 16 Trinoton anserinum (Fabricius, 1805), 11 Ornithobius...

  8. Ecomorphology of parasite attachment: experiments with feather lice.

    Science.gov (United States)

    Bush, Sarah E; Sohn, Edward; Clayton, Dale H

    2006-02-01

    The host specificity of some parasites can be reinforced by morphological specialization for attachment to mobile hosts. For example, ectoparasites with adaptations for attaching to hosts of a particular size might not be able to remain attached to larger or smaller hosts. This hypothesis is suggested by the positive correlation documented between the body sizes of many parasites and their hosts. We adopted an ecomorphological approach to test the attachment hypothesis. We tested the ability of host-specific feather lice (Phthiraptera: Ischnocera) to attach to 6 novel species of pigeons and doves that vary in size by nearly 2 orders of magnitude. Surprisingly, Rock Pigeon lice (Columbicola columbae) remained attached equally well to all 6 novel host species. We tested the relative importance of 3 factors that could facilitate louse attachment: whole-body insertion, tarsal claw use, and mandible use. Insertion, per se, was not necessary for attachment. However, insertion on coarse feathers of large hosts allowed lice to access feather barbules with their mandibles. Mandible use was a key component of attachment regardless of feather size. Attachment constraints do not appear to reinforce host specificity in this system.

  9. Inventory of lice of mammals and farmyard chicken in North-eastern Algeria.

    Science.gov (United States)

    Meguini, Mohamed Nadir; Righi, Souad; Zeroual, Fayçal; Saidani, Khelaf; Benakhla, Ahmed

    2018-03-01

    Lice are permanent ectoparasites, extremely specific to their hosts. Their great importance in veterinary medicine remain significant, they can cause their direct pathogenic actions like irritability, dermatitis, anemia, decreased weight gain, and milk production. The purpose of this work was to made the first time an inventory of mammalian lice in North-eastern Algeria. Our survey of lice infestation was conducted on several animal species from five provinces of North-eastern Algeria. A total of 57 cattle, 83 sheep, 77 goats, 111 wild boars, and 63 farmyard chickens were examined. The collection of lice was carried out much more in mammals and chickens during the winter period. Lice were collected either manually or using brushing and kept in flasks containing 70% ethanol. The identification of lice was achieved in the laboratory using a binocular loupe. Concerning cattle, 63% and 27% of those examined subjects from Souk-Ahras and Guelma study areas, respectively, were carriers of lice. Damalinia bovis was the louse most frequently found on cattle in these two regions. Three other species were identified in Souk-Ahras: Haematopinus eurysternus (25%), Linognathus vituli (10%), and Solenopotes capillatus (5%). Regarding sheep, 39% and 24% of examined animals in Souk-Ahras and Guelma, were carrying lice. Damalinia ovis was the most frequently encountered lice on sheep in both regions. Linognathus ovillus also was identified in Souk-Ahras, representing 0.3% of the collected lice. Concerning goats, 53% and 30% of examined animals in Souk-Ahras and Guelma, were parasitized of lice. Two species of lice were found: Damalinia caprae and Linognathus africanus . For farmyard chickens, 69% and 100% of the farmyard chicken in Souk-Ahras and Mila were parasitized by lice, respectively. Menopon gallinae was the most frequently encountered louse in farmyard chicken in both regions. Eight other species were identified in Mila and four other species only in Souk-Ahras. Finally, 25

  10. Threat to the seamen's health of the radioactive radiation from the phosphorus containing raw materials carried on board sea-going ships

    International Nuclear Information System (INIS)

    Pilawski, T.

    1988-01-01

    The results of preliminary studies on radiation hazards connected with the sea transport of phosphorites and phosphors are presented. The time dependent changes of dose rates are given. 2 figs., 3 refs. (A.S.)

  11. Development of eggs and the planktonic stages of salmon lice (Lepeophtheirus salmonis) at low temperatures

    NARCIS (Netherlands)

    Boxaspen, Karin; Næss, Tore

    2000-01-01

    To verify if and to what extent egg and nauplii development of the salmon lice take place during winter, the development from egg to the copepodid stage at 2,3,4,5 and 10°C was examined. Newly extruded egg strings from a winter population of salmon lice were individually placed in 6 ml stagnant

  12. Survey of Permethrin and Malathion Resistance in Human Head Lice Populations from Denmark

    DEFF Research Database (Denmark)

    Kristensen, Michael; Knorr, Mette; Rasmussen, Anne-Marie

    2006-01-01

    was selected, 2 ng of permethrin and 100 ng of malathion per head louse, respectively. Head lice were collected from heads of infested children in Denmark at 33 primary schools, one kindergarten, and seven boarding schools. The lice were collected by combing of dry hair, with a fine-toothed antilouse comb...

  13. Head Lice Infestation (Pediculosis and Associated Factors among Primary School Girls in Sirik County, Southern Iran

    Directory of Open Access Journals (Sweden)

    Alireza Sanei-Dehkordi

    2017-12-01

    Full Text Available Background Head lice infestation (pediculosis is a serious health problem that can cause a high level of anxiety and psychological frustration, especially in developing countries.Socio-demographic factors are important determinants of the occurrence of head lice infestation. This study aimed to determine the head lice infestations and the factors affecting the rate of infestationin primary school girls.   Materials and Methods In this cross-sectional study, a total of 358 school girls from two urban and three rural primary school girls in Sirik County, Southern Iran, were randomly selected. For the diagnosis of head lice infestation, students were examined carefully by visual inspection of the scalp and hair for the presence of lice. Self-administered questionnaire was used to collect data on socio-demographic and associated factors of head lice infestation. SPSS version 21.0 was used to analyze the data. Results The prevalence of head lice infestation among primary school girls was 56.15%. There were significant associations between head lice infestation and age (p

  14. SPECIES DIVERSITY AND COMMUNITY STRUCTURE OF SUCKING LICE IN YUNNAN, CHINA

    Institute of Scientific and Technical Information of China (English)

    Xian-guoGuo; Ti-junQian; Li-junGuo; JingWang; Wen-geDong; LiZhang; Zhi-minMa; andWeiLi

    2004-01-01

    On the basis of investigating 9 counties (towns) in Yunnan Province of China, the species diversity and community structure of sucking lice on the body surface of small mammal hosts are studied in the paper. Species richness (S) is used to stand for the species diversity. The calculation of community diversity index and evenness are based on Shannon-Wiener's method. 2745 small mammals captured from the investigated sites belong to 10 families, 25 genera and 41 species in 5 orders (Rodentia, Insectivora, Scandentia, Logomorpha and Carnivora) while 18165 individuals of sucking lice collected from the body surface of the small mammal hosts are identified into 4 families, 6 genera and 22 species. The species of sucking lice are much less than the species of their hosts. Most species of small mammals have their fixed sucking lice on their body surface. One species of small mammals usually have few species of sucking lice (1 to 4 species). The close species of the hosts in the taxonomy are found to have the same or similar dominant species of sucking lice on their body surface. The results reveal that the species diversity of sucking lice on small mammals is very low with a very simple community structure. The results also imply there may be a close co-evolution relationship between the lice and the hosts.

  15. [Physicians' knowledge in Israel on the biology and control of head lice].

    Science.gov (United States)

    Mumcuoglu, Kosta Y; Mumcuoglu, Michael; Danilevich, Maria; Gilead, Leon

    2008-10-01

    Health providers such as physicians, nurses and pharmacists should be knowledgeable about the biology of head lice and the ways to control them effectively, in order to reduce the proportion of children infested with head lice. To evaluate the knowledge of physicians in Israel on the biology and epidemiology of lice, as well as their experience with infested individuals and their preferences for diagnosis, prophylaxis and control. An anonymous questionnaire with 37 questions was used. The first 20 questions addressed the general knowledge of physicians on lice biology and control, while the remaining 17 questions were related to their personal experience with lice and louse treatment. Out of 273 physicians interviewed 66.8% had good knowledge of lice, while the remaining 33.2% had some knowledge on lice. The difference between the groups of physicians with medium and good knowledge on lice was borderline significant (P=0.0722), with the dermatologists borderline significantly less knowledgeable than the rest (P=0.0765). Significant differences were found between those physicians with 4-6 or 11-20 years of professional experience and the remaining groups (twice Pbiology and control was higher than male physicians (39.4% and 29.4%, respectively), the differences were borderline significant (P=0.09). Pediatricians and dermatologists examined significantly more children than family physicians and general practitioners (P control of head louse infestations.

  16. Clinical response and safety of malathion shampoo for treatment of head lice in a primary school.

    Science.gov (United States)

    Wananukul, Siriwan; Chatproedprai, Susheera; Tempark, Therdpong; Wananukul, Winai

    2011-04-01

    Help eradicate or at least alleviating head lice in a primary school with malathion shampoo and to study clinical response and safety of malathion shampoo. All students were examined by using a fine-toothed lice comb to help detect live lice. Direct visual examination and the collection of nits for microscopic examination were performed to differentiate viable nits from empty nits. Diagnosis of head lice was made by the presence of lice. All students that had lice and/or nits were treated with malathion shampoo. Malathion shampoo was also provided for all family members. Pediculocidal efficacy was by the presence or absence of live lice. Blood for red blood cell cholinesterase activity was drawn in 32 volunteers before treatment and after the second treatment. At the first visit, 629 students were examined and 48 students had live head lice. The infestation rate was 13% in girls and 1.3% in boys. The cure rate was 93% after the first treatment. The reported side effects were nausea, a burning sensation, and irritation that was found in five (4%), 10 (7%) and three (2%) students respectively. The mean of RBC cholinesterase activity before and after two applications showed significant changes (p = 0.03). It was -7.5 +/- 4.1% reduction from the initial, but all were in the normal range. There was no report of clinical manifestation of malathion toxicity. Malathion shampoo is safe and effective in the treatment of head lice. There is significant skin absorption so a scalp examination for head lice should be done before subsequent application to avoid unnecessary exposure.

  17. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  18. La Triple Hélice de las TIC en Ecuador

    Directory of Open Access Journals (Sweden)

    Yolanda Esperanza Ledesma Silva

    2018-03-01

    Full Text Available Las tecnologías de la información y la comunicación (TIC contribuyen al crecimiento económico global de un país. El uso de las TIC puede ser una oportunidad para modernizar tanto la gestión de la información como la administración del sistema en los tres sectores de la economía: Gobierno, Universidad y Empresa. El problema identificado es la ausencia de literatura sobre este tema. El presente artículo tiene como objetivo contribuir a resolver este problema y responder a la pregunta: ¿Cuáles son las interrelaciones entre el gobierno, las universidades y las empresas en el uso de las TIC en Ecuador? La metodología utilizada es el modelo de la Triple Hélice, con el fin de analizar las interacciones entre los tres sectores mencionados. Entre las principales conclusiones están: La primera hélice, Gobierno-Universidad, incluye la planificación pública en materia de TIC que se caracteriza por ser vertical, centralizada y excluyente, lo cual se puede observar por la falta de participación de los actores que intervienen en la formulación de proyectos y políticas relacionadas con las TIC y su aplicación.  En la segunda hélice, Gobierno-Empresa, existe la necesidad de invertir en las TIC, especialmente en el sector rural, con el fin de motivar la participación respectiva de la empresa privada y el gobierno. La tercera hélice, Empresa-Universidad, se expresa en la necesidad de conformar una comunidad 2.0 en las universidades que contribuya a la mejora del proceso de enseñanza-aprendizaje a través de la compartición e intercambio de información relevante entre los docentes, estudiantes y su entorno.

  19. Menopon gaillinae lice in the golden eagle (Aquila chrysaetos and Marsh harear (Circus aeruginosus in Najaf province, Iraq

    Directory of Open Access Journals (Sweden)

    Al-Fatlawi M. A. A

    2017-07-01

    Full Text Available Our study considered as the first work on ectoparasites of the Golden eagle (Aquila chrysaetos and Marsh harear (Circus aeruginosus in Iraq. Overall, we examined 17 eagles for the period from 01\\Nov\\2016 until 25\\Feb\\2017, out of which 4were found infected (23.5%. All infected birds were female. Aquila was hunted from Najaf sea area. Under the wing and between feathers of Aquila grossly examined for detect any parasites. Lice of genus Menopon gaillinae isolated from 4 eagles, from under the wing area. Infected eagles suffering from skin redness. 38 parasites isolated from infected eagle, we prepared a slide from these louse for spp. classification. This study was on the first hand record of shaft louse (M. gallinae in Golden eagle and Marsh harear in Iraq

  20. Vertical transmission of feather lice between adult blackbirds Turdus merula and their nestlings: a lousy perspective.

    Science.gov (United States)

    Brooke, M de L

    2010-12-01

    There is limited information about the natural history of the transmission of feather lice (Phthiraptera) from parent birds to their young. This article therefore examines the transmission of 4 species of feather lice from parent blackbirds to their nestlings in an English population, and addresses questions formulated from the perspective of the lice. The lice that disperse onto the several young in the nest were mostly found on the larger chicks, those with higher survival prospects. The lice dispersing to chicks were overwhelmingly nymphs, which cannot be sexed morphologically, and so the prediction that the adult lice dispersing would be disproportionately female, potential founders of a new population, was only supported for the most numerous species, Brueelia merulensis. There was no evidence that louse dispersal to chicks was density dependent and more likely when the parents were more heavily infested. Finally, I predicted that lice might aggregate on female blackbirds, which undertake more brooding, to increase their chance of transmission to nestlings. For 1 louse species, B. merulensis, prevalence, but not louse intensity, was higher on female than male blackbirds. For 2 other louse species, Philopterus turdi and Menacanthus eurysternus, no differences between male and female blackbirds were detected.

  1. Synergistic activity of antibiotics combined with ivermectin to kill body lice.

    Science.gov (United States)

    Sangaré, Abdoul Karim; Rolain, Jean Marc; Gaudart, Jean; Weber, Pascal; Raoult, Didier

    2016-03-01

    Ivermectin and doxycycline have been found to be independently effective in killing body lice. In this study, 450 body lice were artificially fed on a Parafilm™ membrane with human blood associated with antibiotics (doxycycline, erythromycin, rifampicin and azithromycin) alone and in combination with ivermectin. Fluorescence in situ hybridisation and spectral deconvolution were performed to evaluate bacterial transcriptional activity following antibiotic intake by the lice. In the first series, a lethal effect of antibiotics on lice was observed compared with the control group at 18 days (log-rank test, P≤10(-3)), with a significant difference between groups in the production of nits (P=0.019, Kruskal-Wallis test). A high lethal effect of ivermectin alone (50ng/mL) was observed compared with the control group (log-rank test, P≤10(-3)). Fluorescence of bacteriocytes in lice treated with 20μg/mL doxycycline was lower than in untreated lice (PKruskal-Wallis test). In the second series with antibiotic-ivermectin combinations, a synergistic lethal effect on treated lice (log-rank test, PKruskal-Wallis test). Additionally, survival of lice in the combination treatment groups compared with ivermectin alone was significant (log-rank test, P=0.0008). These data demonstrate that the synergistic effect of combinations of antibiotics and ivermectin could be used to achieve complete eradication of lice and to avoid selection of a resistant louse population. Copyright © 2016 Elsevier B.V. and the International Society of Chemotherapy. All rights reserved.

  2. Rates of genomic divergence in humans, chimpanzees and their lice.

    Science.gov (United States)

    Johnson, Kevin P; Allen, Julie M; Olds, Brett P; Mugisha, Lawrence; Reed, David L; Paige, Ken N; Pittendrigh, Barry R

    2014-02-22

    The rate of DNA mutation and divergence is highly variable across the tree of life. However, the reasons underlying this variation are not well understood. Comparing the rates of genetic changes between hosts and parasite lineages that diverged at the same time is one way to begin to understand differences in genetic mutation and substitution rates. Such studies have indicated that the rate of genetic divergence in parasites is often faster than that of their hosts when comparing single genes. However, the variation in this relative rate of molecular evolution across different genes in the genome is unknown. We compared the rate of DNA sequence divergence between humans, chimpanzees and their ectoparasitic lice for 1534 protein-coding genes across their genomes. The rate of DNA substitution in these orthologous genes was on average 14 times faster for lice than for humans and chimpanzees. In addition, these rates were positively correlated across genes. Because this correlation only occurred for substitutions that changed the amino acid, this pattern is probably produced by similar functional constraints across the same genes in humans, chimpanzees and their ectoparasites.

  3. Incidence and prevalence of head lice in a district health authority area.

    Science.gov (United States)

    Harris, J; Crawshaw, J G; Millership, S

    2003-09-01

    There are very few recent studies of the incidence and prevalence of head lice in the UK. A population-based questionnaire survey was carried out in a district health authority area. Two hundred and four of 235 primary schools (87%) agreed to participate. A total of 21,556 of 43,889 (49%) questionnaires were returned by parents. Overall 438 children had head lice at the time of the survey, giving a prevalence of 2.03%; 8,059 had had lice at some time in the last year giving an annual incidence of 37.4%.

  4. Bird Lice (Mallophaga, Philopteridae, Menoponidae of Domestic Pigeons on Specialized Pigeon Breeding Farms in Poltava

    Directory of Open Access Journals (Sweden)

    Kolomak I. O.

    2017-12-01

    Full Text Available The species composition of pigeon lice parasitic on pigeons of ornamental breeds on the specialized closed-type farm (Poltava was studied. Five species of these ectoparasites were registered: Columbicola columbae Linnaeus, 1758, Campanulotes compar Burmeister, 1838, (Philopteridae, Ischnocera, Bonomiella columbae Emerson, 1957, Hohorstiella lata Piaget, 1880 and Neocolpocephalus turbinatum (Denny, 1842 (Menoponidae, Amblycera. For each species, the data on infection prevalence, intensity and abundance were obtained. High prevalence of infection was registered for all pigeon lice species, while the intensity and, especially, the abundance were considerably different. C. columbae turned out to be the most abundant. B. columbae was rather common. The peculiarities of pigeon lice species localization on the host body were investigated. During the intensive infection of pigeons with lice, the complex of clinical signs is manifested, which testifies about considerable effect of these parasites on the host. The highest pathogenicity is characteristic for H. lata, which usually feeds on blood and lymph.

  5. Understanding and Managing Head Lice | NIH MedlinePlus the Magazine

    Science.gov (United States)

    ... to share hats, combs, or brushes with others. Policies regarding school attendance for children with head lice vary. Sources: National Library of Medicine, Centers for Disease Control and Prevention, ...

  6. Performance of coastal sea-defense infrastructure at El Jadida (Morocco against tsunami threat: lessons learned from the Japanese 11 March 2011 tsunami

    Directory of Open Access Journals (Sweden)

    R. Omira

    2013-07-01

    Full Text Available This paper seeks to investigate the effectiveness of sea-defense structures in preventing/reducing the tsunami overtopping as well as evaluating the resulting tsunami impact at El Jadida, Morocco. Different tsunami wave conditions are generated by considering various earthquake scenarios of magnitudes ranging from Mw = 8.0 to Mw = 8.6. These scenarios represent the main active earthquake faults in the SW Iberia margin and are consistent with two past events that generated tsunamis along the Atlantic coast of Morocco. The behaviour of incident tsunami waves when interacting with coastal infrastructures is analysed on the basis of numerical simulations of near-shore tsunami waves' propagation. Tsunami impact at the affected site is assessed through computing inundation and current velocity using a high-resolution digital terrain model that incorporates bathymetric, topographic and coastal structures data. Results, in terms of near-shore tsunami propagation snapshots, waves' interaction with coastal barriers, and spatial distributions of flow depths and speeds, are presented and discussed in light of what was observed during the 2011 Tohoku-oki tsunami. Predicted results show different levels of impact that different tsunami wave conditions could generate in the region. Existing coastal barriers around the El Jadida harbour succeeded in reflecting relatively small waves generated by some scenarios, but failed in preventing the overtopping caused by waves from others. Considering the scenario highly impacting the El Jadida coast, significant inundations are computed at the sandy beach and unprotected areas. The modelled dramatic tsunami impact in the region shows the need for additional tsunami standards not only for sea-defense structures but also for the coastal dwellings and houses to provide potential in-place evacuation.

  7. A Study of Fish Lice (Argulus Sp.) Infection in Freshwater Food Fish

    OpenAIRE

    Aalberg K.; Koščová L.; Šmiga Ľ.; Košuth P.; Koščo J.; Oros M.; Barčák D.; Lazar P.

    2016-01-01

    Argulus sp., commonly referred to as fish lice, are crustacean ectoparasites of fishes. The hematophagous parasites attach to and feed off the integument of their hosts. Outbreaks of epizootics have been reported worldwide, causing mass mortalities and having serious economic implications for fish farms and culture efforts. Argulus fish lice may also serve as vectors of infectious diseases and as intermediate hosts of other parasites. Two native European species, A. foliaceus and A. coregoni,...

  8. New records and a new species of chewing lice (Phthiraptera, Amblycera, Ischnocera found on Columbidae (Columbiformes in Pakistan

    Directory of Open Access Journals (Sweden)

    Saima Naz

    2012-03-01

    Full Text Available The chewing lice (Phthiraptera of Columbidae (Columbiformes from Pakistan are studied. Six species of chewing lice with new host records are recorded and one new species of the genus Colpocephalum is described from Columba livia in the Karachi region. All the columbid chewing lice from Pakistan are keyed out and the new species is illustrated and compared with the closest allied species.

  9. Does by-catch pose a threat for the conservation of seabird populations in the southern Ionian Sea (eastern Mediterranean? A questionnaire based survey of local fisheries

    Directory of Open Access Journals (Sweden)

    G. KARRIS

    2013-09-01

    Full Text Available A significant number of studies worldwide have shown that incidental catches (by-catch of seabirds in fishing gear might pose a considerable risk for the conservation of their populations. Nevertheless reliable data on by-catch rates of seabirds in European marine ecosystems are patchy and need to be improved. This study constitutes a first attempt at the evaluation of by-catch rates in the southern Ionian Sea. Data were obtained by distributing a specific questionnaire to the fishers of Zakynthos Island. 150 professional fishers (representing 90% of the local fishing fleet participated in the research, and were interviewed during July-December 2010. The information collected showed that commercial longline and (to a lesser extent gillnet fishery gears caused incidental catches mostly of Scopoli’s Shearwater and Mediterranean Shag. The temporal analysis of the incidental bird mortality showed that seabirds were more susceptible to be trapped in fishery gears set around sunrise during spring and summer whereas spatial analysis of by-catch data indicated variations in the number of seabirds caught in different fishery areas.

  10. Vessel noise pollution as a human threat to fish: assessment of the stress response in gilthead sea bream (Sparus aurata, Linnaeus 1758).

    Science.gov (United States)

    Celi, Monica; Filiciotto, Francesco; Maricchiolo, Giulia; Genovese, Lucrezia; Quinci, Enza Maria; Maccarrone, Vincenzo; Mazzola, Salvatore; Vazzana, Mirella; Buscaino, Giuseppa

    2016-04-01

    This study examined the effects of boat noise pollution on the stress indices of gilthead sea bream (Sparus aurata, Linnaeus 1758). To assess the stress response in these fish, biometric values and plasma parameters such as ACTH, cortisol, glucose, lactate, haematocrit, Hsp70, total protein, cholesterol, triglycerides and osmolarity were analysed. After acclimatization of the animals, the experiment was carried out in a tank fitted with underwater speakers where the fish were exposed to sound treatments (in duplicate) consisting of: 10 days of no sound (control treatment; the animals were only exposed to the experimental tank's background noise) and 10 days of noise derived from original recordings of motor boats, including recreational boats, hydrofoil, fishing boat and ferry boat (vessel noise treatment). The exposure to noise produced significant variations in almost all the plasma parameters assessed, but no differences were observed in weights and fork lengths. A PERMANOVA analysis highlighted significantly increased values (p < 0.05) of ACTH, cortisol, glucose, lactate, haematocrit, Hsp70, cholesterol, triglycerides and osmolarity in the fish exposed to vessel noise for 10 days. This study clearly highlights that anthropogenic noise negatively affects fish, and they are valuable targets for detailed investigations into the effects of this global pollutant. Finally, these experimental studies could represent part of the science that is able to improve the quality of the policies related to management plans for maritime spaces (Marine Strategy Framework Directive 56/2008 CE) that are aimed at stemming this pollutant phenomenon.

  11. Predicting the effectiveness of depth-based technologies to prevent salmon lice infection using a dispersal model.

    Science.gov (United States)

    Samsing, Francisca; Johnsen, Ingrid; Stien, Lars Helge; Oppedal, Frode; Albretsen, Jon; Asplin, Lars; Dempster, Tim

    2016-07-01

    Salmon lice is one of the major parasitic problems affecting wild and farmed salmonid species. The planktonic larval stages of these marine parasites can survive for extended periods without a host and are transported long distances by water masses. Salmon lice larvae have limited swimming capacity, but can influence their horizontal transport by vertical positioning. Here, we adapted a coupled biological-physical model to calculate the distribution of farm-produced salmon lice (Lepeophtheirus salmonis) during winter in the southwest coast of Norway. We tested 4 model simulations to see which best represented empirical data from two sources: (1) observed lice infection levels reported by farms; and (2) experimental data from a vertical exposure experiment where fish were forced to swim at different depths with a lice-barrier technology. Model simulations tested were different development time to the infective stage (35 or 50°-days), with or without the presence of temperature-controlled vertical behaviour of lice early planktonic stages (naupliar stages). The best model fit occurred with a 35°-day development time to the infective stage, and temperature-controlled vertical behaviour. We applied this model to predict the effectiveness of depth-based preventive lice-barrier technologies. Both simulated and experimental data revealed that hindering fish from swimming close to the surface efficiently reduced lice infection. Moreover, while our model simulation predicted that this preventive technology is widely applicable, its effectiveness will depend on environmental conditions. Low salinity surface waters reduce the effectiveness of this technology because salmon lice avoid these conditions, and can encounter the fish as they sink deeper in the water column. Correctly parameterized and validated salmon lice dispersal models can predict the impact of preventive approaches to control this parasite and become an essential tool in lice management strategies. Copyright

  12. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  13. Lessons from sea louse and salmon epidemiology.

    Science.gov (United States)

    Groner, Maya L; Rogers, Luke A; Bateman, Andrew W; Connors, Brendan M; Frazer, L Neil; Godwin, Sean C; Krkošek, Martin; Lewis, Mark A; Peacock, Stephanie J; Rees, Erin E; Revie, Crawford W; Schlägel, Ulrike E

    2016-03-05

    Effective disease management can benefit from mathematical models that identify drivers of epidemiological change and guide decision-making. This is well illustrated in the host-parasite system of sea lice and salmon, which has been modelled extensively due to the economic costs associated with sea louse infections on salmon farms and the conservation concerns associated with sea louse infections on wild salmon. Consequently, a rich modelling literature devoted to sea louse and salmon epidemiology has been developed. We provide a synthesis of the mathematical and statistical models that have been used to study the epidemiology of sea lice and salmon. These studies span both conceptual and tactical models to quantify the effects of infections on host populations and communities, describe and predict patterns of transmission and dispersal, and guide evidence-based management of wild and farmed salmon. As aquaculture production continues to increase, advances made in modelling sea louse and salmon epidemiology should inform the sustainable management of marine resources. © 2016 The Author(s).

  14. Chewing lice of swan geese (Anser cygnoides): New host-parasite associations

    Science.gov (United States)

    Choi, Chang-Yong; Takekawa, John Y.; Prosser, Diann J.; Smith, Lacy M.; Ely, Craig R.; Fox, Anthony D.; Cao, Lei; Wang, Xin; Batbayar, Nyambayar; Natsagdorj, Tseveenmayadag; Xiao, Xiangming

    2016-01-01

    Chewing lice (Phthiraptera) that parasitize the globally threatened swan goose Anser cygnoides have been long recognized since the early 19th century, but those records were probably biased towards sampling of captive or domestic geese due to the small population size and limited distribution of its wild hosts. To better understand the lice species parasitizing swan geese that are endemic to East Asia, we collected chewing lice from 14 wild geese caught at 3 lakes in northeastern Mongolia. The lice were morphologically identified as 16 Trinoton anserinum (Fabricius, 1805), 11 Ornithobius domesticus Arnold, 2005, and 1 Anaticola anseris (Linnaeus, 1758). These species are known from other geese and swans, but all of them were new to the swan goose. This result also indicates no overlap in lice species between older records and our findings from wild birds. Thus, ectoparasites collected from domestic or captive animals may provide biased information on the occurrence, prevalence, host selection, and host-ectoparasite interactions from those on wild hosts.

  15. Origin of clothing lice indicates early clothing use by anatomically modern humans in Africa.

    Science.gov (United States)

    Toups, Melissa A; Kitchen, Andrew; Light, Jessica E; Reed, David L

    2011-01-01

    Clothing use is an important modern behavior that contributed to the successful expansion of humans into higher latitudes and cold climates. Previous research suggests that clothing use originated anywhere between 40,000 and 3 Ma, though there is little direct archaeological, fossil, or genetic evidence to support more specific estimates. Since clothing lice evolved from head louse ancestors once humans adopted clothing, dating the emergence of clothing lice may provide more specific estimates of the origin of clothing use. Here, we use a Bayesian coalescent modeling approach to estimate that clothing lice diverged from head louse ancestors at least by 83,000 and possibly as early as 170,000 years ago. Our analysis suggests that the use of clothing likely originated with anatomically modern humans in Africa and reinforces a broad trend of modern human developments in Africa during the Middle to Late Pleistocene.

  16. Embryonic development of human lice: rearing conditions and susceptibility to spinosad

    Directory of Open Access Journals (Sweden)

    Gastón Mougabure Cueto

    2006-05-01

    Full Text Available The embryonic development of human lice was evaluated according to the changes in the morphology of the embryo observed through the transparent chorion. Based on ocular and appendage development, three stages of embryogenesis were established: early, medium, and late. Influence of temperature and relative humidity (RH on the laboratory rearing of Pediculus humanus capitis eggs was assessed. The optimal ranges for temperature and RH were 27-31°C and 45-75%. The susceptibility of human louse eggs to insecticide spinosad (a macrocyclic lactone was assessed by immersion method. The results showed similar susceptibility to spinosad in early, medium, and late stages of head lice eggs. In addition, this study showed similar susceptibility of head and body lice eggs to spinosad, an insecticide that has not been used as pediculicide in Argentina (lethal concentration 50: 0.01%.

  17. prevalence of head lice infestation in primary school children in port ...

    African Journals Online (AJOL)

    2013-08-01

    Aug 1, 2013 ... Excoriation and secondary pyoderma, following trauma due to scratching, may result in matting together of the hair, cervical and occipital lymphadenopathy. Severe cases may result in group A Streptococcal impetigo with the risk of developing rheumatic heart disease and glomerulonephritis (14). Head lice.

  18. Head lice infestation in school children of a low socio- economy ...

    African Journals Online (AJOL)

    STORAGESEVER

    2008-07-04

    Jul 4, 2008 ... In the old Gaza city and the rural village Jabalia within the Gaza Governorate the rate of infestation with lice was 14.1% in the primary school girls. (Al-Shawa, 2006). In a high socio-economy area in Izmir,. Turkey, 4.2% of the studied population of the secondary and elementary school children were infested ...

  19. The treatment and eradication of sheep lice and ked with cyhalothrin--a new synthetic pyrethroid.

    Science.gov (United States)

    Rundle, J C; Forsyth, B A

    1984-12-01

    A new synthetic pyrethroid, cyhalothrin, has been evaluated as both a sheep dip and a jetting fluid for the control of body lice (Damalinia ovis), face lice (Linognathus ovillus), foot lice (Linognathus pedalis) and the sheep ked (Melophagus ovinus). A dip wash concentration of 1.25 ppm cyhalothrin eradicated D. ovis from sheep. A jetting fluid at a concentration of 20 ppm also eradicated D. ovis. In the field cyhalothrin was evaluated at 20 ppm as a dip wash and at 50 ppm as a jetting fluid. These field trials confirmed the ability of cyhalothrin to eradicate D. ovis from short and long-woolled sheep. The sucking lice, L. ovillus and L. pedalis, were also found to be very susceptible to cyhalothrin at a dip wash concentration of 20 ppm, but it was necessary to treat the predilection sites infested by these parasites twice within a 3-week period to achieve their eradication. Sheep ked (M. ovinus) were eradicated from an infected flock of sheep after plunge dipping in cyhalothrin at 20 ppm.

  20. Evidence of Sympatry of Clade A and Clade B Head Lice in a Pre-Columbian Chilean Mummy from Camarones

    Science.gov (United States)

    Boutellis, Amina; Drali, Rezak; Rivera, Mario A.; Mumcuoglu, Kosta Y.; Raoult, Didier

    2013-01-01

    Three different lineages of head lice are known to parasitize humans. Clade A, which is currently worldwide in distribution, was previously demonstrated to be present in the Americas before the time of Columbus. The two other types of head lice are geographically restricted to America and Australia for clade B and to Africa and Asia for clade C. In this study, we tested two operculated nits from a 4,000-year-old Chilean mummy of Camarones for the presence of the partial Cytb mitochondrial gene (270 bp). Our finding shows that clade B head lice were present in America before the arrival of the European colonists. PMID:24204678

  1. Efficacy of a grapefruit extract on head lice: a clinical trial.

    Science.gov (United States)

    Abdel-Ghaffar, Fathy; Semmler, Margit; Al-Rasheid, Khaled; Klimpel, Sven; Mehlhorn, Heinz

    2010-01-01

    Twenty children aging 2-9 years old--four boys with short hair and 16 girls with long hair--were included in a clinical test on the efficacy of a product against head lice (Pediculus humanus capitis). Their hair were exposed to Licatack, which is a recently developed new anti-louse medicinal product containing extracts of grapefruits besides high quality shampoo components. Prior to this field trial, the product Licatack was tested dermatologically to be skin safe receiving the grade "very good". The children's mothers combed the kids prior to the start of the test in order to confirm that they were all lice-infested. The obtained lice were used for in vitro tests. All children were heavily infested. After combing and preservation of the living lice, the hair was wet with tap water. Then, 50 ml of the Licatack shampoo was placed onto the top of each child's head. Then, the mothers distributed the rather fluid product all over the hair thoroughly from their base at the skin until the free end. During this process, a type of massage, the product became foamy and it was easily recognized where the product covered the hair, thus, avoiding untreated spots. The hair of half of the treated children were washed with tap water after 10 min of exposition; while in the other half of the children, the exposition period was prolonged to 20 min before washing. When combing the kids with a metal louse comb after the washing, the lice were found immobile and they did not recover during the following observation period of 4 h. Only two lice from the group with an exposition time of only 10 min showed some slight leg movements after they had been combed off, but they died within the next 2 h. Thus, this new anti-louse medicinal product has a very quick and efficient activity besides its advantages of being non-inflammable, skin safe, and nice smelling. None of the kids claimed any burning at the skin or other side effects, although the skin showed, prior to treatment, lots of scars

  2. El coeficiente de eficacia del humo de sílice

    Directory of Open Access Journals (Sweden)

    Alaejos Gutiérrez, M. Pilar

    1999-03-01

    Full Text Available Silica fume is a pozzolanic addition specially used to get high resistance concrete. Present Spanish standards on additives dictate that silica fumes have to comply with specific requirements when used as concrete addition. Once it has been proved they comply with those requirements, microsilicas of different characteristics can be used, which influence concrete properties in different ways. This paper discloses the experimental results obtained in the Central Laboratory of Structures and Materials of the CEDEX with three microsilicas from different sources. Through the results it has been observed that the coefficient of efficiency of silica fume can have very different values, although complying with the standards in force. The value of this coefficient of efficiency is compared to the one included in text of the future EHE.

    El humo de sílice es una adición de carácter puzolánico que se utiliza fundamentalmente para conseguir hormigones de alta resistencia. La normativa española actual de adiciones exige que el humo de sílice cumpla unos requisitos determinados para poder utilizarse como adición al hormigón. Cumpliendo estos requisitos, pueden utilizarse microsílices de características distintas que influyen de distinta manera en las propiedades del hormigón. La ponencia expone los resultados experimentales obtenidos en el Laboratorio Central de Estructuras y Materiales del CEDEX con tres microsílices de diferente procedencia. Los resultados han permitido determinar que el coeficiente de eficacia del humo de sílice puede tener valores muy diferentes, incluso con adiciones que cumplan la normativa vigente. Se compara el valor de este coeficiente de eficacia con el incluido en el texto de la futura EHE.

  3. Randomized, investigator-blinded, controlled clinical study with lice shampoo (Licener®) versus dimethicone (Jacutin® Pedicul Fluid) for the treatment of infestations with head lice.

    Science.gov (United States)

    Semmler, Margit; Abdel-Ghaffar, Fathy; Gestmann, Falk; Abdel-Aty, Mohammed; Rizk, Ibrahim; Al-Quraishy, Saleh; Lehmacher, Walter; Hoff, Norman-Philipp

    2017-07-01

    The present clinical trial was conducted to obtain additional data for the safety and efficacy of a head lice shampoo that is free of silicone compared with an anti-head lice product containing dimethicone. Both products act by a physical mode of action. This randomized, investigator-blinded, controlled clinical study was conducted between July and November 2016 in households of two villages (Abou Rawash and Shandalat) in Egypt. Children older than 2 years with an active head lice infestation were treated with either a shampoo-based head lice treatment containing neem extract (Licener®) or dimethicone (Jacutin® Pedicul Fluid) on day 1 and additionally on day 9. Assessment for living lice by combing was conducted before and 1-2 h after treatment and on days 5 and 13. The main objective was to demonstrate a cure rate of the test product of at least 85% after a single application (day 5 and 9). Secondary objectives were to scrutinize patient safety and satisfaction as well as cure rates on day 13 after two treatments and the evaluation of ovicidal and licicidal efficacies of the products. Sixty-one children in the test-group (Licener®) and 58 children in the reference group (Jacutin® Pedicul Fluid) were included in this study. The test product and the reference product were very well tolerated. Both products exceeded the objective of cure rates of over 85% after single treatment (test group 60/60 = 100%; 95% CI = 94.04-100.00%; reference group 54/57 = 94.74%; 95% CI = 85.38-98.90%; p = 0.112; CI by Clopper-Pearson) and after two treatments (test group 58/58 = 100%; 95% CI = 93.84-100.00%; reference group 52/54 = 96.30%; 95% CI = 87.25-99.55%; p = 0.230) with higher cure rates and non-inferiority for the test product. The combined success rate shows significant superiority of the test product against the reference product (test group 58/58 = 100%; 95% CI = 93.84-100.00%; reference group 49/54 = 90.7%; 95% CI = 79.70-96.92%; p = 0

  4. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  5. Strategické plánování rozvoje města Domažlice

    OpenAIRE

    JANSOVÁ, Nicole

    2014-01-01

    The aim of the thesis "Strategic urban development planning of the town Domažlice" was to evaluate entire process of preparation, creation and implementation of the strategic plan of the municipality. The theoretical part reviews scientific literature focused on strategic planning and the characteristics of the strategic plan. Practical part contains analysis of Strategic Development Plan of the town Domažlice.

  6. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  7. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  8. The reproductive output of sea lice Caligus rogercresseyi under controlled conditions.

    Science.gov (United States)

    Bravo, Sandra

    2010-05-01

    Gravid females of Caligus rogercresseyi were collected from Atlantic salmon (Salmo salar) from a farm located at Chiloe Island (42 degrees 40'S73 degrees 15'W), Chile, to obtain information about the reproductive output of this parasite in vitro. The egg strings removed from the females were incubated under controlled conditions to obtain virgin adult females. One female which had mated only once produced eleven generations of eggs strings in a period of 74 days. The first egg strings of the females obtained in vitro were produced at 389 degree days ( degrees D) after egg incubation, while the next generations of eggs strings were produced with a periodicity between 4 and 6 days dependent on the water temperature. The average length of the egg string was 3.1mm and the mean number of eggs per string was 31. The values recorded in captivity for the egg string length and the number of eggs per string, were lower than the values recorded in gravid females from the field. One female survived for 79 days and males, maintained separately from the females, survived for 60 days. Copyright 2009 Elsevier Inc. All rights reserved.

  9. Impact of early salmon louse, Lepeophtheirus salmonis, infestation and differences in survival and marine growth of sea-ranched Atlantic salmon, Salmo salar L., smolts 1997–2009

    Science.gov (United States)

    Skilbrei, O T; Finstad, B; Urdal, K; Bakke, G; Kroglund, F; Strand, R

    2013-01-01

    The impact of salmon lice on the survival of migrating Atlantic salmon smolts was studied by comparing the adult returns of sea-ranched smolts treated for sea lice using emamectin benzoate or substance EX with untreated control groups in the River Dale in western Norway. A total of 143 500 smolts were released in 35 release groups in freshwater from 1997 to 2009 and in the fjord system from 2007 to 2009. The adult recaptures declined gradually with release year and reached minimum levels in 2007. This development corresponded with poor marine growth and increased age at maturity of ranched salmon and in three monitored salmon populations and indicated unfavourable conditions in the Norwegian Sea. The recapture rate of treated smolts was significantly higher than the controls in three of the releases performed: the only release in 1997, one of three in 2002 and the only group released in sea water in 2007. The effect of treating the smolts against salmon lice was smaller than the variability in return rates between release groups, and much smaller that variability between release years, but its overall contribution was still significant (P < 0.05) and equivalent to an odds ratio of the probability of being recaptured of 1.17 in favour of the treated smolts. Control fish also tended to be smaller as grilse (P = 0.057), possibly due to a sublethal effect of salmon lice. PMID:23311746

  10. The Use of GIS Methodology in Jumping Plant Lice (Hemiptera: Psylloidae Studies in Serbia

    Directory of Open Access Journals (Sweden)

    Dušanka Jerinić-Prodanović

    2012-01-01

    Full Text Available Entomofaunistic studies contain a large number of data regarding the number ofcollected species, the number of individuals within species, time of collection, localities,species biology and morphology natural enemies and hosts. Besides thematic andtemporal components this kind of studies include spatial component which is crucialfor the use of GIS methodology and advanced possibilities of geospatial analysis. Duringour studies on jumping plant lice (Psylloidea fauna and their natural enemies on theterritory of Serbia which lasted for several years, a large number of spatially referenceddata related to this group of insects were collected. The process of collecting, archivingand classifying the data on each species was improved by applying the GIS methodologicalapproach after which the data were entered into database. The analysis of datausing thematic and spatial queries, as well as graphic, numeric and textual display of theresults from studies enabled simpler and more complete survey of horizontal and verticaldistribution of jumping plant lice, their biology and relationship with plants, predatorsand parasitoids.

  11. Effect of exposure on salmon lice Lepeophtheirus salmonis population dynamics in Faroese salmon farms

    DEFF Research Database (Denmark)

    Patursson, Esbern J.; Simonsen, Knud; Visser, Andre

    2017-01-01

    We assessed variations in salmon lice Lepeophtheirus salmonis population dynamics in Faroese salmon farms in relationship to their physical exposure to local circulation patterns and flushing with adjacent waters. Factors used in this study to quantify physical exposure are estimates...... of the freshwater exchange rate, the tidal exchange rate and dispersion by tidal currents. Salmon farms were ranked according to the rate of increase in the average numbers of salmon lice per fish. In a multiple linear regression, physical exposure together with temperature were shown to have a significant effect...... threshold of salmon stocking numbers for outbreaks of infection. The study presents a simple method of characterizing salmon farming fjords in terms of their different exposure levels and how they relate to potential self-infection at these sites...

  12. Chewing lice Trichodectes pinguis pinguis in Scandinavian brown bears (Ursus arctos

    Directory of Open Access Journals (Sweden)

    Núria Fandos Esteruelas

    2016-08-01

    Full Text Available In April 2014 and 2015, we noted localized alopecia (neck, forelimbs, and chest and hyperpigmentation on two adult brown bears (Ursus arctos captured in central-south Sweden for ecological studies under the Scandinavian Brown Bear Research Project. In spring 2015, a brown bear was shot because of human-wildlife conflict in the same region. This bear also had extensive alopecia and hyperpigmentation. Ectoparasites were collected from the affected skin areas in all three individuals and preserved in ethanol for identification. Based on morphological characteristics, the lice were identified as Trichodectes spp. and Trichodectes pinguis pinguis. To our knowledge, these are the first reported cases of chewing lice in free-ranging brown bears in Scandinavia.

  13. Informe higiénico de polvo de sílice y de amianto

    OpenAIRE

    Roca Ruiz, Patricia

    2012-01-01

    Informe de una medición de amianto y de polvo de sílice, modelo de un plan de prevención de riesgos laborales. Departamento de Ingeniería Química y Tecnología del Medio Ambiente Máster en Gestión de la Prevención de Riesgos Laborales, Calidad y Medio Ambiente

  14. Two new records of chewing lice (Phthiraptera: Ischnocera: Philopteridae) on Leptotila megalura (Aves: Columbidae) from Argentina

    OpenAIRE

    Guardia, Leonor

    2008-01-01

    Dos especies de piojos masticadores (Phthiraptera: Ischnocera: Philopteridae), Physconelloides ceratoceps Ewing y Columbicola gracilicapitis Carriker, son registradas por primera vez sobre Leptotila megalura Sclater & Salvin ("yerutí yungueña") (Aves: Columbidae). Además, C. gracilicapitis es citada por primera vez para la Argentina.Two species of chewing lice (Phthiraptera: Ischnocera: Philopteridae), Physconelloides ceratoceps Ewing and Columbicola gracilicapitis Carriker are recorded for t...

  15. Actividad antinflamatoria de extractos y fracciones obtenidas de cálices de Physalis peruviana L.

    Directory of Open Access Journals (Sweden)

    Luis A. Franco

    2007-03-01

    Conclusión. Este estudio confirma la actividad antinflamatoria atribuida a los cálices de Physalis peruviana y también valida su uso en la medicina popular. Se identificaron las principales fracciones responsables de la actividad antinflamatoria, las cuales parecen ser promisorias para el desarrollo de fitopreparados. Se requieren estudios posteriores para aislar e identificar los compuestos responsables de la actividad y también para investigar el mecanismo involucrado en el efecto antinflamatorio observado.

  16. Seasonal infestation of donkeys by lice: phenology, risk factors and management.

    Science.gov (United States)

    Ellse, L; Burden, F A; Wall, R

    2014-07-14

    A longitudinal study was undertaken over a 21 months period to examine the seasonal abundance of lice infesting donkeys, the risk factors which predispose donkeys to infestation and the effectiveness of louse management. All the lice seen were Bovicola (Werneckiella) ocellatus. A strong seasonal pattern, which was correlated with mean monthly temperature, was observed with higher prevalence and intensity in the cooler, winter months (October-March). Overall infestation in these animals was over-dispersed, suggesting that some individuals are strongly predisposed to infestation. Donkey age and mean hair length were characteristics which affected louse prevalence: older and younger donkeys and donkeys with longer hair harboured the highest numbers of lice. However, the practice of coat-clipping, to reduce the infestation, resulted in a lower louse prevalence only in the summer, suggesting that clipping is not an effective form of louse control in cooler months. Higher louse burdens were associated with larger areas of visible excoriation and hair damage, suggesting that B. ocellatus does adversely impact animal welfare. However, the ability of animal carers to estimate louse presence or absence accurately on an individual donkey was not sufficiently high to allow targeted selective treatment of heavily infested animals to be employed effectively. As animals are housed in closed herds these findings suggest that clipping in the summer and treating all animals with insecticide in late autumn, prior to turn-in may be an effective louse management strategy. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  18. Threat to the seamen's health of the radioactive radiation from the phosphorus containing raw materials carried on board sea-going ships. Zagrozenie zdrowia marynarzy promieniowaniem radioaktywnym surowcow fosforonosnych przewozonych na statkach morskich

    Energy Technology Data Exchange (ETDEWEB)

    Pilawski, T [Wyzsza Szkola Morska, Szczecin (Poland)

    1988-01-01

    The results of preliminary studies on radiation hazards connected with the sea transport of phosphorites and phosphors are presented. The time dependent changes of dose rates are given. 2 figs., 3 refs. (A.S.).

  19. Nuclear genetic diversity in human lice (Pediculus humanus reveals continental differences and high inbreeding among worldwide populations.

    Directory of Open Access Journals (Sweden)

    Marina S Ascunce

    Full Text Available Understanding the evolution of parasites is important to both basic and applied evolutionary biology. Knowledge of the genetic structure of parasite populations is critical for our ability to predict how an infection can spread through a host population and for the design of effective control methods. However, very little is known about the genetic structure of most human parasites, including the human louse (Pediculus humanus. This species is composed of two ecotypes: the head louse (Pediculus humanus capitis De Geer, and the clothing (body louse (Pediculus humanus humanus Linnaeus. Hundreds of millions of head louse infestations affect children every year, and this number is on the rise, in part because of increased resistance to insecticides. Clothing lice affect mostly homeless and refugee-camp populations and although they are less prevalent than head lice, the medical consequences are more severe because they vector deadly bacterial pathogens. In this study we present the first assessment of the genetic structure of human louse populations by analyzing the nuclear genetic variation at 15 newly developed microsatellite loci in 93 human lice from 11 sites in four world regions. Both ecotypes showed heterozygote deficits relative to Hardy-Weinberg equilibrium and high inbreeding values, an expected pattern given their parasitic life history. Bayesian clustering analyses assigned lice to four distinct genetic clusters that were geographically structured. The low levels of gene flow among louse populations suggested that the evolution of insecticide resistance in lice would most likely be affected by local selection pressures, underscoring the importance of tailoring control strategies to population-specific genetic makeup and evolutionary history. Our panel of microsatellite markers provides powerful data to investigate not only ecological and evolutionary processes in lice, but also those in their human hosts because of the long

  20. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  1. Pharmacokinetics and transcriptional effects of the anti-salmon lice drug emamectin benzoate in Atlantic salmon (Salmo salar L.).

    Science.gov (United States)

    Olsvik, Pål A; Lie, Kai K; Mykkeltvedt, Eva; Samuelsen, Ole B; Petersen, Kjell; Stavrum, Anne-Kristin; Lunestad, Bjørn T

    2008-09-11

    Emamectin benzoate (EB) is a dominating pharmaceutical drug used for the treatment and control of infections by sea lice (Lepeophtheirus salmonis) on Atlantic salmon (Salmo salar L). Fish with an initial mean weight of 132 g were experimentally medicated by a standard seven-day EB treatment, and the concentrations of drug in liver, muscle and skin were examined. To investigate how EB affects Atlantic salmon transcription in liver, tissues were assessed by microarray and qPCR at 7, 14 and 35 days after the initiation of medication. The pharmacokinetic examination revealed highest EB concentrations in all three tissues at day 14, seven days after the end of the medication period. Only modest effects were seen on the transcriptional levels in liver, with small fold-change alterations in transcription throughout the experimental period. Gene set enrichment analysis (GSEA) indicated that EB treatment induced oxidative stress at day 7 and inflammation at day 14. The qPCR examinations showed that medication by EB significantly increased the transcription of both HSP70 and glutathione-S-transferase (GST) in liver during a period of 35 days, compared to un-treated fish, possibly via activation of enzymes involved in phase II conjugation of metabolism in the liver. This study has shown that a standard seven-day EB treatment has only a modest effect on the transcription of genes in liver of Atlantic salmon. Based on GSEA, the medication seems to have produced a temporary oxidative stress response that might have affected protein stability and folding, followed by a secondary inflammatory response.

  2. Effect of permethrin-impregnated underwear on body lice in sheltered homeless persons: a randomized controlled trial.

    Science.gov (United States)

    Benkouiten, Samir; Drali, Rezak; Badiaga, Sékéné; Veracx, Aurélie; Giorgi, Roch; Raoult, Didier; Brouqui, Philippe

    2014-03-01

    The control of body lice in homeless persons remains a challenge. To determine whether the use of long-lasting insecticide-treated underwear provides effective long-term protection against body lice in homeless persons. A randomized, double-blind, placebo-controlled trial was conducted in February and December 2011 in 2 homeless shelters (Madrague Ville and Forbin) in Marseille, France. Of the 125 homeless persons screened for eligibility, 73 body lice-infested homeless persons, 18 years or older, were enrolled. Body lice-infested homeless persons were randomly assigned to receive 0.4% permethrin-impregnated underwear or an identical-appearing placebo for 45 days, in a 1:1 ratio, with a permuted block size of 10. Visits were scheduled at days 14 and 45. Data regarding the presence or absence of live body lice were collected. The primary and secondary end points were the proportions of homeless persons free of body lice on days 14 and 45, respectively. Mutations associated with permethrin resistance in the body lice were also identified. Significantly more homeless persons receiving permethrin-impregnated underwear than homeless persons receiving the placebo were free of body lice on day 14 in the intent-to-treat population (28% vs 9%; P = .04), with a between-group difference of 18.4 percentage points (95% CI, 1.4-35.4), and in the per-protocol population (34% vs 11%; P = .03), with a between-group difference of 23.7 percentage points (95% CI, 3.6-43.7). This difference was not sustained on day 45. At baseline, the prevalence of the permethrin-resistant haplotype was 51% in the permethrin group and 44% in the placebo group. On day 45, the permethrin-resistant haplotype was significantly more frequent in the permethrin group than in the placebo group (73% vs 45%, P < .001). Permethrin-impregnated underwear is more efficient than placebo at eliminating body louse infestations by day 14; however, this difference was not sustained on day 45. The use of permethrin

  3. Transcriptomic responses to emamectin benzoate in Pacific and Atlantic Canada salmon lice Lepeophtheirus salmonis with differing levels of drug resistance.

    Science.gov (United States)

    Sutherland, Ben J G; Poley, Jordan D; Igboeli, Okechukwu O; Jantzen, Johanna R; Fast, Mark D; Koop, Ben F; Jones, Simon R M

    2015-02-01

    Salmon lice Lepeophtheirus salmonis are an ecologically and economically important parasite of wild and farmed salmon. In Scotland, Norway, and Eastern Canada, L. salmonis have developed resistance to emamectin benzoate (EMB), one of the few parasiticides available for salmon lice. Drug resistance mechanisms can be complex, potentially differing among populations and involving multiple genes with additive effects (i.e., polygenic resistance). Indicators of resistance development may enable early detection and countermeasures to avoid the spread of resistance. Here, we collect sensitive Pacific L. salmonis and sensitive and resistant Atlantic L. salmonis from salmon farms, propagate in laboratory (F1), expose to EMB in bioassays, and evaluate either baseline (Atlantic only) or induced transcriptomic differences between populations. In all populations, induced responses were minor and a cellular stress response was not identified. Pacific lice did not upregulate any genes in response to EMB, but downregulated degradative enzymes and transport proteins at 50 ppb EMB. Baseline differences between sensitive and now resistant Atlantic lice were much greater than responses to exposures. All resistant lice overexpressed degradative enzymes, and resistant males, the most resistant group, overexpressed collagenases to the greatest extent. These results indicate an accumulation of baseline expression differences related to resistance.

  4. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  5. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  6. Effectiveness of isopropyl myristate/cyclomethicone D5 solution of removing cuticular hydrocarbons from human head lice (Pediculus humanus capitis

    Directory of Open Access Journals (Sweden)

    Barnett Eric

    2012-09-01

    Full Text Available Abstract Background In the treatment of human head lice infestation, healthcare providers are increasingly concerned about lice becoming resistant to existing pesticide treatments. Traditional pesticides, used to control these pests, have a neurological mechanism of action. This publication describes a topical solution with a non-traditional mechanism of action, based on physical disruption of the wax layer that covers the cuticle of the louse exoskeleton. This topical solution has been shown clinically to cure 82% of patients with only a 10-minute treatment time, repeated once after 7 days. All insects, including human head lice, have a wax-covered exoskeleton. This wax, composed of hydrocarbons, provides the insect with protection against water loss and is therefore critical to its survival. When the protective wax is disrupted, water loss becomes uncontrollable and irreversible, leading to dehydration and death. A specific pattern of hydrocarbons has been found in all of the head louse cuticular wax studied. Iso-octane effectively removes these hydrocarbons from human head lice’s cuticular wax. Methods A method of head louse cuticle wax extraction and analysis by gas chromatography was developed. Human head lice (Pediculus humanus capitis were collected from infested patients and subjected to any of three extraction solvents comprising either the test product or one of two solvents introduced as controls. A gas chromatograph equipped with a flame ionization detector (GC/FID was used to determine the presence of hydrocarbons in the three head lice extracts. Results In the study reported herein, the test product isopropyl myristate/cyclomethicone D5 (IPM/D5 was shown to perform comparably with iso-octane, effectively extracting the target hydrocarbons from the cuticular wax that coats the human head louse exoskeleton. Conclusions Disruption of the integrity of the insect cuticle by removal of specific hydrocarbons found in the cuticular wax

  7. Molecular detection of Acinetobacter species in lice and keds of domestic animals in Oromia Regional State, Ethiopia.

    Science.gov (United States)

    Kumsa, Bersissa; Socolovschi, Cristina; Parola, Philippe; Rolain, Jean-Marc; Raoult, Didier

    2012-01-01

    This study was conducted to determine the presence of Acinetobacter and Rickettsia species DNA in lice and Melophagus ovinus (sheep ked) of animals from Oromia Regional State in Ethiopia. From September through November 2011, a total of 207 cattle, 85 sheep, 47 dogs and 16 cats were examined for ectoparasites. Results of morphological identification revealed several species of ectoparasites: Linognathus vituli (L. vituli), Bovicola bovis (B. bovis) and Solenopotes capillatus (S. capillatus) on cattle; B. ovis and Melophagus ovinus (M. ovinus) on sheep; and Heterodoxus spiniger (H. spiniger) on dogs. There was a significantly (p≤0.0001) higher prevalence of L. vituli observed in cattle than both S. capillatus and B. bovis. Molecular identification of lice using an 18S rRNA gene analysis confirms the identified lice species by morphological methods. We detected different Acinetobacter species among lice (11.1%) and keds (86.4%) including A. soli in L. vituli of cattle, A. lowffii in M. ovinus of sheep, A. pittii in H. spiniger of dogs, 1 new Acinetobacter spp. in M. ovinus and 2 new Acinetobacter spp. in H. spiniger of dogs using partial rpoB gene sequence analysis. There was a significantly higher prevalence of Acinetobacter spp. in keds than in lice (p≤0.00001). Higher percentage of Acinetobacter spp. DNA was detected in H. spiniger than in both B. ovis and L. vituli (p≤0.00001). Carbapenemase resistance encoding genes for blaOXA-23, blaOXA-24, blaOXA-58, blaNDM-1 and blaOXA-51 were not found in any lice and keds. These findings suggest that synanthropic animals and their ectoparasites might increase the risk of human exposure to zoonotic pathogens and could be a source for Acinetobacter spp. infections in humans. However, additional epidemiological data are required to determine whether ectoparasites of animals can act as environmental reservoirs and play a role in spreading these bacteria to both animal and human hosts.

  8. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  9. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  10. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  11. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  12. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  13. Prevalence of head lice infestation and pediculicidal effect of permethrine shampoo in primary school girls in a low-income area in southeast of Iran.

    Science.gov (United States)

    Soleimani-Ahmadi, Moussa; Jaberhashemi, Seyed Aghil; Zare, Mehdi; Sanei-Dehkordi, Alireza

    2017-07-24

    Head lice infestation is a common public health problem that is most prevalent in primary school children throughout the world, especially in developing countries including different parts of Iran. This study aimed to determine the prevalence and risk factors associated with head lice infestation and pediculicidal effect of 1% permethrin shampoo in primary schools girls of Bashagard County, one of the low socioeconomic areas in southeast of Iran. In this interventional study six villages with similar demographical situations were selected and randomly assigned into intervention and control areas. In each area 150 girl students aged 7-12 years were selected randomly and screened for head lice infestation by visual scalp examination. In intervention area, treatment efficacy of 1% permethrin shampoo was evaluated via re-examination for infestation after one, two, and three weeks. Pre-tested structured questionnaire was used to collect data on socio-demographic and associated factors of head lice infestation. The prevalence of head lice infestation was 67.3%. There was significant association between head lice infestation and school grade, family size, parents' literacy, bathing facilities, frequency of hair washing, and use of shared articles (p shampoo for head lice treatment was 29.2, 68.9, and 90.3% after the first, second, and third weeks, respectively. The head lice infestation is a health problem in primary school girls of Bashagard County. Improvement of socioeconomic status and providing appropriate educational programs about head lice risk factors and prevention can be effective for reduction of infestation in this area. This trial has been registered and approved by Hormozgan University of Medical Sciences ethical committee (Trial No.764). Trial registration date: March 17 2014.

  14. HEAD LICE IN HAIR SAMPLES FROM YOUTHS, ADULTS AND THE ELDERLY IN MANAUS, AMAZONAS STATE, BRAZIL

    Directory of Open Access Journals (Sweden)

    Suellen Cristina Barbosa NUNES

    2015-06-01

    Full Text Available A study of head lice infestations among young people, adults and elderly individuals was conducted from August 2010 to July 2013 in Manaus, AM, Northern Brazil. Hair samples collected from 1,860 individuals in 18 barber shops and beauty parlors were examined for the ectoparasite. The occurrence of pediculosis and its association with factors, such as sex, age, ethnicity, hair characteristics and the socioeconomic profile of salon customers, salon location and seasonal variation were determined. The overall occurrence rate was 2.84%. Occurrence was higher in hair samples from non-blacks and the elderly. Higher occurrence was also observed during kindergarten, elementary and junior education school holidays. The results indicate that the occurrence of head lice among young people, adults and the elderly in Manaus is relatively low compared to that determined in children and in other regions of the country. After children, the elderly were the most affected. The study also indicated the need to adopt additional procedures to improve surveys among the population with low or no purchasing power, which is usually the most affected by this ectoparasitic disease.

  15. HEAD LICE IN HAIR SAMPLES FROM YOUTHS, ADULTS AND THE ELDERLY IN MANAUS, AMAZONAS STATE, BRAZIL.

    Science.gov (United States)

    Nunes, Suellen Cristina Barbosa; Moroni, Raquel Borges; Mendes, Júlio; Justiniano, Sílvia Cássia Brandão; Moroni, Fábio Tonissi

    2015-01-01

    A study of head lice infestations among young people, adults and elderly individuals was conducted from August 2010 to July 2013 in Manaus, AM, Northern Brazil. Hair samples collected from 1,860 individuals in 18 barber shops and beauty parlors were examined for the ectoparasite. The occurrence of pediculosis and its association with factors, such as sex, age, ethnicity, hair characteristics and the socioeconomic profile of salon customers, salon location and seasonal variation were determined. The overall occurrence rate was 2.84%. Occurrence was higher in hair samples from non-blacks and the elderly. Higher occurrence was also observed during kindergarten, elementary and junior education school holidays. The results indicate that the occurrence of head lice among young people, adults and the elderly in Manaus is relatively low compared to that determined in children and in other regions of the country. After children, the elderly were the most affected. The study also indicated the need to adopt additional procedures to improve surveys among the population with low or no purchasing power, which is usually the most affected by this ectoparasitic disease.

  16. A Study of Fish Lice (Argulus Sp. Infection in Freshwater Food Fish

    Directory of Open Access Journals (Sweden)

    Aalberg K.

    2016-09-01

    Full Text Available Argulus sp., commonly referred to as fish lice, are crustacean ectoparasites of fishes. The hematophagous parasites attach to and feed off the integument of their hosts. Outbreaks of epizootics have been reported worldwide, causing mass mortalities and having serious economic implications for fish farms and culture efforts. Argulus fish lice may also serve as vectors of infectious diseases and as intermediate hosts of other parasites. Two native European species, A. foliaceus and A. coregoni, as well as the invasive Japanese fish louse A. japonicus, have previously been recorded in Slovakia. This study investigated samples collected at fish farms and culture sites of Common carp (Cyprinus carpio L., Pike-perch (Sander lucioperca L. and Brook trout (Salvelinus fontinalis M. in Eastern Slovakia, as well as samples collected from live fish imported to the Slovak Republic. A quantitative description of the of Argulus sp. was recorded from each locality. Samples from Common carp were identified as the invasive A. japonicus, and samples from Pike-perch and Brook trout were identified as A. foliaceus. Evidence of a mixed infection of Pike-perch with both A. foliaceus and A. japonicus was found in samples from Zemplínska Šírava, which was substantiated by electron microscopic examination. Morphometric characteristics were measured and averages and ranges produced for each species and sex.

  17. Control of head lice with a coconut-derived emulsion shampoo.

    Science.gov (United States)

    Connolly, M; Stafford, K A; Coles, G C; Kennedy, C T C; Downs, A M R

    2009-01-01

    To evaluate a novel coconut-derived emulsion (CDE) shampoo against head lice infestation in children. A school trial in which pupils were treated on days 0 and 7 and checked on days 8 and 15 and a family trial where product was applied by parents three times in 2 weeks or used as a cosmetic shampoo and checked on days 14 and days 70. UK schools in Bristol and Western-super-Mare and families in Northern Somerset. Numbers of children free from infestation after treatment. In the school trial, percentage cures at day 8 were 14% (permethrin, n=7) and 61% (CDE, n=37). In the family trial where all family members were treated, cure rate was 96% (n=28), and if the shampoo was subsequently used as a cosmetic shampoo, only 1 of 12 children became re-infested after 10 weeks. CDE shampoo is a novel effective method of controlling head lice and used after treatment as a cosmetic shampoo can aid in the reduction of re-infestation.

  18. A screening of multiple classes of pharmaceutical compounds for effect on preadult salmon lice Lepeophtheirus salmonis.

    Science.gov (United States)

    Aaen, S M; Horsberg, T E

    2016-10-01

    The salmon louse, Lepeophtheirus salmonis Krøyer, is the major obstacle facing a sustainable future for farmers of salmonids in the North Atlantic Ocean. Medicinal compounds have been the most utilized tool to prevent salmon lice infestation; however, the active compounds have become less effective or considered environmentally unfriendly in the past years. Novel medicinal compounds are thus highly desired. In two experiment series, 26 medicinal compounds were screened for their efficacy against salmon lice, in a 30-min exposure and 24-h exposure, respectively. Pyriprole, imidacloprid, cartap and spinetoram were effective at 50 mg L(-1) in the short-time exposure. In the 24-h exposure, pyriprole, propoxur, cartap, imidacloprid, fenoxycarb, pyriproxyfen, nitenpyram, spinetoram, spiromesifen and diflubenzuron induced a high level of immobilization at 5 mg L(-1) . The EC50 values of the effective compounds were calculated in further titration studies for both exposure periods. Several physiological and biochemical pathways were discovered as possible targets for medicinal intervention against the salmon louse. © 2016 John Wiley & Sons Ltd.

  19. Mapping the social network: tracking lice in a wild primate (Microcebus rufus population to infer social contacts and vector potential

    Directory of Open Access Journals (Sweden)

    Zohdy Sarah

    2012-03-01

    Full Text Available Abstract Background Studies of host-parasite interactions have the potential to provide insights into the ecology of both organisms involved. We monitored the movement of sucking lice (Lemurpediculus verruculosus, parasites that require direct host-host contact to be transferred, in their host population of wild mouse lemurs (Microcebus rufus. These lemurs live in the rainforests of Madagascar, are small (40 g, arboreal, nocturnal, solitary foraging primates for which data on population-wide interactions are difficult to obtain. We developed a simple, cost effective method exploiting the intimate relationship between louse and lemur, whereby individual lice were marked, without removal from their host, with an individualized code, and tracked throughout the lemur population. We then tested the hypotheses that 1 the frequency of louse transfers, and thus interactions, would decrease with increasing distance between paired individual lemurs; 2 due to host polygynandry, social interactions and hence louse transfers would increase during the onset of the breeding season; and 3 individual mouse lemurs would vary in their contributions to the spread of lice. Results We show that louse transfers involved 43.75% of the studied lemur population, exclusively males. Louse transfers peaked during the breeding season, perhaps due to increased social interactions between lemurs. Although trap-based individual lemur ranging patterns are restricted, louse transfer rate does not correlate with the distance between lemur trapping locales, indicating wider host ranging behavior and a greater risk of rapid population-wide pathogen transmission than predicted by standard trapping data alone. Furthermore, relatively few lemur individuals contributed disproportionately to the rapid spread of lice throughout the population. Conclusions Using a simple method, we were able to visualize exchanges of lice in a population of cryptic wild primates. This method not only

  20. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  1. Determinación de sílice libre en materias primas para la industria del cemento

    Directory of Open Access Journals (Sweden)

    Calleja, J.

    1965-12-01

    Full Text Available Not availableLa existencia de sílice libre en las materias primas y, por lo tanto, en los crudos empleados en la fabricación de cemento Portland es desventajosa por la escasa reactividad de esta sílice, sobre todo si no posee una finura suficiente. La determinación de sílice cuarzosa en tales materiales es decisiva para la buena marcha de la clinkerización en fábricas cuyas materias primas adolecen de la desventaja de contenerla. Los métodos propugnados suelen ser poco reproducibles y precisos, y dan resultados bastante erráticos. En el presente trabajo, y después de haber ensayado diversos métodos citados en la bibliografía, se describe y recomienda un procedimiento, basado en el ataque del material por ácido pirofosfórico. Las variables que juegan en el proceso descrito son el tamaño de grano de la muestra, en particular el de la sílice libre, la temperatura y el tiempo de ataque. En las condiciones que se especifican se consigue una disolución prácticamente total de los silicatos, sin que apenas se· disuelvan las partículas más finas de cuarzo. Con ello se consigue una exactitud y una precisión tal como pone de manifiesto el análisis estadístico de los resultados obtenidos al determinar sílice libre en diversas materias primas y crudos para cemento.

  2. Cristalización de vidrios ricos en sílice preparados mediante sol-gel en el sistema alúmina-circona-sílice

    Directory of Open Access Journals (Sweden)

    Popa, M.

    2004-02-01

    Full Text Available The crystallization of ZrSiO4 and its evolution with temperature from chemically homogeneous alumina-silica-zirconia powders prepared by sol-gel method from alcoxide mixtures was studied in the silica-rich region. A glass with the same composition was obtained by quenching in water from the melt. The gel-glasses evolution and microstructure were studied by means of XRD, IR and SEM/EDX, in the range of temperatures up to 1650oC. The materials consisted mainly of amorphous phase up to 1200oC, at which partial crystallization of cristobalite was observed. IR spectroscopy analysis showed zircon bands after thermal treatment at 1200oC. The crystallization of zircon and zirconia particles at 1550oC was confirmed by SEM/EDX analysis. At 1650oC the only stable crystalline phase observed after 40 h of thermal treatment was zircon.

    La cristalización de ZrSiO4 y su evolución con la temperatura se ha estudiado en la región rica en sílice, a partir de polvos amorfos y químicamente homogéneos de alumina-sílice-circona, preparados mediante método sol-gel usando mezclas de alcóxidos. Se obtuvo un vidrio con idéntica composición mediante enfriamiento rápido por inmersión en agua del material fundido. La evolución y la microestructura de los vidrios obtenidos se estudió mediante difracción de rayos X, infrarrojos, microscopía electrónica de barrido y análisis químico, en el rango de temperaturas hasta 1650oC. Los materiales están formados principalmente por fase amorfa hasta 1200oC, temperatura a la cual se observa la cristalización parcial de cristobalita. El análisis por espectroscopía de infrarrojos muestra bandas de circón en muestras tratadas térmicamente por encima de 1200oC. Las observaciones mediante microscopía electrónica confirman la cristalización de partículas de circón y circona a 1550oC. A 1650oC la cristobalita ha fundido y la única fase cristalina estable detectada mediante XRD tras 40 h a esta temperatura

  3. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  4. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  5. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  6. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  7. Propiedades mecánicas de aerogeles híbridos de sílice

    Directory of Open Access Journals (Sweden)

    Piñero, M.

    2005-10-01

    Full Text Available Hybrids silica aerogels have been obtained by means the high power ultrasounds application in the precursor liquid and the drying of the wet gel under the supercritical condition of ethanol. The organic chains don’t degrade thermally and accelerate the network shrinkage process by thermal activation. The ultrasounds induce an organic chain crosslinking bonding to the porous silica clusters and avoid its cyclidation. The failure tests by uniaxial compression show an increase of the rupture modulus, passing from 8 MPa for a pure silica aerogel to 24 MPa for an aerogel with a 50 weight % of polymer content. It is also noted a continuous decrease of the Young’s modulus with the polymer content (from 100 to 56 MPa. These hybrid aerogels behave as elastomers with up to a 50% strain, showing a decrease in the relaxation viscoelastic modulus.

    Se han obtenido aerogeles híbridos de sílice orgánico-inorgánico por aplicación de ultrasonidos de alta potencia en los precursores líquidos y posterior secado del gel húmedo en condiciones supercríticas en etanol. Las cadenas orgánicas no se degradan térmicamente y aceleran el proceso de contracción de la red por activación térmica. Los ultrasonidos inducen un entrecruzamiento de cadenas orgánicas que unen los cúmulos de sílice porosa y evitan su ciclidación. Los ensayos de ruptura en compresión uniaxial indicaron un aumento del módulo de ruptura, pasando de 8 MPa para el aerogel de sílice pura hasta 24 MPa para un aerogel de 50% en peso de contenido de polímero. Se observa asimismo una disminución continua en el módulo de Young con el contenido de polímero (de 100 a 56 MPa. Estos aerogeles híbridos se comportan como elastómeros con deformaciones de hasta el 50%, mostrando una disminución del módulo de relajación viscoelástica.

  8. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  9. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  10. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  11. Variation in mitochondrial minichromosome composition between blood-sucking lice of the genus Haematopinus that infest horses and pigs.

    Science.gov (United States)

    Song, Simon D; Barker, Stephen C; Shao, Renfu

    2014-03-31

    The genus Haematopinus contains 21 species of blood-sucking lice, parasitizing both even-toed ungulates (pigs, cattle, buffalo, antelopes, camels and deer) and odd-toed ungulates (horses, donkeys and zebras). The mitochondrial genomes of the domestic pig louse, Haematopinus suis, and the wild pig louse, Haematopinus apri, have been sequenced recently; both lice have fragmented mitochondrial genomes with 37 genes on nine minichromosomes. To understand whether the composition of mitochondrial minichromosomes and the gene content and gene arrangement of each minichromosome are stable within the genus, we sequenced the mitochondrial genome of the horse louse, Haematopinus asini. We used a PCR-based strategy to amplify four mitochondrial minichromosomes in near full-length, and then amplify the entire coding regions of all of the nine mitochondrial minichromosomes of the horse louse. These amplicons were sequenced with an Illumina Hiseq platform. We identified all of the 37 mitochondrial genes typical of bilateral animals in the horse louse, Haematopinus asini; these genes are on nine circular minichromosomes. Each minichromosome is 3.5-5.0 kb in size and consists of a coding region and a non-coding region except R-nad4L-rrnS-C minichromosome, which contains two coding regions and two non-coding regions. Six of the nine minichromosomes of the horse louse have their counterparts in the pig lice with the same gene content and gene arrangement. However, the gene content and arrangement of the other three minichromosomes of the horse louse, including R-nad4L-rrnS-C, are different from that of the other three minichromosomes of the pig lice. Comparison between the horse louse and the pig lice revealed variation in the composition of mitochondrial minichromosomes within the genus Haematopinus, which can be accounted for by gene translocation events between minichromosomes. The current study indicates that inter-minichromosome recombination plays a major role in generating the

  12. Molecular detection of Acinetobacter species in lice and keds of domestic animals in Oromia Regional State, Ethiopia.

    Directory of Open Access Journals (Sweden)

    Bersissa Kumsa

    Full Text Available This study was conducted to determine the presence of Acinetobacter and Rickettsia species DNA in lice and Melophagus ovinus (sheep ked of animals from Oromia Regional State in Ethiopia. From September through November 2011, a total of 207 cattle, 85 sheep, 47 dogs and 16 cats were examined for ectoparasites. Results of morphological identification revealed several species of ectoparasites: Linognathus vituli (L. vituli, Bovicola bovis (B. bovis and Solenopotes capillatus (S. capillatus on cattle; B. ovis and Melophagus ovinus (M. ovinus on sheep; and Heterodoxus spiniger (H. spiniger on dogs. There was a significantly (p≤0.0001 higher prevalence of L. vituli observed in cattle than both S. capillatus and B. bovis. Molecular identification of lice using an 18S rRNA gene analysis confirms the identified lice species by morphological methods. We detected different Acinetobacter species among lice (11.1% and keds (86.4% including A. soli in L. vituli of cattle, A. lowffii in M. ovinus of sheep, A. pittii in H. spiniger of dogs, 1 new Acinetobacter spp. in M. ovinus and 2 new Acinetobacter spp. in H. spiniger of dogs using partial rpoB gene sequence analysis. There was a significantly higher prevalence of Acinetobacter spp. in keds than in lice (p≤0.00001. Higher percentage of Acinetobacter spp. DNA was detected in H. spiniger than in both B. ovis and L. vituli (p≤0.00001. Carbapenemase resistance encoding genes for blaOXA-23, blaOXA-24, blaOXA-58, blaNDM-1 and blaOXA-51 were not found in any lice and keds. These findings suggest that synanthropic animals and their ectoparasites might increase the risk of human exposure to zoonotic pathogens and could be a source for Acinetobacter spp. infections in humans. However, additional epidemiological data are required to determine whether ectoparasites of animals can act as environmental reservoirs and play a role in spreading these bacteria to both animal and human hosts.

  13. A common-garden experiment to quantify evolutionary processes in copepods: the case of emamectin benzoate resistance in the parasitic sea louse Lepeophtheirus salmonis.

    Science.gov (United States)

    Ljungfeldt, Lina Eva Robin; Espedal, Per Gunnar; Nilsen, Frank; Skern-Mauritzen, Mette; Glover, Kevin Alan

    2014-05-19

    The development of pesticide resistance represents a global challenge to food production. Specifically for the Atlantic salmon aquaculture industry, parasitic sea lice and their developing resistance to delousing chemicals is challenging production. In this study, seventeen full sibling families, established from three strains of Lepeophtheirus salmonis displaying differing backgrounds in emamectin benzoate (EB) tolerance were produced and quantitatively compared under a common-garden experimental design. Lice surviving to the preadult stage were then exposed to EB and finally identified through the application of DNA parentage testing. With the exception of two families (19 and 29%), survival from the infectious copepod to preadult stage was very similar among families (40-50%). In contrast, very large differences in survival following EB exposure were observed among the families (7.9-74%). Family survival post EB exposure was consistent with the EB tolerance characteristics of the strains from which they were established and no negative effect on infection success were detected in association with increased EB tolerance. Two of the lice families that displayed reduced sensitivity to EB were established from a commercial farm that had previously used this chemical. This demonstrates that resistant alleles were present on this farm even though the farm had not reported treatment failure. To our knowledge, this represents the first study where families of any multi-cellular parasite have been established and compared in performance under communal rearing conditions in a common-garden experiment. The system performed in a predictable manner and permitted, for the first time, elucidation of quantitative traits among sea lice families. While this experiment concentrated on, and provided a unique insight into EB sensitivity among lice families, the experimental design represents a novel methodology to experimentally address both resistance development and other

  14. Coastal Sea Levels, Impacts, and Adaptation

    Directory of Open Access Journals (Sweden)

    Thomas Wahl

    2018-02-01

    Full Text Available Sea-level rise (SLR poses a great threat to approximately 10% of the world’s population residing in low-elevation coastal zones (i.e., land located up to 10 m of present-day mean sea-level (MSL[...

  15. Head Lice

    Science.gov (United States)

    ... Registration General information Housing & travel Education Exhibit hall Mobile app 2019 Annual Meeting Derm Exam Prep Course ... SkinPAC State societies Scope of practice Truth in advertising NP/PA laws Action center Public and patients ...

  16. Body Lice

    Science.gov (United States)

    ... to live in crowded, unclean conditions. They include: War refugees Homeless people Victims of natural disasters Dogs, ... logo are trademarks of Mayo Foundation for Medical Education and Research. © 1998-2018 Mayo Foundation for Medical ...

  17. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  18. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  19. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  20. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  2. Lice (Insecta: Phthiraptera) From species of the families Furnariidae, Tyrannidae, Turdidae and icteridae (Aves: Passeriformes) from Chile

    OpenAIRE

    González-Acuña, Daniel; Vergara, Francisco; Moreno, Lucila; Barrientos, Carlos; Ardiles, Karen; Cicchino, Armando

    2006-01-01

    A total of 185 birds (nine captured alive and 176 preserved in a museum), belonging to the families Furnariidae (n=14), Tyrannidae (n=4), Turdidae (n=24) and Icteridae (n=143) (Aves: Passeriformes) were searched for lice (Phthiraptera: Philopteridae, Menoponidae). The species collected and identified were: Furnaricola titicacae Carriker 1949 from Phleocryptes melanops (Vieillot 1817), and Picicola cuniculariae Cicchino 1981 from Geositta rufipennis fasciata (Burmeister 1860) (Furnariidae); Pi...

  3. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  4. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Science.gov (United States)

    Nafstad, O; Grønstøl, H

    2001-01-01

    The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days) after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment. PMID:11455906

  5. The Effect of Eradication of Lice on the Occurrence of the Grain Defect Light Flecks and Spots on Cattle Hides

    Directory of Open Access Journals (Sweden)

    Grønstøl H

    2001-03-01

    Full Text Available The influence of an eradication programme for lice on the prevalence of light flecks and spots on cattle hides was studied in 33 dairy cattle herds during a period of two and a half years. Lice were eradicated from the main group of herds after 9 to 12 months and the quality of the hides before and after treatment was compared. Hides from slaughtered animals were collected during the study period, tanned and examined with special emphasis on the occurrence of the grain damage light flecks and spots. The prevalence of hides without light flecks and spots increased from 24.2% before treatment to 61.6% after treatment. The prevalence of hides free from the damage increased significantly in all examined anatomical regions. The improvement in hide quality was most marked in the shoulders and neck region which corresponded to the major predilection site of cattle lice. The prevalence of hides with light flecks and spots started to decrease in the first period (2–40 days after eradication. The changes after treatment suggested that most healing process took place over a period of about 4 months. The eradication programme eliminated the seasonal variation in the prevalence of light flecks and spots which was present before treatment.

  6. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  7. Laboratory and clinical trials of cocamide diethanolamine lotion against head lice

    Directory of Open Access Journals (Sweden)

    Ian F. Burgess

    2015-11-01

    Full Text Available Context. During the late 1990s, insecticide resistance had rendered a number of treatment products ineffective; some companies saw this as an opportunity to develop alternative types of treatment. We investigated the possibility that a surfactant-based lotion containing 10% cocamide diethanolamine (cocamide DEA was effective to eliminate head louse infestation.Settings and Design. Initial in vitro testing of the lotion formulation versus laboratory reared body/clothing lice, followed by two randomised, controlled, community-based, assessor blinded, clinical studies.Materials and Methods. Preliminary laboratory tests were performed by exposing lice or louse eggs to the product using a method that mimicked the intended use. Clinical Study 1: Children and adults with confirmed head louse infestation were treated by investigators using a single application of aqueous 10% cocamide DEA lotion applied for 60 min followed by shampooing or a single 1% permethrin creme rinse treatment applied to pre-washed hair for 10 min. Clinical Study 2: Compared two treatment regimens using 10% cocamide DEA lotion that was concentrated by hair drying. A single application left on for 8 h/overnight was compared with two applications 7 days apart of 2 h duration, followed by a shampoo wash.Results. The initial laboratory tests showed a pediculicidal effect for a 60 min application but limited ovicidal effect. A longer application time of 8 h or overnight was found capable of killing all eggs but this differed between batches of test material. Clinical Study 1: Both treatments performed badly with only 3/23 (13% successful treatments using cocamide DEA and 5/25 (23.8% using permethrin. Clinical Study 2: The single overnight application of cocamide DEA concentrated by hair drying gave 10/56 (17.9% successes compared with 19/56 (33.9% for the 2 h application regimen repeated after 1 week. Intention to treat analysis showed no significant difference (p = 0.0523 between the

  8. Efficacy of herbal shampoo base on native plant against head lice (Pediculus humanus capitis De Geer, Pediculidae: Phthiraptera) in vitro and in vivo in Thailand.

    Science.gov (United States)

    Soonwera, Mayura

    2014-09-01

    Head lice infestation (or pediculosis) is an important public health problem in Thailand, especially in children between the ages 5 and 11 years. Head lice resistance is increasing, chemical pediculicides have lost their efficacy, and, therefore, alternative pediculicides such as herbal shampoos have been proposed to treat head lice infestation. Thus, the present study investigated the efficacy of three herbal shampoos based on native plants in Thailand (Acorus calamus Linn., Phyllanthus emblica Linn., and Zanthoxylum limonella Alston) against head lice and compared them with carbaryl shampoo (Hafif shampoo, 0.6% w/v carbaryl), malathion shampoo (A-Lice shampoo, 1.0% w/v malathion), and commercial shampoos (Babi Mild Natural' N Mild and Johnson's baby shampoo) in order to assess their in vitro and in vivo efficacy. For in vitro study, doses of 0.12 and 0.25 ml/cm(2) of each herbal shampoo were applied to filter paper, then 10 head lice were place on the filter paper. The mortalities of head lice were recorded at 5, 15, 30, and 60 min. The results revealed that all herbal shampoo were more effective on pediculicidal activity than chemical and commercial shampoos with 100% mortality at 15 min; LT₅₀ values ranged from 0.25 to 1.90 min. Meanwhile, chemical shampoos caused 20-80% mortality, and LT₅₀ values ranged from 6.50 to 85.43 min. On the other side, commercial shampoos showed 4.0% mortality. The most effective pediculicide was Z. limonella shampoo, followed by A. calamus shampoo, P. emblica shampoo, carbaryl shampoo, malathion shampoo, and commercial shampoo, respectively. In vivo results showed that all herbal shampoos were also more effective for head lice treatment than chemical and commercial shampoos with 94.67-97.68% of cure rate after the first treatment; the second treatment, 7 days later, revealed that the cure rate was 100%. Meanwhile, chemical shampoo showed 71.67-93.0% of cure rate and, unfortunately, commercial shampoos were nontoxic to

  9. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  10. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  11. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  12. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  13. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    's promises and commitments. Fulfilling our promises in the Nuclear Non-Proliferation Treaty, now with 189 member States, must be a primary aim. This Treaty, essential to our security, will be reviewed formally in 2005 at the UN. The International Atomic Energy Agency (IAEA) performs a vital role under the Treaty - it's the world's nuclear inspectorate to check that countries are not pursuing nuclear weapons. I've had the chance to visit the UN and IAEA at their headquarters in Vienna, Austria, and know how tough the job can be. We need to back the IAEA and make sure it stays strong in our fight against nuclear weapons. At the 2000 Review of the Treaty, the US along with all other parties to the Treaty made a pledge. Let me remind you of what was promised, and I quote: 'an unequivocal undertaking by the nuclear weapons States to accomplish the total elimination of their nuclear arsenals. leading to nuclear disarmament.' There are tens of thousands of nuclear weapons in the world, over 90% are possessed by Russia and the US. Most are many times more devastating than those used on Hiroshima. The arsenals of Russia and the US are armed, targeted and poised, waiting for three short computer signals to fire. These hair trigger devices represent the devastation of approximately 100,000 Hiroshimas and pose a horrific threat to life. The use of a nuclear weapon could take place by accident or design by States, or even terrorists. These weapons pose an unacceptable risk to the planet. We must demonstrate our unambiguous commitment to fulfill our promises. Other-wise, the prospect of more nuclear weapons States, and the construction of new nuclear weapons, will only increase human peril. The world needs a more effective non-proliferation and disarmament regime and is looking to us for leadership

  14. Can neem oil help eliminate lice? Randomised controlled trial with and without louse combing

    Directory of Open Access Journals (Sweden)

    Christine M. Brown

    2017-06-01

    Full Text Available Background: Neem oil and wet combing with conditioner are both claimed to facilitate elimination of head louse infestation. The aim of this pilot study was to identify whether a 1% neem oil lotion showed activity itself and/or enhanced the effectiveness of combing in treating infestation. Methods: We treated 47 participants with 1% neem-based lotion on four occasions 3-4 days apart in a randomised, community based trial, analysed by intention to treat. The participants were randomly divided between two groups: One group used a grooming comb (placebo and the other a head louse detection and removal comb (wet combing with conditioner method to systematically comb the hair. Cure was defined as no lice on both Day 10 and Day 14. Results: The cure rates of 6/24 (25.0% for the placebo comb group and 8/23 (34.8% for the louse comb group were not significantly different. Conclusion: These results indicate that this formulation of neem oil was ineffective in the treatment of head louse infestations, even when accompanied by combing. Both combing methods were also ineffective, despite being implemented throughout by trained professionals.

  15. Detection of Bartonellaspp. and Rickettsiaspp. in fleas, ticks and lice collected in rural areas of Peru

    Directory of Open Access Journals (Sweden)

    Abraham G. Cáceres

    2013-12-01

    Full Text Available Bartonellosis and rickettsiosis are commonly reported in Peru. In order to detect Bartonella sp. and Rickettsiasp. in fleas, ticks and lice, specimens from five distinct locations in Peru (Marizagua, Cajaruro, Jamalca, Lonya Grande and El Milagro were collected and screened for the presence of these bacteria using PCR and later confirmation by DNA sequencing. The specimens collected were distributed in 102 pools (76 Ctenocephalides felis, 2 Ctenocephalides canis, 16 Pulex irritans, 5 Pediculus humanus, 2 Rhiphicephalus sanguineus, and 1 Boophilus spp., where Bartonellawas detected in 17 pools (6 of C. felis, 9 of P. irritans, 1 of C. canis, and 1 P. humanus. Also, Rickettsiawas detected in 76 pools (62 C. felis, 10 P. irritans, 2 P. humanus, and 2 C. canis. Bartonella clarridgeiaewas detected in C. felis, C. canisand P. irritanspools at 5.3%, 50% and 12.5%, respectively.Bartonella rochalimaewas detected in one C. felisand two P. irritanspools at 1.3% and 12.5%, respectively. Furthermore, B. henselaewas detected in one C. felispool and one P. humanuspool corresponding to 1.3% and 20%, respectively; and Bartonella spp.was also found in 5 pools of P. irritansat 31.3%. Additionally, R. feliswas detected in C. felis, C. canisand P. irritanspools at 76.3%, 100% and 37.5%, respectively; and Rickettsia spp. was detected in C. felis, P. irritansand P. humanuspools at 5.3%, 25% and 40%, respectively. These results demonstrate the circulation of these bacteria in Peru.

  16. Efectos aerodinámicos de hélices pusher sobre la configuración aerodinámica de un flap en condiciones de bajo Reynolds

    OpenAIRE

    Savloff, Nehuen; Trochez Segura, Juan M.; Algozino, Santiago; Marañón Di Leo, Julio

    2015-01-01

    Las hélices del tipo pusher se han transformado en una opción viable en el diseño de aeronaves a partir de la década del ´90. Una gran variedad de diseños se han propuesto y construido considerando la posición de la hélice detrás del ala, detrás de fuselajes, o de empenajes de cola. En muchos casos la hélice pusher resulta tener mejor eficiencia aerodinámica que la hélice tractora, debido a la menor velocidad del flujo entrante sobre la hélice por influencia del cuerpo corriente arriba. Ademá...

  17. Negligible Egg Positive Rate of Enterobius vermicularis and No Detection of Head Lice among Orphanage Children in Busan and Ulsan, Korea (2014).

    Science.gov (United States)

    Kim, Dong-Hee; Son, Hyun-Mi; Lee, Sang Hwa; Park, Mi Kyung; Kang, Shin Ae; Park, Sang Kyun; Choi, Jun-Ho; Park, Jung Ha; Yu, Hak-Sun

    2015-08-01

    To determine whether pinworm infections and head lice infestations spread among children in orphanages, 117 children from 4 orphanages in Busan-si and Ulsan-si, Korea, were examined for enterobiasis and head lice infestation between January and February 2014. The overall rate of Enterobius vermicularis egg positivity was 0.85%, whereas none of the children had head lice infestations. The rate of pinworm infection was much lower among the orphanage children compared to the rates observed in previous studies among kindergarten and primary school students. Moreover, the risk factors for enterobiasis were less frequent among these subjects than previously reported. The personal hygiene and health of the orphanage children were supervised by a regular, employed nurse through a health education program. In conclusion, pinworm infection was efficiently controlled among the children in orphanages, and this might be related to good personal hygiene practices in Korea.

  18. Detection of Small Sea-Surface Targets with a Search Lidar

    NARCIS (Netherlands)

    Heuvel, J.C. van den; Bekman, H.H.P.T.; Putten, F.J.M.; Cohen, L.A.

    2007-01-01

    Naval operations in the littoral have to deal with the threat of small sea-surface targets. These targets have a low radar cross-section and low velocity, which makes them hard to detect by radar in the presence of sea clutter. Typical threats include periscopes, jet skies, FIAC’s, and speedboats.

  19. Call to protect deep-sea coral, sponge ecosystems

    Science.gov (United States)

    Showstack, Randy

    2004-03-01

    More than 1100 scientists are signatories to a 15 February consensus statement calling for the protection of deep sea coral and sponge ecosystems. The statement indicates that ``the greatest human threat'' to these ecosystems ``is commercial fishing, especially bottom trawling.''

  20. Identification of Novel Voltage-Gated Sodium Channel Mutations in Human Head and Body Lice (Phthiraptera: Pediculidae).

    Science.gov (United States)

    Firooziyan, Samira; Sadaghianifar, Ali; Taghilou, Behrooz; Galavani, Hossein; Ghaffari, Eslam; Gholizadeh, Saber

    2017-09-01

    In recent years, the increase of head louse infestation in Iran (7.4%) and especially in West-Azerbaijan Province (248%) has raised the hypothesis of insecticide resistance development. There are different mechanisms of resistance to various groups of insecticides, and knockdown resistance (kdr) is a prominent mechanism of resistance to pyrethroids, an insecticide group which is used conventionally for pediculosis control. For detection of kdr-type well-known amino acid substitutions (M815I-T917I-L920F) and additional sodium channel mutations potentially associated with kdr resistance in head and body lice, louse populations were collected from West-Azerbaijan and Zanjan Provinces of Iran. Six novel mutations were found to be located in the IIS1-2 extracellular loop (H813P) and IIS5 (I927F, L928A, R929V, L930M, and L932M) of the α-subunit. Genotyping results showed that all specimens (100%) have at least one of these or the well-known mutations. Therefore, the presence of kdr-related and novel mutations in the sodium channel is likely to be the reason for the frequent use of pyrethroid insecticides due to treatment failure against lice. Further studies are now required to evaluate the prevalence of the kdr-like mutant allele for monitoring of insecticide resistance and the management of head and body lice in other provinces of the country. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  1. Efficacy and Safety of a Mineral Oil-Based Head Lice Shampoo: A Randomized, Controlled, Investigator-Blinded, Comparative Study.

    Science.gov (United States)

    Wolf, Luise; Eertmans, Frank; Wolf, Doerte; Rossel, Bart; Adriaens, Els

    2016-01-01

    Due to increased resistance and safety concerns with insecticide-based pediculicides, there is growing demand for head lice treatments with a physical mode of action. Certain mineral oils kill lice by blocking spiracles or by disrupting the epicuticular wax layer. The present study was performed to evaluate efficacy and safety of a mineral oil-based shampoo. This randomized, controlled, investigator-blinded, monocentric study (EudraCT registration no. 2014-002918-23) was performed from October 2014-June 2015 in Germany. A mineral oil shampoo (Mosquito® Med Läuse Shampoo 10 in Germany, Paranix or Silcap shampoo elsewhere), registered as medical device, was compared to a conventional, locally reimbursed, pyrethroid-based pediculicide (Goldgeist® Forte solution). In total, 107 patients (>1 year) with confirmed head lice infestation were included (test arm: n = 53; control arm: n = 54). All subjects received two applications of either test or control product at day 0 and day 7, according to the instructions for use. Efficacy and safety was evaluated directly, 1h and 24h after first application, before and after second treatment, and at day 10. The main objective was demonstrating a cure rate for the test product, being superior to 70% at day 10. Cure rates at day 10 (corrected for re-infestation) for the test product (96.1%) and control (94%) significantly exceeded the pre-defined target (70%) (p shampoo) can be safe and effective alternatives for insecticide-based pediculicides, with less risk for development of resistance because of the physical mode of action. German Clinical Trials Register (DRKS) DRKS00009753 and EudraCT database 2014-002918-23.

  2. New records of chewing lice (Insecta, Phthiraptera from Brazilian birds (Aves collected by Helmut Sick (1910-1991

    Directory of Open Access Journals (Sweden)

    Kamila M.D. Kuabara

    Full Text Available ABSTRACT We list the genera and species of chewing lice collected from birds by Helmut Sick, mainly from central Brazil, and particularly during the Roncador-Xingu Expedition, between 1943 and 1949. From the 123 samples studied, a wide variety of chewing louse genera and species were found, including 34 species as new records for Brazil, 37 species recorded from new Brazilian localities and 23 new host records. All material is deposited in the ectoparasite collection of the Museu de Zoologia da Universidade de São Paulo.

  3. Chewing lice (Phthiraptera: Amblycera et Ischnocera) from wrens (Passeriformes: Troglodytidae), with description of a new species of Myrsidea

    Czech Academy of Sciences Publication Activity Database

    Sychra, O.; Kounek, F.; Papoušek, I.; Čapek, Miroslav; Cárdenas-Callirgos, J. M.; Franco, S.; Literák, I.

    2014-01-01

    Roč. 54, č. 1 (2014), s. 1-28 ISSN 0374-1036 R&D Projects: GA AV ČR IAA601690901; GA MŠk LC06073 Institutional support: RVO:68081766 Keywords : Amblycera * Ischnocera * chewing lice * bird parasites * prevalence * mean intensity * geographic distribution * mitochondrial COI * phylogeny * taxonomy * Troglodytes * wrens * Neotropical Region * Palaearctic Region * new species Subject RIV: EG - Zoology Impact factor: 0.659, year: 2014 http://www.aemnp.eu/PDF/54_1/54_1_1.pdf

  4. Efficacy and Safety of a Mineral Oil-Based Head Lice Shampoo: A Randomized, Controlled, Investigator-Blinded, Comparative Study.

    Directory of Open Access Journals (Sweden)

    Luise Wolf

    Full Text Available Due to increased resistance and safety concerns with insecticide-based pediculicides, there is growing demand for head lice treatments with a physical mode of action. Certain mineral oils kill lice by blocking spiracles or by disrupting the epicuticular wax layer. The present study was performed to evaluate efficacy and safety of a mineral oil-based shampoo.This randomized, controlled, investigator-blinded, monocentric study (EudraCT registration no. 2014-002918-23 was performed from October 2014-June 2015 in Germany. A mineral oil shampoo (Mosquito® Med Läuse Shampoo 10 in Germany, Paranix or Silcap shampoo elsewhere, registered as medical device, was compared to a conventional, locally reimbursed, pyrethroid-based pediculicide (Goldgeist® Forte solution. In total, 107 patients (>1 year with confirmed head lice infestation were included (test arm: n = 53; control arm: n = 54. All subjects received two applications of either test or control product at day 0 and day 7, according to the instructions for use. Efficacy and safety was evaluated directly, 1h and 24h after first application, before and after second treatment, and at day 10. The main objective was demonstrating a cure rate for the test product, being superior to 70% at day 10.Cure rates at day 10 (corrected for re-infestation for the test product (96.1% and control (94% significantly exceeded the pre-defined target (70% (p < 0.001, 2-sided, 1-sample, chi-square test with confirmed non-inferiority for the test product. Over all visits, cure rates were consistently higher for the test product, whereas more initially-cured subjects remained lice-free until end of study (78%; control: 60%. Both products were safe and well tolerated, offering good esthetical effects.This study showed that substance-based medical devices (including the tested mineral oil shampoo can be safe and effective alternatives for insecticide-based pediculicides, with less risk for development of resistance because

  5. OBTENCIÓN DE echinococcus GRANULOSUS EN CANINOS INFECTADOS EXPERIMENTALMENTE CON PROTOESCÓLICES DE QUISTES HIDATÍDICOS.

    OpenAIRE

    Rosales G., Sofía; Gavidia C., César; Lopera B., Luis; Barrón G., Eduardo; Ninaquispe B., Berenice; Calderón S., Carmen; Gonzáles Z., Armando

    2012-01-01

    El presente estudio tuvo por objetivo reproducir experimentalmente el ciclo biológico del Echinococcus granulosus en perros. Se utilizó 12 perros (4-50 meses de edad) que fueron infectados experimentalmente con 80,000 a 308,000 protoescólices de quistes hidatídicos de pulmón e hígado de ovinos procedentes de Junín y Ayacucho. Los perros se sacrificaron 28 a 39 días post infección (p.i). El intestino delgado se dividió en tres porciones iguales (anterior, media y posterior). Los parásitos fuer...

  6. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  7. Identification and functional expression of a glutamate- and avermectin-gated chloride channel from Caligus rogercresseyi, a southern Hemisphere sea louse affecting farmed fish.

    Directory of Open Access Journals (Sweden)

    Isabel Cornejo

    2014-09-01

    Full Text Available Parasitic sea lice represent a major sanitary threat to marine salmonid aquaculture, an industry accounting for 7% of world fish production. Caligus rogercresseyi is the principal sea louse species infesting farmed salmon and trout in the southern hemisphere. Most effective control of Caligus has been obtained with macrocyclic lactones (MLs ivermectin and emamectin. These drugs target glutamate-gated chloride channels (GluCl and act as irreversible non-competitive agonists causing neuronal inhibition, paralysis and death of the parasite. Here we report the cloning of a full-length CrGluClα receptor from Caligus rogercresseyi. Expression in Xenopus oocytes and electrophysiological assays show that CrGluClα is activated by glutamate and mediates chloride currents blocked by the ligand-gated anion channel inhibitor picrotoxin. Both ivermectin and emamectin activate CrGluClα in the absence of glutamate. The effects are irreversible and occur with an EC(50 value of around 200 nM, being cooperative (n(H = 2 for ivermectin but not for emamectin. Using the three-dimensional structure of a GluClα from Caenorabditis elegans, the only available for any eukaryotic ligand-gated anion channel, we have constructed a homology model for CrGluClα. Docking and molecular dynamics calculations reveal the way in which ivermectin and emamectin interact with CrGluClα. Both drugs intercalate between transmembrane domains M1 and M3 of neighbouring subunits of a pentameric structure. The structure displays three H-bonds involved in this interaction, but despite similarity in structure only of two these are conserved from the C. elegans crystal binding site. Our data strongly suggest that CrGluClα is an important target for avermectins used in the treatment of sea louse infestation in farmed salmonids and open the way for ascertaining a possible mechanism of increasing resistance to MLs in aquaculture industry. Molecular modeling could help in the design of new

  8. Reactividad álcali-sílice y álcali-silicato en pizarras

    Directory of Open Access Journals (Sweden)

    Campos, P.L.

    2010-06-01

    Full Text Available In this paper it is studied the reactivity of the slates with alkali hydroxides released by the cements in concretes and mortars. For this purpose several essays were performed under different conditions to a selection of slates of different origins and composition. It has been shown that all the tested slates are susceptible to alkali-silica and alkali-silicate reactivity with the alkalis of the cement and that not all the tests routinely performed to detect such reactions are reliable. Verified the reactivity of these rocks, the causes of observed behaviours and the possibilities to minimize or eliminate this reactivity are studied so that the slates could be in use in contact with cement in composite materials. The use of pozzolanic cements turns out to be effective for the elimination of this type of reactions.

    En este trabajo se ha estudiado la reactividad de las pizarras con los hidróxidos alcalinos liberados por los cementos en hormigones y morteros. Para ello se han realizado diferentes ensayos en distintas condiciones, a una selección de pizarras de distinto origen y composición. Se ha constatado que todas las pizarras ensayadas son susceptibles de sufrir reactividad álcali-sílice álcali-silicato con los álcalis de los cementos y que no todos los ensayos que se realizan de forma rutinaria para detectar este tipo de reacciones en los áridos son igual de fiables. Comprobada la reactividad de estas rocas se estudian las causas de los comportamientos observados y las posibilidades de minimizar o eliminar estas reactividades de tal manera que se puedan utilizar las pizarras en contacto con los cementos en materiales compuestos. El uso de cementos puzolánicos se revela como eficaz a la hora de eliminar este tipo de reacciones.

  9. Coastal life is not under threat by the carbon dioxide emissions

    Directory of Open Access Journals (Sweden)

    Albert Parker

    2014-03-01

    Full Text Available The near future of coastal life is threated by the claim of global warming alarmist that sea levels will rise by one to seven metres by 2100, destroying many coastal cities and habitats. This paper shows that sea levels will more likely rise no more than just a few centimetres during this century as the Earth defrosts from the Little Ice Age 500 years ago with a mild warming.

  10. Increased Flooding Risk - Accelerating Threat and Stakeholder Response

    Science.gov (United States)

    Atkinson, L. P.; Ezer, T.; De Young, R.; McShane, M. K.; McFarlane, B.

    2012-12-01

    Coastal cities have been adapting to coastal flooding for centuries. Now, with increased population along the coast combined with increased flooding because of sea level rise (SLR) the vulnerability of coastal cities has increased significantly. In this paper we will discuss the physical threat of accelerating sea level rise and the response of stakeholders. Sallenger et al (2012) stated "... we present evidence of recently accelerated SLR in a unique 1,000-km-long hotspot on the highly populated North American Atlantic coast north of Cape Hatteras and show that it is consistent with a modeled fingerprint of dynamic SLR." In the Northeast Hotspot (NEH) dynamic processes such as Gulf Stream transport can cause local sea level differences (Ezer, 2001). Sweet et al (2009) attributed the anomalously high sea level along the mid-Atlantic in 2009 to dynamic SLR. A recent paper (Ezer and Corlett, 2012 submitted), focused on Chesapeake Bay, confirms Sallenger et al. These accelerations suggest that the higher estimates of SLR in IPCC reports may be better estimates. The combination of local sea level rise and acceleration, even with average coastal storm surge, results in increased vulnerability and economic losses. We will use three examples of stakeholder response to this threat: shipbuilding, cities and insurance. Nuclear aircraft carrier drydock in Newport News, VA - The only drydock where nuclear powered aircraft carriers are built flooded during Hurricane Isabel. A study showed that with a 1 meter sea level rise and no change in storm severity they would have 'Major Flooding' every 4 months rather than every 27 years. Cities infrastructure - In a recent report on sea level rise, the Hampton Roads Planning District Commission (representing nearly 2m people) found that "sea level rise will be a major issue", "there is not yet official state or federal guidance for addressing sea level rise", "…the "…U.S. Army Corps of Engineers has developed guidance…" for their

  11. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  12. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  13. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  14. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  15. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  16. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  17. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  18. Mediterranean, our sea

    Science.gov (United States)

    Markaki, Foteini

    2017-04-01

    My school (1o EPAL Ymittos -Athens, Greece) is a technical school of secondary education and throughout this school year being drafted a program of environmental education. The main theme is the Mediterranean Sea, the biggest closed sea extending between three continents. Topics studied: 1. Biodiversity and the risks threat. 2. The geophysics that characterize (earthquakes, volcanoes explosions, etc). 3. The Mediterranean Sea as environment anthropogenesis, a mosaic of other cultures and even place current notions of social phenomena (refugees). Pedagogical Objectives: Cognitive/Enviromental: 1. To investigate and understand the biodiversity of the Mediterranean Sea and the risks to threaten and phenomena that characterize. 2. To understand the position of the Mediterranean Sea in the land and the role of the historical, cultural and social human environment. 3. To come in contact with texts literary, social, articles on the Mediterranean. Psychomotor: 1. To work together and collect information for the Mediterranean Sea. 2. Experiential approach to the natural environment. 3. Develop critical thinking. 4. Undertake responsibilities for the presentation of the program. Emotional: 1. To feel joy from participation in the program. 2. Being sensitized and configure attitudes and actions of respect towards the environment. Methodology implementation: Teamwork. Interdisciplinary - holistic to dissemination of program recordings to courses curriculum. Study in the field. Gathering information from newspapers, magazines, internet, maps, and photographs. Experiential method- Project. Assessment methods and self-assessment. Fields of courses: Greek language- History- Biology- Chemistry- Technology Dissemination of results: Make a page of social media (facebook), a blog, enhancing environmental awareness via video, make an electronic poster.

  19. Chewing lice (Phthiraptera) on manakins (Passeriformes: Pipridae) from Costa Rica, with description of a new species of the genus Tyranniphilopterus (Phthiraptera: Philopteridae)

    Czech Academy of Sciences Publication Activity Database

    Sychra, O.; Najer, T.; Kounek, F.; Čapek, Miroslav; Literák, I.

    2010-01-01

    Roč. 106, č. 4 (2010), s. 925-931 ISSN 0932-0113 R&D Projects: GA AV ČR IAA601690901 Institutional research plan: CEZ:AV0Z60930519 Keywords : Chewing lice * manakins * Costa Rica Subject RIV: EG - Zoology Impact factor: 1.812, year: 2010

  20. Decline of the Sea Turtles: Causes and Prevention.

    Science.gov (United States)

    National Academy of Sciences - National Research Council, Washington, DC. Commission on Life Sciences.

    A report submitted by the Committee on Sea Turtle Conservation, addresses threats to the world's sea turtle populations to fulfill a mandate of the Endangered Species Act Amendments of 1988. It presents information on the populations, biology, ecology, and behavior of five endangered or threatened turtle species: the Kemp's ridley, loggerhead,…

  1. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  2. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  3. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  4. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  5. Classifying threats with a 14-MeV neutron interrogation system.

    Science.gov (United States)

    Strellis, Dan; Gozani, Tsahi

    2005-01-01

    SeaPODDS (Sea Portable Drug Detection System) is a non-intrusive tool for detecting concealed threats in hidden compartments of maritime vessels. This system consists of an electronic neutron generator, a gamma-ray detector, a data acquisition computer, and a laptop computer user-interface. Although initially developed to detect narcotics, recent algorithm developments have shown that the system is capable of correctly classifying a threat into one of four distinct categories: narcotic, explosive, chemical weapon, or radiological dispersion device (RDD). Detection of narcotics, explosives, and chemical weapons is based on gamma-ray signatures unique to the chemical elements. Elements are identified by their characteristic prompt gamma-rays induced by fast and thermal neutrons. Detection of RDD is accomplished by detecting gamma-rays emitted by common radioisotopes and nuclear reactor fission products. The algorithm phenomenology for classifying threats into the proper categories is presented here.

  6. The distribution and diversity of sea cucumbers in the coral reefs of the South China Sea, Sulu Sea and Sulawesi Sea

    Science.gov (United States)

    Woo, Sau Pinn; Yasin, Zulfigar; Ismail, Siti Hasmah; Tan, Shau Hwai

    2013-11-01

    A study on the distribution and diversity of sea cucumbers in the coral reefs of the South China Sea, Sulu Sea and Sulawesi Sea was carried out in July 2009. The survey was done using wandering transect underwater with SCUBA. Twelve species of sea cucumber were found from four different families and nine genera. The most dominant family was Holothuriidae (five species), followed by Stichopodidae (three species), Synaptidae (three species) and Cucumariidae with only one species. The most dominant species found around the island was Pearsonothuria graffei, which can be found abundantly on substrate of dead corals in a wide range of depth (6-15 m). The Sulawesi Sea showed a higher diversity of sea cucumber with seven different species compared to the South China Sea with only six different species and Sulu Sea with only two species. Ordination by multidimensional scaling of Bray-Curtis similarities clustered the sampling locations to three main clusters with two outgroups. Previous studies done indicated a higher diversity of sea cucumber as compared to this study. This can be indication that the population and diversity of sea cucumbers in the reef is under threat.

  7. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  9. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  10. Effects of the vertically transmitted microsporidian Facilispora margolisi and the parasiticide emamectin benzoate on salmon lice (Lepeophtheirus salmonis).

    Science.gov (United States)

    Poley, Jordan D; Sutherland, Ben J G; Fast, Mark D; Koop, Ben F; Jones, Simon R M

    2017-08-17

    Microsporidia are highly specialized, parasitic fungi that infect a wide range of eukaryotic hosts from all major taxa. Infections cause a variety of damaging effects on host physiology from increased stress to death. The microsporidian Facilispora margolisi infects the Pacific salmon louse (Lepeophtheirus salmonis oncorhynchi), an economically and ecologically important ectoparasitic copepod that can impact wild and cultured salmonids. Vertical transmission of F. margolisi was demonstrated by using PCR and in situ hybridization to identify and localize microsporidia in female L. salmonis and their offspring. Spores and developmental structures of F. margolisi were identified in 77% of F 1 generation copepods derived from infected females while offspring from uninfected females all tested negative for the microsporidia. The transcriptomic response of the salmon louse to F. margolisi was profiled at both the copepodid larval stage and the pre-adult stage using microarray technology. Infected copepodids differentially expressed 577 transcripts related to stress, ATP generation and structural components of muscle and cuticle. The infection also impacted the response of the copepodid to the parasiticide emamectin benzoate (EMB) at a low dose of 1.0 ppb for 24 h. A set of 48 transcripts putatively involved in feeding and host immunomodulation were up to 8-fold underexpressed in the F. margolisi infected copepodids treated with EMB compared with controls or either stressor alone. Additionally, these infected lice treated with EMB also overexpressed 101 transcripts involved in stress resistance and signalling compared to the other groups. In contrast, infected pre-adult lice did not display a stress response, suggesting a decrease in microsporidian virulence associated with lice maturity. Furthermore, copepodid infectivity and moulting was not affected by the microsporidian infection. This study demonstrated that F. margolisi is transmitted vertically between salmon

  11. Associations between chewing lice (Insecta, Phthiraptera and albatrosses and petrels (Aves, Procellariiformes collected in Brazil Associações entre malófagos (Insecta, Phthiraptera e albatrozes e petréis (Aves, Procellariiformes capturados no Brasil

    Directory of Open Access Journals (Sweden)

    Michel P. Valim

    2006-12-01

    Full Text Available Chewing lice were searched on 197 skins of 28 species of procellariiform birds collected in Brazil. A total of 38 species of lice were found on 112 skins belonging to 22 bird species. The lice were slide-mounted and identified. A list of lice species found and their host species is given and some host-louse associations are discussed under an evolutionary perspective.Malófagos foram procurados em 197 peles de 28 espécies de aves Procellariiformes capturadas no Brasil. Um total de 38 espécies de piolhos foram encontradas em 112 peles pertencentes a 22 espécies de aves. Os piolhos foram montados em lâminas e identificados. Uma lista com as espécies de piolhos encontradas e seus hospedeiros é dada, além de algumas associações entre os piolhos e as aves serem discutidas sob uma perspectiva evolutiva.

  12. 77 FR 31062 - Programs To Reduce Incidental Capture of Sea Turtles in Shrimp Fisheries; Certifications Pursuant...

    Science.gov (United States)

    2012-05-24

    ... DEPARTMENT OF STATE [Public Notice 7894] Programs To Reduce Incidental Capture of Sea Turtles in... programs to reduce the incidental capture of sea turtles in their shrimp fisheries comparable to the... other countries and one economy do not pose a threat of the incidental taking of sea turtles protected...

  13. Sea-level changes on multiple spatial scales: estimates and contributing processes

    NARCIS (Netherlands)

    Frederikse, T.

    2018-01-01

    Being one of the major consequences of anthropogenic climate change, sea level rise forms a threat for many coastal areas and their inhabitants. Because all processes that cause sea-level changes have a spatially-varying fingerprint, local sea-level changes deviate substantially from the global

  14. La búsqueda incansable en Los cálices vacíos de Delmira Agustini / The incessant search in Los cálices vacíos by Delmira Agustini

    Directory of Open Access Journals (Sweden)

    Carmen Sales Delgado

    2010-07-01

    Full Text Available RESUMEN: En Los cálices vacíos Delmira Agustini subvierte los roles de género impuestos sobre la mujer en su época, reivindicando su deseo sexual como algo natural también para la mujer frente a la concepción del deseo sexual femenino como el producto subconsciente e incomprensible de su propia psique. Asimismo, se desprende de rol ocupado por la mujer en la poesía como sujeto pasivo para ejercer un rol activo que es capaz de crear y a su vez, es capaz de sentir deseo sexual. Agustini, además, hace uso de un lenguaje erótico y sexual en el que la búsqueda de la satisfacción sexual sería una metáfora de la búsqueda incansable de la perfección poética.ABSTRACT: In Los cálices vacíos, Delmira Agustini subverts the gender roles imposed on women in her time and reclaims their sexual desire as something natural, in opposition to the conception of female sexual desire as the unconscious and incomprehensible product of their own psyche. Likewise, she eschews the traditional passive role as object of desire and admiration occupied by women in poetry and assumes a new active role as creator. Agustini makes use of an erotic and sexual language in which the search for sexual satisfaction would be a metaphor for the unceasing search for poetic perfection.

  15. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  16. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  17. Sea Dragon

    National Research Council Canada - National Science Library

    1997-01-01

    .... In preparation for these changes, the Navy is exploring new command and control relationships, and the Marine Corps established Sea Dragon to experiment with emerging technologies, operational...

  18. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  19. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  20. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  1. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  2. 'Surveyor': An Underwater System for Threat Material Detection

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Nad, Karlo; Obhodas, Jasmina; Matika, Dario; Kollar, Robert

    2010-01-01

    The bottoms of the coastal seas, and oceans as well, are contaminated by many man-made objects including a variety of ammunition. This contamination is world wide spread with some areas being highly polluted presenting a serious threat to local population and to visitors as well. All littoral nations are investing lots of effort into the remediation of their coastal areas. Once the presence of the anomaly on the bottom of the shallow coastal sea water is confirmed (by visual identification and by using one or several sensors, namely magnetometer, sonar and optical cameras) it is necessary to establish if it contains explosive/chemical warfare charge. In our work we propose this to be performed by using neutron sensor installed within an underwater vessel - 'Surveyor'. When positioned above the object, or to its side, the system inspects the object for the presence of the threat material by using alpha particle tagged neutrons from the sealed tube d+t neutron generator. (author)

  3. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  4. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  5. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  6. Nuevo método gravimétrico, esencialmente modificado, para la determinación de sílice en silicatos atacables por ácido, basado en los nuevos conocimientos descubiertos en el estudio del comportamiento de los geles de sílice deshidratados en soluciones ácid

    Directory of Open Access Journals (Sweden)

    Goma, F.

    1976-12-01

    Full Text Available Not availableSe investigan, en primer lugar, las causas de error en la determinación de sílice que provienen de las condiciones externas al método en s% como son: la homogeneización, el estado de la muestra en el momento de la pesada para el análisis, y la influencia que tiene el contenido de los álcalis, parcialmente volátiles, sobre la determinación de la cantidad de materia fija después de la calcinación. Se establecen las condiciones previas del tratamiento de la muestra, según su naturaleza, para obtener siempre resultados reproducibles. Un estudio sistemático del comportamiento de los geles de sílice, obtenidos en las mismas condiciones que los que se producen en el análisis, ha permitido explicar, por primera vez, las causas que producen las llamadas "segundas sílices" y permite ver que el paso de sílice a la solución es debido a una disolución verdadera y no a un fenómeno coloidal. La aplicación al procedimiento clásico, de todos estos hechos experimentales hallados en estas investigaciones, ha permitido establecer un método simplificado y esencialmente modificado, que se describe. Se compara su alcance con los actuales métodos de mayor autoridad y se concluye que, con una sola extracción, se consigue: una recuperación prácticamente total de sílice y conocer la cantidad ''mínima y constante" de sílice que pasa al filtrado, con lo que se ha conseguido, además de la simplificación del método, un mayor grado de exactitud y un margen de reproducibilidad que es más estrecho en cualquier caso y cuando la sílice es componente mayoritario, como en los clínkeres y cementos portland, se estima es ± 0,05.

  7. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  8. Comportamiento del gel de sílice como filtro deshumidificador en sistemas de acondicionamiento de aire por compresión de vapor

    Directory of Open Access Journals (Sweden)

    Antonio José Bula Silvera

    2004-01-01

    Full Text Available Con el fin de determinar la tasa de adsorción de humedad por un filtro a base de gel de sílice, se han llevado a cabo una serie de experimentos en los cuales se ha variado la densidad de gel de sílice por unidad de área y la velocidad con que el aire se acerca al filtro. Los resultados mostraron que al disminuir la velocidad del aire y al aumentar la masa de desecante por unidad de área, se consigue mayor nivel de adsorción por parte del filtro. Sin embargo, al adimensionar la cantidad de agua retenida por unidad de masa de desecante, se observa que el filtro con menor densidad presenta mayor efectividad en el proceso de remoción de humedad. Los resultados se presentan en función del tiempo en un lapso de 50 minutos de muestreo.

  9. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  10. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  11. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  12. Global threat reduction initiative (GTRI)

    International Nuclear Information System (INIS)

    Chamberlain, Travis

    2009-01-01

    The Global Threat Reduction Initiative (GTRI) is a vital part of the global efforts to combat nuclear terrorism. GTRI's unique mission to reduce and protect vulnerable nuclear and radiological material located at civilian sites both in the United States and abroad directly addresses recommendations of the bipartisan 9/11 Commission. GTRI efforts are focused on the first line of defense, namely securing or removing vulnerable nuclear and radiological material at the source. The international community has promulgated guidance on the best practice on the technical and administrative aspects of radiological source security, and the GTRI seeks to provide technical assistance to national bodies and individual facilities to adopt this best practice. This presentation will discuss security concepts that are implemented by the GTRI in cooperation with the Australian Nuclear Science and Technology Organization's Regional Security of Radioactive Sources Project. (author)

  13. Real threat of nuclear smuggling

    International Nuclear Information System (INIS)

    Williams, P.; Woessner, P.N.

    1996-01-01

    Trade in uranium and plutonium during the past five years has given smuggling unprecedented relevance to international security. Yet there is considerable controversy over the threat nuclear smuggling poses. Even though serious efforts are being made to attack the problem at the source, the international community has been slow to respond to the dangers that nuclear smuggling presents. We suggest that systematic multinational measures be taken as soon as possible to inhibit theft at the source, to disrupt trafficking and to deter buyers. The U.S., Germany, Russia and other nations with an interest in the nuclear problem should set up a 'flying squad' with an investigative arm, facilities for counter terrorist and counter extortion actions and a disaster management team. This paper discusses these issues. 3 refs

  14. TRÍPLICE HÉLICE: A RELAÇÃO UNIVERSIDADE-EMPRESA EM BUSCA DA INOVAÇÃO

    Directory of Open Access Journals (Sweden)

    Myller Augusto Santos Gomes

    2014-06-01

    Full Text Available O objetivo deste trabalho é analisar a relação universidade-empresa buscando evidências teóricas que evidenciem os benefícios e as barreiras relacionadas ao modelo Tríplice Hélice. Para este artigo a terceira hélice, governo, é reconhecida como participante do processo, mas é entendido como hélice mediadora da relação Universidade-Empresa e responsável pela melhora do desempenho entre U-E. Para alcançar o objetivo proposto, levantou-se o histórico do modelo Tríplice Hélice, empreendedorismo e inovação tecnológica. Como resultado da pesquisa identificou-se as barreiras que geram conflitos e conduzem um processo de baixa produtividade, destacando-se: falta de administração dos projetos; a falta de administração dos projetos de forma profissional nas universidades; os altos custos envolvidos; indefinições na elaboração de clara política institucional de relacionamento com o ambiente externo aumentam as incertezas; existência de dúvida sobre o valor da cooperação; e complexidade dos contratos a serem negociados. No tocante aos facilitadores, identificou-se que o conflito ideológico entre a universidade e o setor empresarial tende a ser superado, possibilitando um incremento na confiança mutua e que a inovação é entendida como uma chave do processo de mudança, direcionando o papel da universidade, eximindo-a da função de protagonista no campo econômico e direcionando-a para a responsabilidade social.

  15. Identification key for chewing lice (Phthiraptera: Amblycera, Ischnocera) infesting the Indian Peafowl (Pavo cristatus) with one new country record and new host record for Saudi Arabia

    OpenAIRE

    NASSER, Mohamed; AL-AHMED, Azzam; SHOBRAK, Mohammed; ALDRYHIM, Yousif

    2015-01-01

    The amblyceran and ischnoceran lice removed from the Indian Peafowl (Pavo cristatus L.) collected at the Riyadh bird market, and other specimens available in the King Saud University Museum of Arthropods, Kingdom of Saudi Arabia, were identified. Amyrsidea minuta Emerson, a new country record, and Goniodes dissimilis Denny were found infesting the Indian Peafowl in Saudi Arabia. Goniodes dissimilis is recorded for the first time from this bird species, along with Menacanthus stramineus (Nitzs...

  16. Nanosílice como carga en la RTV SR usada para cubrir aisladores; Nanosilica as filler in the Room temperature vulcanized silicone rubber used to coat insulators

    Directory of Open Access Journals (Sweden)

    Ignat Pérez Almirall

    2014-04-01

    Full Text Available En el presente trabajo se realiza un estudio sobre la influencia que tiene agregar como carga nanosílice a la goma de silicona vulcanizada a temperatura ambiente (RTV SR, por sus siglas en inglés que es empleada para cubrir aisladores de vidrio o de porcelana. Con este objetivo se observó la dispersión de la nanosílice en la RTV SR por medio de microscopía electrónica de barrido (MEV, por sus siglas en inglés, se midió la permitividad de la RTV SR con y sin nanosílice para varias frecuencias y se evaluó la influencia que tiene la nanosílice en la resistencia a la erosión. Además fueron medidas las corrientes de fuga durante ensayos de niebla salina a aisladores de vidrio pintados con estos recubrimientos, analizando también la pérdida de hidrofobicidad que ocurre durante el ensayo y su recuperación una vez finalizado el mismo.  The present research work carries out a study on the influence of nanosilica on room temperature vulcanized silicone rubber (RTV SR used to coat insulators. Considering this objective, the dispersion of nanosilica was observed by means of scanning electron microscopy (MEV, the permittivity of the room temperature vulcanized silicone rubber was measured with and without nanosilica for different frequencies and the influence of nanosilica in erosion resistance. Leakage currents were also measured during salt spray tests to glass insulators covered with these coatings; the loss of hidrophobicity during the test was also measured and its recovery was analyzed the test was finished.

  17. Nanosílice como carga en la RTV SR usada para cubrir aisladores/ Nanosilica as filler in the Room temperature vulcanized silicone rubber used to coat insulators

    Directory of Open Access Journals (Sweden)

    Ignat Pérez Almirall

    2012-02-01

    Full Text Available En el presente trabajo se realiza un estudio sobre la influencia que tiene agregar como carga nanosílice a la goma de silicona vulcanizada a temperatura ambiente (RTV SR, por sus siglas en inglés que es empleada para cubrir aisladores de vidrio o de porcelana. Con este objetivo se observó la dispersión de la nanosílice en la RTV SR por medio de microscopía electrónica de barrido (MEV, por sus siglas en inglés, se midió la permitividad de la RTV SR con y sin nanosílice para varias frecuencias y se evaluó la influencia que tiene la nanosílice en la resistencia a la erosión. Además fueron medidas las corrientes de fuga durante ensayos de niebla salina a aisladores de vidrio pintados con estos recubrimientos, analizando también la pérdida de hidrofobicidad que ocurre durante el ensayo y su recuperación una vez finalizado el mismo.The present research work carries out a study on the influence of nanosilica on room temperature vulcanized silicone rubber (RTV SR used to coat insulators. Considering this objective, the dispersion of nanosilica was observed by means of scanning electron microscopy (MEV, the permittivity of the room temperature vulcanized silicone rubber was measured with and without nanosilica for different frequencies and the influence of nanosilica in erosion resistance. Leakage currents were also measured during salt spray tests to glass insulators covered with these coatings; the loss of hidrophobicity during the test was also measured and its recovery was analyzed the test was finished.

  18. A checklist of sucking lice (Insecta: Phthiraptera: Anoplura) associated with Mexican wild mammals, including geographical records and a host-parasite list.

    Science.gov (United States)

    Sánchez-Montes, Sokani; Guzmán-Cornejo, Carmen; León-Paniagua, Livia; Rivas, Gerardo

    2013-01-01

    A checklist of 44 species of sucking lice (Insecta: Phthiraptera: Anoplura) recorded in Mexico, belonging to nine genera in six families is given, together with a list of the 63 species of Mexican wild mammal hosts with which they are associated. Summaries of the known geographical records and host relationships for each louse species are presented for each Mexican state. Data were compiled from published and original records, including three new locality records from the states of Oaxaca and Guerrero.

  19. Chewing lice of the genus Myrsidea (Phthiraptera: Menoponidae) from New World warblers (Passeriformes: Parulidae) from Costa Rica, with descriptions of four new species

    Czech Academy of Sciences Publication Activity Database

    Kounek, F.; Sychra, O.; Čapek, Miroslav; Literák, I.

    2011-01-01

    Roč. 3137, - (2011), s. 56-63 ISSN 1175-5326 R&D Projects: GA AV ČR IAA601690901; GA MŠk LC06073 Institutional research plan: CEZ:AV0Z60930519 Keywords : lice * new species * Costa Rica * new host-louse associations * Menoponidae * Myrsidea * Amblycera * Parulidae Subject RIV: EG - Zoology Impact factor: 0.927, year: 2011 http://www.mapress.com/zootaxa/2011/f/zt03137p063.pdf

  20. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  1. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  2. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  3. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  4. The threat of silent earthquakes

    Science.gov (United States)

    Cervelli, Peter

    2004-01-01

    Not all earthquakes shake the ground. The so-called silent types are forcing scientists to rethink their understanding of the way quake-prone faults behave. In rare instances, silent earthquakes that occur along the flakes of seaside volcanoes may cascade into monstrous landslides that crash into the sea and trigger towering tsunamis. Silent earthquakes that take place within fault zones created by one tectonic plate diving under another may increase the chance of ground-shaking shocks. In other locations, however, silent slip may decrease the likelihood of destructive quakes, because they release stress along faults that might otherwise seem ready to snap.

  5. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  6. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  7. Sea Legs

    Science.gov (United States)

    Macdonald, Kenneth C.

    Forty-foot, storm-swept seas, Spitzbergen polar bears roaming vast expanses of Arctic ice, furtive exchanges of forbidden manuscripts in Cold War Moscow, the New York city fashion scene, diving in mini-subs to the sea floor hot srings, life with the astronauts, romance and heartbreak, and invading the last bastions of male exclusivity: all are present in this fast-moving, non-fiction account of one woman' fascinating adventures in the world of marine geology and oceanography.

  8. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  9. Sea Reclamation Status of Countries around the South China Sea from 1975 to 2010

    Directory of Open Access Journals (Sweden)

    Junjue Zhang

    2017-05-01

    Full Text Available As a way of turning sea into land for living space for humans, the actions of sea reclamation bring about significant benefits. Nevertheless, it is also an under-recognized threat to the environment and the marine ecosystem. Based on images in two periods, sea reclamation information of countries around the South China Sea was extracted from 1975 to 2010. The spatial state and driven forces of sea reclamation are then discussed. Results show that the overall strength of sea reclamation in the South China Sea was great. New reclaimed land added up to 3264 km2. Sea reclamation for fish farming was the main reclamation type and widely distributed in the whole area, especially on the coast from the Pearl River Delta to the Red River Delta, and the coast of Ca Mau Peninsula. Sea reclamation in China and Vietnam was rather significant, which occupies 80.6% of the total reclamation area. Singapore had the highest level of sea reclamation. New reclaimed land for fish farming holds a key role in China, Vietnam, and Indonesia, while new reclaimed land for construction and docks dominated in Malaysia, Singapore, and Brunei. Areas and use-type compositions of new reclaimed land in countries varied greatly due to the differences of economic factors, policy inclination, and landscapes in the respective countries.

  10. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  11. Microplastic in the gastrointestinal tract of fishes along the Saudi Arabian Red Sea coast

    KAUST Repository

    Baalkhuyur, Fadiyah M.; Bin Dohaish, El-Jawaher A.; Elhalwagy, Manal E.A.; Mannalamkunnath Alikunhi, Nabeel; Al-Suwailem, Abdulaziz M.; Rø stad, Anders; Coker, Darren James; Berumen, Michael L.; Duarte, Carlos M.

    2018-01-01

    of microplastics debris near the seabed. The results of this study represent a first evidence that microplastic pollution represents an emerging threat to Red Sea fishes, their food web and human consumers.

  12. Global ship accidents and ocean swell-related sea states

    Science.gov (United States)

    Zhang, Zhiwei; Li, Xiao-Ming

    2017-11-01

    With the increased frequency of shipping activities, navigation safety has become a major concern, especially when economic losses, human casualties and environmental issues are considered. As a contributing factor, the sea state plays a significant role in shipping safety. However, the types of dangerous sea states that trigger serious shipping accidents are not well understood. To address this issue, we analyzed the sea state characteristics during ship accidents that occurred in poor weather or heavy seas based on a 10-year ship accident dataset. Sea state parameters of a numerical wave model, i.e., significant wave height, mean wave period and mean wave direction, were analyzed for the selected ship accident cases. The results indicated that complex sea states with the co-occurrence of wind sea and swell conditions represent threats to sailing vessels, especially when these conditions include similar wave periods and oblique wave directions.

  13. Global ship accidents and ocean swell-related sea states

    Directory of Open Access Journals (Sweden)

    Z. Zhang

    2017-11-01

    Full Text Available With the increased frequency of shipping activities, navigation safety has become a major concern, especially when economic losses, human casualties and environmental issues are considered. As a contributing factor, the sea state plays a significant role in shipping safety. However, the types of dangerous sea states that trigger serious shipping accidents are not well understood. To address this issue, we analyzed the sea state characteristics during ship accidents that occurred in poor weather or heavy seas based on a 10-year ship accident dataset. Sea state parameters of a numerical wave model, i.e., significant wave height, mean wave period and mean wave direction, were analyzed for the selected ship accident cases. The results indicated that complex sea states with the co-occurrence of wind sea and swell conditions represent threats to sailing vessels, especially when these conditions include similar wave periods and oblique wave directions.

  14. Reactors at sea

    International Nuclear Information System (INIS)

    Hines, Colin

    1988-01-01

    The Greenpeace Nuclear Free Seas Campaign is outlined. The campaign aims to bring the environmental hazards from nuclear submarines and naval ships carrying nuclear weapons to public attention. Worldwide there are 544 nuclear reactor ships or submarines each with the potential to meltdown with serious environmental consequences. One meltdown is known to have occurred. Five reactors have been abandoned on the sea bed. Nuclear powered submarines are based at Rosyth, Faslane, Holy Loch, Plymouth and Portsmouth and routinely come into and out of those harbours. There have also been accidents involving nuclear weapons on board submarines, aircraft carriers or destroyers which carry nuclear depth bombs and free fall bombs. The Royal Navy's accident emergency plans for nuclear naval bases are inadequate. There is a threat to the environment when the reactors are decommissioned. There are no clear plans as to how to deal with the decommissioning of the submarines or ships although the fuel rods have been removed from the first British nuclear submarine, Dreadnought. (U.K.)

  15. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  16. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  17. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  18. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  19. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  20. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  1. Biomineralizaciones de sílice en Celtis tala¹ (Celtidaceae Silica biomineralizations in Celtis tala (Celtidaceae

    Directory of Open Access Journals (Sweden)

    Mariana Fernández Honaine

    2005-12-01

    Full Text Available Se estudió la asociación fitolítica de Celtis tala Planchon, su composición química y variabilidad morfológica, analizándose por separado los morfotipos presentes en hoja, tallo y fruto. La asociación fitolítica de Celtis tala está compuesta principalmente por cistolitos, fitolitos poliédricos articulados con paredes y/o lumen celular silicificados, y fitolitos de contorno irregular, superficie rugosa y lumen celular silicificado. Los análisis de EDAX y las observaciones al microscopio permitieron corroborar la presencia de biomineralizaciones de sílice y calcio en hoja, tallo y fruto. Además se detectaron otros elementos, como Mg, Al, K, P, Fe y S en algunos fitolitos. En particular, este trabajo revela la presencia de sílice como un componente fundamental en la estructura de los cistolitos en esta especie, apoyando los resultados obtenidos por otros autores para cistolitos en otras especies relacionadas. La presencia de un elemento mucho menos lábil que el carbonato de calcio, permite que estas estructuras luego de la descomposición de la materia orgánica, puedan permanecer durante más tiempo sin alterarse en el suelo, constituyendo importantes elementos indicadores de la presencia de Celtis tala en el registro fósil.The phytolith assemblage of Celtis tala, its chemical composition and variability were studied. Leave, stem and fruit phytolith morphologies were analyzed with the purpose of establishing the contribution of each organ. The results showed that cystolith types, articulated poliedric (with wall and lumen silicified and irregular, rugose poliedric phytoliths were the main morphologies present in Celtis tala phytolith assemblage. Silicon and calcium biomineralizations were detected by EDAX analysis and microscope observations in leave, stem and fruit. Other elements, such as Mg, Al, K, P, Fe and S, were also detected by EDAX analysis in some phytoliths. The presence of silicon as an important structural cystolith

  2. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  3. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  4. Evidence for the Induction of Key Components of the NOTCH Signaling Pathway via Deltamethrin and Azamethiphos Treatment in the Sea Louse Caligus rogercresseyi

    Directory of Open Access Journals (Sweden)

    Sebastian Boltaña

    2016-05-01

    Full Text Available The extensive use of organophosphates and pyrethroids in the aquaculture industry has negatively impacted parasite sensitivity to the delousing effects of these antiparasitics, especially among sea lice species. The NOTCH signaling pathway is a positive regulator of ABC transporter subfamily C expression and plays a key role in the generation and modulation of pesticide resistance. However, little is known about the molecular mechanisms behind pesticide resistance, partly due to the lack of genomic and molecular information on the processes involved in the resistance mechanism of sea lice. Next-generation sequencing technologies provide an opportunity for rapid and cost-effective generation of genome-scale data. The present study, through RNA-seq analysis, determined that the sea louse Caligus rogercresseyi (C. rogercresseyi specifically responds to the delousing drugs azamethiphos and deltamethrin at the transcriptomic level by differentially activating mRNA of the NOTCH signaling pathway and of ABC genes. These results suggest that frequent antiparasitic application may increase the activity of inhibitory mRNA components, thereby promoting inhibitory NOTCH output and conditions for increased resistance to delousing drugs. Moreover, data analysis underscored that key functions of NOTCH/ABC components were regulated during distinct phases of the drug response, thus indicating resistance modifications in C. rogercresseyi resulting from the frequent use of organophosphates and pyrethroids.

  5. Sea level trends in South East Asian Seas (SEAS)

    Science.gov (United States)

    Strassburg, M. W.; Hamlington, B. D.; Leben, R. R.; Manurung, P.; Lumban Gaol, J.; Nababan, B.; Vignudelli, S.; Kim, K.-Y.

    2014-10-01

    Southeast Asian Seas (SEAS) span the largest archipelago in the global ocean and provide a complex oceanic pathway connecting the Pacific and Indian Oceans. The SEAS regional sea level trends are some of the highest observed in the modern satellite altimeter record that now spans almost two decades. Initial comparisons of global sea level reconstructions find that 17 year sea level trends over the past 60 years exhibit good agreement in areas and at times of strong signal to noise associated decadal variability forced by low frequency variations in Pacific trade winds. The SEAS region exhibits sea level trends that vary dramatically over the studied time period. This historical variation suggests that the strong regional sea level trends observed during the modern satellite altimeter record will abate as trade winds fluctuate on decadal and longer time scales. Furthermore, after removing the contribution of the Pacific Decadal Oscillation (PDO) to sea level trends in the past twenty years, the rate of sea level rise is greatly reduced in the SEAS region. As a result of the influence of the PDO, the SEAS regional sea level trends during 2010s and 2020s are likely to be less than the global mean sea level (GMSL) trend if the observed oscillations in wind forcing and sea level persist. Nevertheless, long-term sea level trends in the SEAS will continue to be affected by GMSL rise occurring now and in the future.

  6. Results from the search-lidar demonstrator project for detection of small Sea-Surface targets

    NARCIS (Netherlands)

    Heuvel, J.C. van den; Putten, F.J.M. van; Cohen, L.H.; Kemp, R.A.W.; Franssen, G.C.

    2009-01-01

    Coastal surveillance and naval operations in the littoral both have to deal with the threat of small sea-surface targets. These targets have a low radar cross-section and a low velocity that makes them hard to detect by radar. Typical threats include jet skis, FIAC's, and speedboats. Previous lidar

  7. Search-Lidar Demonstrator for Detection of Small Sea-Surface Targets

    NARCIS (Netherlands)

    Heuvel, J.C. van den; Bekman, H.H.P.T.; Putten, F.J.M. van; Cohen, L.H.; Schleijpen, H.M.A.

    2008-01-01

    Coastal surveillance and naval operations in the littoral both have to deal with the threat of small sea-surface targets. These targets have a low radar cross-section and a low velocity that makes them hard to detect by radar. Typical threats include jet skis, FIAC’s, and speedboats. Lidar

  8. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  9. Determinación volumétrica de la sílice en el cemento Portland

    Directory of Open Access Journals (Sweden)

    Calleja, J.

    1966-09-01

    Full Text Available Not availableSe describe un método volumétrico para la determinación cuantitativa de la sílice en el cemento portland, basado en la precipitación de la misma como fluorosilicato potásico, hidrólisis de esta sal insoluble en las condiciones de ensayo y valoración del ácido fluorhídrico liberado, con una disolución de hidróxido sódico. El método da valores reproducibles con muy escasa dispersión. La diferencia entre los valores más dispares de series de diez determinaciones hechas en una misma muestra por el mismo operador, son del orden de la tolerada por las normas A.S.T.M. (método gravimétrico para valores de un mismo operador obtenidos sobre una muestra. La diferencia entre cualesquiera otros dos valores de las series, o entre uno cualquiera de ellos y la media correspondiente a dicha serie, es muy inferior al margen de tolerancia de la A.S.T.M. Finalmente, entre el valor gravimétrico según el método de las normas A.S.T.M. y los valores volumétricos obtenidos por el método descrito, a la media de ellos, existe una concordancia aceptable.

  10. A Personal View of How Paleomicrobiology Aids Our Understanding of the Role of Lice in Plague Pandemics.

    Science.gov (United States)

    Raoult, Didier

    2016-08-01

    We have been involved in the field of paleomicrobiology since 1998, when we used dental pulp to identify Yersinia pestis as the causative agent of the great plague of Marseille (1720). We recently designed a specific technique, "suicide PCR," that can prevent contamination. A controversy arose between two teams, with one claiming that DNA must be altered to amplify it and the other group claiming that demographic data did not support the role of Y. pestis in the Black Death (i.e., the great plague of the Middle Ages). These controversies led us to evaluate other epidemiological models and to propose the body louse as the vector of this pandemic. This proposal was substantiated by experimental models, the recovery of Y. pestis from lice in the Congo, and the identification of epidemics involving both Y. pestis and Bartonella quintana (the agent of trench fever, transmitted by the body louse) in ancient corpses from mass graves. Paleomicrobiology has led to a re-evaluation of plague pandemics.

  11. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  12. Pollution, habitat loss, fishing, and climate change as critical threats to penguins.

    Science.gov (United States)

    Trathan, Phil N; García-Borboroglu, Pablo; Boersma, Dee; Bost, Charles-André; Crawford, Robert J M; Crossin, Glenn T; Cuthbert, Richard J; Dann, Peter; Davis, Lloyd Spencer; De La Puente, Santiago; Ellenberg, Ursula; Lynch, Heather J; Mattern, Thomas; Pütz, Klemens; Seddon, Philip J; Trivelpiece, Wayne; Wienecke, Barbara

    2015-02-01

    Cumulative human impacts across the world's oceans are considerable. We therefore examined a single model taxonomic group, the penguins (Spheniscidae), to explore how marine species and communities might be at risk of decline or extinction in the southern hemisphere. We sought to determine the most important threats to penguins and to suggest means to mitigate these threats. Our review has relevance to other taxonomic groups in the southern hemisphere and in northern latitudes, where human impacts are greater. Our review was based on an expert assessment and literature review of all 18 penguin species; 49 scientists contributed to the process. For each penguin species, we considered their range and distribution, population trends, and main anthropogenic threats over the past approximately 250 years. These threats were harvesting adults for oil, skin, and feathers and as bait for crab and rock lobster fisheries; harvesting of eggs; terrestrial habitat degradation; marine pollution; fisheries bycatch and resource competition; environmental variability and climate change; and toxic algal poisoning and disease. Habitat loss, pollution, and fishing, all factors humans can readily mitigate, remain the primary threats for penguin species. Their future resilience to further climate change impacts will almost certainly depend on addressing current threats to existing habitat degradation on land and at sea. We suggest protection of breeding habitat, linked to the designation of appropriately scaled marine reserves, including in the High Seas, will be critical for the future conservation of penguins. However, large-scale conservation zones are not always practical or politically feasible and other ecosystem-based management methods that include spatial zoning, bycatch mitigation, and robust harvest control must be developed to maintain marine biodiversity and ensure that ecosystem functioning is maintained across a variety of scales. © 2014 The Authors. Conservation Biology

  13. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  14. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  15. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  16. Sea Ice

    Science.gov (United States)

    Perovich, D.; Gerland, S.; Hendricks, S.; Meier, Walter N.; Nicolaus, M.; Richter-Menge, J.; Tschudi, M.

    2013-01-01

    During 2013, Arctic sea ice extent remained well below normal, but the September 2013 minimum extent was substantially higher than the record-breaking minimum in 2012. Nonetheless, the minimum was still much lower than normal and the long-term trend Arctic September extent is -13.7 per decade relative to the 1981-2010 average. The less extreme conditions this year compared to 2012 were due to cooler temperatures and wind patterns that favored retention of ice through the summer. Sea ice thickness and volume remained near record-low levels, though indications are of slightly thicker ice compared to the record low of 2012.

  17. Polar marine ecosystems: major threats and future change

    Energy Technology Data Exchange (ETDEWEB)

    Clarke, A. [British Antarctic Survey, Cambridge (United Kingdom); Harris, C.M. [Environmental Research and Assessment, Grantchester (United Kingdom)

    2003-07-01

    This review of polar marine ecosystems covers both the Arctic and Antarctic, identifying the major threats and, where possible, predicting their possible state(s) in 2025. Although the two polar regions are similar in their extreme photoperiod, low temperatures, and in being heavily influenced by snow and ice, in almost all other respects they are very different. The Arctic Ocean is a basin surrounded by continental landmasses close to, and influenced by, large populations and industrial activities. In contrast, the Southern Ocean is contiguous with all the other great oceans and surrounds a single land mass; Antarctica is remote from major centres of population and sources of pollution. Marine environments in both Polar Regions have been highly disturbed by fishing activity, but, in terms of pollution, some areas remain among the most pristine in the world. There are, however, both local and global pressures. Over the 2025 time horizon, the greatest concern for the Arctic is probably the ecological implications of climate change, particularly insofar as sea ice extent and duration are likely to be affected. Such changes are not expected to be as pronounced in the Southern Ocean over this time period, and concerns are related more to direct threats from harvesting of marine living resources, and the ability to manage these fisheries sustainably. In both Polar Regions, the capacity of marine ecosystems to withstand the cumulative impact of a number of pressures, including climate change, pollution and overexploitation, acting synergistically is of greatest concern. (author)

  18. Global Warming: A Reduced Threat?.

    Science.gov (United States)

    Michaels, Patrick J.; Stooksbury, David E.

    1992-10-01

    One popular and apocalyptic vision of the world influenced by increasing concentrations of infrared-absorbing trace gases is that of ecological disaster brought about by rapidly rising temperatures, sea level, and evaporation rates. This vision developed from a suite of climate models that have since considerably changed in both their dynamics and their estimates of prospective warming. Observed temperatures indicate that much more warming should already have taken place than predicted by earlier models in the Northern Hemisphere, and that night, rather than day, readings in that hemisphere show a relative warming. A high-latitude polar-night warming or a general night warming could be either benign or beneficial. A large number of plant species show both increased growth and greater water-use efficiency under enhanced carbon dioxide.An extensive body of evidence now indicates that anthropo-generated sulfate emissions are mitigating some of the warming, and that increased cloudiness as a result of these emissions will further enhance night, rather than day, warming. The sulfate emissions, though, are not sufficient to explain all of the night warming. However, the sensitivity of climate to anthropogenerated aerosols, and the general lack of previously predicted warming, could drastically alter the debate on global warming in favor of less expensive policies.

  19. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  20. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  1. Sea level change

    Digital Repository Service at National Institute of Oceanography (India)

    Church, J.A.; Clark, P.U.; Cazenave, A.; Gregory, J.M.; Jevrejeva, S.; Levermann, A.; Merrifield, M.A.; Milne, G.A.; Nerem, R.S.; Nunn, P.D.; Payne, A.J.; Pfeffer, W.T.; Stammer, D.; Unnikrishnan, A.S.

    This chapter considers changes in global mean sea level, regional sea level, sea level extremes, and waves. Confidence in projections of global mean sea level rise has increased since the Fourth Assessment Report (AR4) because of the improved...

  2. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  3. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  4. Global Distribution of Two Fungal Pathogens Threatening Endangered Sea Turtles

    OpenAIRE

    Sarmiento-Ramírez, Jullie M.; Abella-Pérez, Elena; Phillott, Andrea D.; Sim, Jolene; van West, Pieter; Martín, María P.; Marco, Adolfo; Diéguez-Uribeondo, Javier

    2014-01-01

    Nascent fungal infections are currently considered as one of the main threats for biodiversity and ecosystem health, and have driven several animal species into critical risk of extinction. Sea turtles are one of the most endangered groups of animals and only seven species have survived to date. Here, we described two pathogenic species, i.e., Fusarium falciforme and Fusarium keratoplasticum, that are globally distributed in major turtle nesting areas for six sea turtle species and that are i...

  5. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke

  6. Crowdsourcing for children : exploring threats and opportunities

    NARCIS (Netherlands)

    de Wit, J.M.S.; Manojlovic, S.; Gavrilo, K.; Khan, J.V.; Hansson, K.; Aitamurto, T.; Ludwig, T.; Gupta, N.; Muller, M.

    2016-01-01

    Children are increasingly being engaged in product development, but they have yet to be introduced to the concept of crowdsourcing. Several opportunities and threats when designing a crowdsourcing platform specifically for children are proposed as topics for further discussion.

  7. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  8. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  9. Children's Threats: When Are They Serious?

    Science.gov (United States)

    ... mental illness, such as depression, mania, psychosis, or bipolar disorder use of alcohol or illicit drugs disciplinary problems ... mental health professional with experience evaluating children and adolescents. Evaluation of any serious threat must be done ...

  10. Terrorism: Current and Long Term Threats

    National Research Council Canada - National Science Library

    Jenkins, Brian

    2001-01-01

    Despite the high level of anxiety the American people are currently experiencing, we may still not fully comprehend the seriousness of the current and near-term threats we confront or the longer-term...

  11. Antibiotic and Antimicrobial Resistance: Threat Report 2013

    Science.gov (United States)

    ... Form Controls Cancel Submit Search The CDC Antibiotic / Antimicrobial Resistance Note: Javascript is disabled or is not ... please visit this page: About CDC.gov . Antibiotic / Antimicrobial Resistance About Antimicrobial Resistance Biggest Threats Emerging Drug ...

  12. Emerging influenza virus: A global threat

    Indian Academy of Sciences (India)

    PRAKASH KUMAR

    Emerging influenza virus: A global threat. 475. J. Biosci. ... pathogens and are of major global health concern. Recently, ..... cases among persons in 14 countries in Asia, the Middle ... of influenza, investment in pandemic vaccine research and.

  13. Fin whales and microplastics: The Mediterranean Sea and the Sea of Cortez scenarios

    International Nuclear Information System (INIS)

    Fossi, Maria Cristina; Marsili, Letizia; Baini, Matteo; Giannetti, Matteo; Coppola, Daniele; Guerranti, Cristiana; Caliani, Ilaria; Minutoli, Roberta; Lauriano, Giancarlo; Finoia, Maria Grazia; Rubegni, Fabrizio; Panigada, Simone; Bérubé, Martine; Urbán Ramírez, Jorge; Panti, Cristina

    2016-01-01

    The impact that microplastics have on baleen whales is a question that remains largely unexplored. This study examined the interaction between free-ranging fin whales (Balaenoptera physalus) and microplastics by comparing populations living in two semi-enclosed basins, the Mediterranean Sea and the Sea of Cortez (Gulf of California, Mexico). The results indicate that a considerable abundance of microplastics and plastic additives exists in the neustonic samples from Pelagos Sanctuary of the Mediterranean Sea, and that pelagic areas containing high densities of microplastics overlap with whale feeding grounds, suggesting that whales are exposed to microplastics during foraging; this was confirmed by the observation of a temporal increase in toxicological stress in whales. Given the abundance of microplastics in the Mediterranean environment, along with the high concentrations of Persistent Bioaccumulative and Toxic (PBT) chemicals, plastic additives and biomarker responses detected in the biopsies of Mediterranean whales as compared to those in whales inhabiting the Sea of Cortez, we believe that exposure to microplastics because of direct ingestion and consumption of contaminated prey poses a major threat to the health of fin whales in the Mediterranean Sea. - Highlights: • Microplastics and phthalates were higher in the Mediterranean Sea than in the Sea of Cortez. • The overlap between the whale feeding areas and high microplastic density shows the risk of interaction. • Data suggest an increasing risk of chemical transfer from microplastic to whales during the foraging. • Mediterranean whales are exposed to higher ecotoxicological threat of than Sea of Cortez whales. - This study identified temporal and regional ecotoxicological variations in free-ranging fin whales inhabiting two seas different characterized by different microplastic abundance.

  14. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  15. "Exclusive Dealing Contract and Inefficient Entry Threat"

    OpenAIRE

    Noriyuki Yanagawa; Ryoko Oki

    2008-01-01

    This paper examines the effects of exclusive dealing contracts in a simple model with manufacturers-distributors relations. We consider entrants in both manufacturing and distribution sectors. It is well-known that a potential entry threat is welfare increasing under homogenous price competition, even though the potential entrant is less productive. This paper reexamines this intuition by employing the above model. We show that the entry threat of a less-productive manufacturer is welfare dec...

  16. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  17. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  18. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  19. Sea level trends in Southeast Asian seas

    Science.gov (United States)

    Strassburg, M. W.; Hamlington, B. D.; Leben, R. R.; Manurung, P.; Lumban Gaol, J.; Nababan, B.; Vignudelli, S.; Kim, K.-Y.

    2015-05-01

    Southeast Asian seas span the largest archipelago in the global ocean and provide a complex oceanic pathway connecting the Pacific and Indian oceans. The Southeast Asian sea regional sea level trends are some of the highest observed in the modern satellite altimeter record that now spans almost 2 decades. Initial comparisons of global sea level reconstructions find that 17-year sea level trends over the past 60 years exhibit good agreement with decadal variability associated with the Pacific Decadal Oscillation and related fluctuations of trade winds in the region. The Southeast Asian sea region exhibits sea level trends that vary dramatically over the studied time period. This historical variation suggests that the strong regional sea level trends observed during the modern satellite altimeter record will abate as trade winds fluctuate on decadal and longer timescales. Furthermore, after removing the contribution of the Pacific Decadal Oscillation (PDO) to sea level trends in the past 20 years, the rate of sea level rise is greatly reduced in the Southeast Asian sea region. As a result of the influence of the PDO, the Southeast Asian sea regional sea level trends during the 2010s and 2020s are likely to be less than the global mean sea level (GMSL) trend if the observed oscillations in wind forcing and sea level persist. Nevertheless, long-term sea level trends in the Southeast Asian seas will continue to be affected by GMSL rise occurring now and in the future.

  20. Sea ice classification using dual polarization SAR data

    International Nuclear Information System (INIS)

    Huiying, Liu; Huadong, Guo; Lu, Zhang

    2014-01-01

    Sea ice is an indicator of climate change and also a threat to the navigation security of ships. Polarimetric SAR images are useful in the sea ice detection and classification. In this paper, backscattering coefficients and texture features derived from dual polarization SAR images are used for sea ice classification. Firstly, the HH image is recalculated based on the angular dependences of sea ice types. Then the effective gray level co-occurrence matrix (GLCM) texture features are selected for the support vector machine (SVM) classification. In the end, because sea ice concentration can provide a better separation of pancake ice from old ice, it is used to improve the SVM result. This method provides a good classification result, compared with the sea ice chart from CIS

  1. The rise of sea level. To understand and to anticipate

    International Nuclear Information System (INIS)

    2013-03-01

    By proposing and briefly commenting graphs and drawings, this publication propose brief presentations of the main issues related to sea level rise: global warming and climate disturbance, description of the phenomenon of sea level rise (difference between sea ice and ground ice, melting of glaciers), increase of sea level rise during the twentieth century, territories at risk (examples of Greenland, Tuvalu, Shanghai), acceleration of ice melting during the twenty first century with many coastal areas at risk, already noticed and possible future impacts in France (glaciers runoff, threatened coasts, example of the Xynthia tempest), how to be united and to anticipate (a threat for millions of people, adaptation to sea level rise, limitation of global warming to limit sea level rise)

  2. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  3. Recuperación de sílice residual de columnas de cromatografía en la síntesis sol-gel de pigmentos

    Directory of Open Access Journals (Sweden)

    Grañana, M. C.

    2000-04-01

    Full Text Available The use of a silica waste of support chromatography process as raw material in the synthesis of ceramic pigments based in zircon network (yellow of praseodymium, turkish blue of vanadium and pink koral of iron, is analized in this study. The synthesis has been carried out by ceramic method and also by colloidal sol-gel and coprecipitation routes. Silica waste becomes an effective precursor in the zircon ceramic stains. Likewise, the high temperature and long soaking time used in the synthesis ensure the whole combustion of adsorbed organics on the waste.

    En este trabajo se caracteriza una sílice residual de procesos de cromatografía de columna y se analiza su utilización como precursor en la síntesis de los tres pigmentos triaxiales del circón (amarillo de praseodimio, turquesa de vanadio y coral de hierro utilizando tanto la vía sol-gel coloidal, la coprecipitación y el método cerámico. La sílice residual se muestra como un precursor muy efectivo en la obtención de los colores del circón tanto vía cerámica como a partir de geles. La alta temperatura así como los relativamente largos periodos de retención utilizados en la síntesis de los pigmentos cerámicos, permite una total combustión de los orgánicos adsorbidos sobre la sílice.

  4. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  5. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  6. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  7. Disolución de sílice biogénica en sedimentos de lagos utilizados como bioindicadores de calidad del agua

    Directory of Open Access Journals (Sweden)

    Hermes U. Ramírez S.

    2007-01-01

    Full Text Available El objetivo de este trabajo es mostrar que la disoluci n de s lice amorfa de origen biog nico (diatomeas y fitolitos es un bioindicador de calidad del agua de lagos, valid ndose con la determinaci n de par metros f sico-qu micos. La determinaci n de diatomeas y fitolitos se realiz sobre n cleos de sedimentos del Lago Chapala, M xico. Las diatomeas y fitolitos fueron separados, depositados en laminillas y observados con microscop a de luz polarizada y electr nica de barrido. En forma paralela se analiz la calidad del agua del lago durante la d cada de 1990-2000 monitoreando 38 par metros f sicoqu micos en 25 estaciones. El estudio de diatomeas evidenci que la mayor a de ellos presentan fr stulas no preservadas, alto grado de disoluci n, fitolitos fragmentados y/o disueltos y una importante cantidad de debris de s lice. La determinaci n de fitolitos fue deficiente, con m s diatomeas en estado de disoluci n y debris de s lice opalino que fitolitos. Los resultados del an lisis f sico-qu mico del agua muestran valores de pH de 7,20-9,45, altas concentraciones de: nitr geno org nico (1,57 mg/l, nitr geno amoniacal (0,48 mg/l, nitratos (0,18 mg/l, f sforo org nico (0,16 mg/l, ortofosfatos (0,40 mg/l, f sforo total (0,57 mg/l y conductividad (867,53 S/cm lo que refleja altas concentraciones de sales, sobresaturaci n de CaCO3 con dureza total y c lcica de 221,35 y 142,67 mg/l respectivamente; alcalinidad total y c lcica de 307,29 y 29,90 mg/l respectivamente; todos factores que influyen en la disoluci n de diatomeas y fitolitos en los lechos del lago. Los resultados del estudio micropaleontol gico del Lago de Chapala han evidenciado disoluci n de diatomeas, fitolitos y la presencia de gran cantidad de debris de s lice amorfo y baja calidad de sus aguas, lo cual ha sido verificado con los par metros fisicoqu micos de la ultima d cada. Los fen menos de disoluci n de diatomeas y fitolitos por el momento son asociados a valores de pH>9, a condiciones eutr

  8. Riesgo de exposición al sílice y prevención de la silicosis en la industria

    OpenAIRE

    Camasi Pariona, Oswaldo

    2015-01-01

    La Sílice es un material que se encuentra en los minerales. Es el componente principal de la arena y se presenta principalmente en las formas: cristalina (cuarzo, cristobalita, tridimita), amorfa (tierra de diatomea, ópalo). Esta sustancia se utiliza en las actividades de minería, tratamiento de minerales, limpieza por arenado, industria del cemento, fabricación de asfalto, cerámica, limpieza abrasiva, demolición, industria del vidrio, molienda de cuarzo, moldes de fundición, pulido de superf...

  9. Sea salt

    OpenAIRE

    Galvis-Sánchez, Andrea C.; Lopes, João Almeida; Delgadillo, Ivone; Rangel, António O. S. S.

    2013-01-01

    The geographical indication (GI) status links a product with the territory and with the biodiversity involved. Besides, the specific knowledge and cultural practices of a human group that permit transforming a resource into a useful good is protected under a GI designation. Traditional sea salt is a hand-harvested product originating exclusively from salt marshes from specific geographical regions. Once salt is harvested, no washing, artificial drying or addition of anti-caking agents are all...

  10. Correlation Between Echinoidea Size and Threat Level

    Science.gov (United States)

    Bakshi, S.; Lee, A.; Heim, N.; Payne, J.

    2017-12-01

    Echinoidea (or sea urchins), are small, spiny, globular, animals that populate the seafloors of nearly the entire planet. Echinoidea have existed on Earth since the Ordovician period, and from their archaic origin there is much to be learned about the relationship between Echinoidea body size and how it affects the survivability of the individual. The goal of this project is to determine how Echinoidea dimensions such as body volume, area, and length compare across extinct and extant species by plotting Echinoidea data in R. We will use stratigraphic data as a source to find which species of sea urchin from our data is extinct. We will then create three sets of three histograms of the size data for each type of measurement. One set will include histograms for sea urchin length, area, and volume. The other set will include histograms for extinct sea urchin length, area, and volume. The last set will include histograms for extant sea urchin length, area, and volume. Our data showed that extant sea urchins had a larger size, and extinct sea urchins were smaller. Our length data showed that the average length of all sea urchins were 54.95791 mm, the average length of extinct sea urchins were 51.0337 mm, and the average length of extant sea urchins were 66.12774 mm. There is a generally increasing trend of size over time, except for a small outlier about 350 million years ago, where echinoderm extinction selected towards larger species and biovolume was abnormally high. Our data also showed that over the past 200 million years, echinoderm extinction selectivity drove slightly smaller sea urchins towards extinction, further supporting the idea that a larger size was and still is advantageous for echinoderms.

  11. Environmental security of coastal seas

    International Nuclear Information System (INIS)

    Valkovic, Vladivoj; Sudac, Davorin; Nad, Karlo; Obhodas, Jasmina; Kollar, Robert; Matika, Dario

    2008-01-01

    Full text: The bottoms of the coastal seas are contaminated by many man-made objects including a variety of ammunition. This contamination is world wide spread with some areas being highly polluted presenting a serious threat to local population and to visitors as well. All littoral nations are investing lots of effort into the remediation of their coastal areas. In this report an effort to identify the nature of the object on the sea bottom is presented. Once the presence of the anomaly on the bottom of the shallow coastal sea water is confirmed (by visual identification and by using one or several sensors, namely magnetometer, sonar and optical cameras) it is necessary to establish if it contains explosive and/or chemical warfare charge. In our work we propose this to be performed by using neutron sensor installed within an underwater vessel - 'Surveyor'. When positioned above the object, or to its side, the system inspects the object for the presence of the threat material by using alpha particle tagged neutrons from the sealed tube d+t neutron generator. The inside of the first prototype of the underwater system 'Surveyor' containing neutron generator, shielding and gamma ray detector is shown in figure. The neutron generator used by the 'Surveyor' is rotated by two step motors so that different volume elements chosen by the relative position of the neutron generator and gamma ray detector could be inspected. In such a way a profile of concentrations could also be measured. The preliminary results from the laboratory tests are presented

  12. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  13. Fluctuations of Phytoplankton Community in the Coastal Waters of Caspian Sea in 2006

    OpenAIRE

    Siamak Bagheri; Mashhor Mansor; Marzieh Makaremi; Jalil Sabkara; W. O.W. Maznah; Alireza Mirzajani; Seyed H. Khodaparast; Hossein Negarestan; Azemat Ghandi; Akbar Khalilpour

    2011-01-01

    Problem statement: The Caspian Sea ecosystem has been suffered with many problems since 1980s. Aanthropogenic pollution from heavy metals, hydrocarbons, pesticides, changes in the quantity of nutrient inputs by rivers, are significant threats to biodiversity and biological resources such as plankton structure in the Caspian Sea. According to the significant of phytoplankton community in marine system. The state of the fluctuations of phytoplankton communities of the southwestern Caspian Sea w...

  14. Management of the underwater and coastal archaeological heritage in Israel’s Seas (I)

    OpenAIRE

    Galili, Ehud; Arenson, Sarah

    2014-01-01

    The Maritime cultural heritage of Israel reflects important chapters in the history of humanity, including the Neolithic revolution and the beginning of agriculture, the emergence of the first empires and the foundation of the three monotheistic religions. Erosion due to sea level rise and human activity is destroying important coastal and underwater archaeological sites. Low levels in the Sea of Galilee and the Dead Sea exposed many archaeological remains, which are threate...

  15. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  16. First Detection of the Kdr Mutation T929I in Head Lice (Phthiraptera: Pediculidae) in Schoolchildren of the Metropolitan Area of Nuevo Leon and Yucatan, Mexico.

    Science.gov (United States)

    Ponce-Garcia, Gustavo; Villanueva-Segura, Karina; Trujillo-Rodriguez, Gerardo; Rodriguez-Sanchez, Iram P; Lopez-Monroy, Beatriz; Flores, Adriana E

    2017-07-01

    The head louse Pediculus humanus capitis (De Geer) is a hematophagous ectoparasite that inhabits the human scalp. Infestations by this insect are commonly known as pediculosis, which is more common in younger groups. These infestations are asymptomatic; however, skin irritation from scratching occasionally may cause secondary bacterial infections. In recent years, the prevalence of pediculosis has increased in children; this increase has been attributed to louse resistance to the insecticides used as a control measure for infestation. The aim of the present study was to determine the presence and frequency of the knockdown resistance mutation (kdr) T929I in 468 head lice collected from 32 elementary schools in the metropolitan area of Nuevo Leon (24) and Yucatan (8), Mexico. This is the first report of a knockdown resistance (kdr) mechanism in head lice from Mexico. The T929I mutation was present in all of the sampled schools, with variability observed in its allelic and genotypic frequencies. © The Authors 2017. Published by Oxford University Press on behalf of Entomological Society of America. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  17. A Relação Universidade-Empresa no Brasil e o “Argumento da Hélice Tripla”

    Directory of Open Access Journals (Sweden)

    Renato Dagnino

    2004-01-01

    Full Text Available Analizando la evolución de las interpretaciones sobre la relación Universidad-Empresa en América Latina, se muestra cómo el argumento de la triple hélice contribuyó para que la interpretación que hasta el final de los años 80 era dominante perdiese influencia y cómo el de bate en curso entre esas dos actuales posiciones parece encaminarse. Para ofrecer un cuadro para el análisis crítico de las transformaciones en los modelos explicativo y normativo-institucional de la política científica y tecnológica en países avanzados y periféricos, el argumento de la triple hélice puede aportar nuevas interpretaciones, más coherentes con el escenario de democratización ahora en construcción en el país.

  18. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  19. Aquaporin family genes exhibit developmentally-regulated and host-dependent transcription patterns in the sea louse Caligus rogercresseyi.

    Science.gov (United States)

    Farlora, Rodolfo; Valenzuela-Muñoz, Valentina; Chávez-Mardones, Jacqueline; Gallardo-Escárate, Cristian

    2016-07-01

    Aquaporins are small integral membrane proteins that function as pore channels for the transport of water and other small solutes across the cell membrane. Considering the important roles of these proteins in several biological processes, including host-parasite interactions, there has been increased research on aquaporin proteins recently. The present study expands on the knowledge of aquaporin family genes in parasitic copepods, examining diversity and expression during the ontogeny of the sea louse Caligus rogercresseyi. Furthermore, aquaporin expression was evaluated during the early infestation of Atlantic (Salmo salar) and Coho salmon (Oncorhynchus kisutch). Deep transcriptome sequencing data revealed eight full length and two partial open reading frames belonging to the aquaporin protein family. Clustering analyses with identified Caligidae sequences revealed three major clades of aquaglyceroporins (Cr-Glp), classical aquaporin channels (Cr-Bib and Cr-PripL), and unorthodox aquaporins (Cr-Aqp12-like). In silico analysis revealed differential expression of aquaporin genes between developmental stages and between sexes. Male-biased expression of Cr-Glp1_v1 and female-biased expression of Cr-Bib were further confirmed in adults by RT-qPCR. Additionally, gene expressions were measured for seven aquaporins during the early infestation stage. The majority of aquaporin genes showed significant differential transcription expressions between sea lice parasitizing different hosts, with Atlantic salmon sea lice exhibiting overall reduced expression as compared to Coho salmon. The observed differences in the regulation of aquaporin genes may reveal osmoregulatory adaptations associated with nutrient ingestion and metabolite waste export, exposing complex host-parasite relationships in C. rogercresseyi. Copyright © 2016 Elsevier B.V. All rights reserved.

  20. Terrorism: the threat of a radiological device

    International Nuclear Information System (INIS)

    Kingshott, B.F.

    2005-01-01

    Full text: This paper will discuss terrorism from the perspective of a terrorist organization building and detonating a 'dirty bomb' with a radiological component. The paper will discuss how such devices are made and how security of radiological material world wide will minimize the risk of such devices being used. It will discuss the threat assessments against nuclear waste processing and storage sites, threats to nuclear plants and other sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device be detonated. (author)

  1. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  2. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  3. The Efficacy of Emamectin Benzoate against Infestations of Lepeophtheirus salmonis on Farmed Atlantic Salmon (Salmo salar L) in Scotland, 2002–2006

    Science.gov (United States)

    Lees, Fiona; Baillie, Mark; Gettinby, George; Revie, Crawford W.

    2008-01-01

    Background Infestations of the parasitic copepod Lepeophtheirus salmonis, commonly referred to as sea lice, represent a major challenge to commercial salmon aquaculture. Dependence on a limited number of theraputants to control such infestations has led to concerns of reduced sensitivity in some sea lice populations. This study investigates trends in the efficacy of the in-feed treatment emamectin benzoate in Scotland, the active ingredient most widely used across all salmon producing regions. Methodology/Principal Findings Study data were drawn from over 50 commercial Atlantic salmon farms on the west coast of Scotland between 2002 and 2006. An epi-informatics approach was adopted whereby available farm records, descriptive epidemiological summaries and statistical linear modelling methods were used to identify factors that significantly affect sea lice abundance following treatment with emamectin benzoate (SLICE®, Schering Plough Animal Health). The results show that although sea lice infestations are reduced following the application of emamectin benzoate, not all treatments are effective. Specifically there is evidence of variation across geographical regions and a reduction in efficacy over time. Conclusions/Significance Reduced sensitivity and potential resistance to currently available medicines are constant threats to maintaining control of sea lice populations on Atlantic salmon farms. There is a need for on-going monitoring of emamectin benzoate treatment efficacy together with reasons for any apparent reduction in performance. In addition, strategic rotation of medicines should be encouraged and empirical evidence for the benefit of such strategies more fully evaluated. PMID:18253496

  4. The efficacy of emamectin benzoate against infestations of Lepeophtheirus salmonis on farmed Atlantic salmon (Salmo salar L in Scotland, 2002-2006.

    Directory of Open Access Journals (Sweden)

    Fiona Lees

    Full Text Available BACKGROUND: Infestations of the parasitic copepod Lepeophtheirus salmonis, commonly referred to as sea lice, represent a major challenge to commercial salmon aquaculture. Dependence on a limited number of theraputants to control such infestations has led to concerns of reduced sensitivity in some sea lice populations. This study investigates trends in the efficacy of the in-feed treatment emamectin benzoate in Scotland, the active ingredient most widely used across all salmon producing regions. METHODOLOGY/PRINCIPAL FINDINGS: Study data were drawn from over 50 commercial Atlantic salmon farms on the west coast of Scotland between 2002 and 2006. An epi-informatics approach was adopted whereby available farm records, descriptive epidemiological summaries and statistical linear modelling methods were used to identify factors that significantly affect sea lice abundance following treatment with emamectin benzoate (SLICE(R, Schering Plough Animal Health. The results show that although sea lice infestations are reduced following the application of emamectin benzoate, not all treatments are effective. Specifically there is evidence of variation across geographical regions and a reduction in efficacy over time. CONCLUSIONS/SIGNIFICANCE: Reduced sensitivity and potential resistance to currently available medicines are constant threats to maintaining control of sea lice populations on Atlantic salmon farms. There is a need for on-going monitoring of emamectin benzoate treatment efficacy together with reasons for any apparent reduction in performance. In addition, strategic rotation of medicines should be encouraged and empirical evidence for the benefit of such strategies more fully evaluated.

  5. The efficacy of emamectin benzoate against infestations of Lepeophtheirus salmonis on farmed Atlantic salmon (Salmo salar L) in Scotland, 2002-2006.

    Science.gov (United States)

    Lees, Fiona; Baillie, Mark; Gettinby, George; Revie, Crawford W

    2008-02-06

    Infestations of the parasitic copepod Lepeophtheirus salmonis, commonly referred to as sea lice, represent a major challenge to commercial salmon aquaculture. Dependence on a limited number of theraputants to control such infestations has led to concerns of reduced sensitivity in some sea lice populations. This study investigates trends in the efficacy of the in-feed treatment emamectin benzoate in Scotland, the active ingredient most widely used across all salmon producing regions. Study data were drawn from over 50 commercial Atlantic salmon farms on the west coast of Scotland between 2002 and 2006. An epi-informatics approach was adopted whereby available farm records, descriptive epidemiological summaries and statistical linear modelling methods were used to identify factors that significantly affect sea lice abundance following treatment with emamectin benzoate (SLICE(R), Schering Plough Animal Health). The results show that although sea lice infestations are reduced following the application of emamectin benzoate, not all treatments are effective. Specifically there is evidence of variation across geographical regions and a reduction in efficacy over time. Reduced sensitivity and potential resistance to currently available medicines are constant threats to maintaining control of sea lice populations on Atlantic salmon farms. There is a need for on-going monitoring of emamectin benzoate treatment efficacy together with reasons for any apparent reduction in performance. In addition, strategic rotation of medicines should be encouraged and empirical evidence for the benefit of such strategies more fully evaluated.

  6. Distribution and persistence of the anti sea-lice drug teflubenzuron in wild fauna and sediments around a salmon farm, following a standard treatment

    International Nuclear Information System (INIS)

    Samuelsen, Ole B.; Lunestad, Bjørn T.; Hannisdal, Rita; Bannister, Raymond; Olsen, Siri; Tjensvoll, Tore; Farestveit, Eva; Ervik, Arne

    2015-01-01

    The salmon louse (Lepeoptheirus salmonis) is a challenge in the farming of Atlantic salmon (Salmo salar). To treat an infestation, different insecticides are used like the orally administered chitin synthetase inhibitor teflubenzuron. The concentrations and distribution of teflubenzuron were measured in water, organic particles, marine sediment and biota caught in the vicinity of a fish farm following a standard medication. Low concentrations were found in water samples whereas the organic waste from the farm, collected by sediment traps had concentrations higher than the medicated feed. Most of the organic waste was distributed to the bottom close to the farm but organic particles containing teflubenzuron were collected 1100 m from the farm. The sediment under the farm consisted of 5 to 10% organic material and therefore the concentration of teflubenzuron was much lower than in the organic waste. Teflubenzuron was persistent in the sediment with a stipulated halflife of 170 days. Sediment consuming polychaetes had high but decreasing concentrations of teflubenzuron throughout the experimental period, reflecting the decrease of teflubenzuron in the sediment. During medication most wild fauna contained teflubenzuron residues and where polychaetes and saith had highest concentrations. Eight months later only polychaetes and some crustaceans contained drug residues. What dosages that induce mortality in various crustaceans following short or long-term exposure is not known but the results indicate that the concentrations in defined individuals of king crab, shrimp, squat lobster and Norway lobster were high enough shortly after medication to induce mortality if moulting was imminent. Considering food safety, saith and the brown meat of crustaceans contained at first sampling concentrations of teflubenzuron higher than the MRL-value set for Atlantic salmon. The concentrations were, however, moderate and the amount of saith fillet or brown meat of crustaceans to be consumed in order to exceed ADI is relatively large. - Highlights: • Distribution of teflubenzuron was studied in the marine environment after medication • Teflubenzuron containing organic particles were collected 1100 m from the farm • Teflubenzuron persists in the sediment for a prolonged time • Residues were found in nearly all species of biota collected • Residues found in saith and crab exceeded the MRL value given for farmed salmon

  7. Distribution and persistence of the anti sea-lice drug teflubenzuron in wild fauna and sediments around a salmon farm, following a standard treatment

    Energy Technology Data Exchange (ETDEWEB)

    Samuelsen, Ole B. [Institute of Marine Research, P.O. Box 1870 Nordnes, N-5817 Bergen (Norway); Lunestad, Bjørn T.; Hannisdal, Rita [National Institute of Nutrition and Seafood Research, P.O. Box 2029 Nordnes, N-5817 Bergen (Norway); Bannister, Raymond; Olsen, Siri [Institute of Marine Research, P.O. Box 1870 Nordnes, N-5817 Bergen (Norway); Tjensvoll, Tore [National Institute of Nutrition and Seafood Research, P.O. Box 2029 Nordnes, N-5817 Bergen (Norway); Farestveit, Eva; Ervik, Arne [Institute of Marine Research, P.O. Box 1870 Nordnes, N-5817 Bergen (Norway)

    2015-03-01

    The salmon louse (Lepeoptheirus salmonis) is a challenge in the farming of Atlantic salmon (Salmo salar). To treat an infestation, different insecticides are used like the orally administered chitin synthetase inhibitor teflubenzuron. The concentrations and distribution of teflubenzuron were measured in water, organic particles, marine sediment and biota caught in the vicinity of a fish farm following a standard medication. Low concentrations were found in water samples whereas the organic waste from the farm, collected by sediment traps had concentrations higher than the medicated feed. Most of the organic waste was distributed to the bottom close to the farm but organic particles containing teflubenzuron were collected 1100 m from the farm. The sediment under the farm consisted of 5 to 10% organic material and therefore the concentration of teflubenzuron was much lower than in the organic waste. Teflubenzuron was persistent in the sediment with a stipulated halflife of 170 days. Sediment consuming polychaetes had high but decreasing concentrations of teflubenzuron throughout the experimental period, reflecting the decrease of teflubenzuron in the sediment. During medication most wild fauna contained teflubenzuron residues and where polychaetes and saith had highest concentrations. Eight months later only polychaetes and some crustaceans contained drug residues. What dosages that induce mortality in various crustaceans following short or long-term exposure is not known but the results indicate that the concentrations in defined individuals of king crab, shrimp, squat lobster and Norway lobster were high enough shortly after medication to induce mortality if moulting was imminent. Considering food safety, saith and the brown meat of crustaceans contained at first sampling concentrations of teflubenzuron higher than the MRL-value set for Atlantic salmon. The concentrations were, however, moderate and the amount of saith fillet or brown meat of crustaceans to be consumed in order to exceed ADI is relatively large. - Highlights: • Distribution of teflubenzuron was studied in the marine environment after medication • Teflubenzuron containing organic particles were collected 1100 m from the farm • Teflubenzuron persists in the sediment for a prolonged time • Residues were found in nearly all species of biota collected • Residues found in saith and crab exceeded the MRL value given for farmed salmon.

  8. La interacción de materiales del sistema sílice-alúmina con productos fluorados aluminosos

    Directory of Open Access Journals (Sweden)

    Verdeja, L. F.

    1998-05-01

    Full Text Available The aim of this paper is to get a first approximation of the systematic study of the corrosion mechanisms of the silica-alumina, alumina and rich-alumina refractory by fluoride compounds and molten aluminum. The thermodynamic results support the main role of the chemical attack and the erosive mechanisms in the wear of the silica-alumina materials. The influence of the composition of the crystalline phases in the degree of the ceramic lining attack is also studied. The results suggest not to use either oxide or nitride high-value materials for the lining of furnaces and transport recipients containing molten aluminum, because of the chemical corrosion by compounds such as cryolite or aluminum fluoride and also, because of the avidity of aluminum towards oxygen. The study of corundum-based materials like the best refractory used in order to react with fluoride compounds and molten aluminum is an alternative to be considered. The study of the crusts adhesion like a protection mechanism of the refractory lining is also a possible approach.

    Este trabajo pretende contribuir al estudio sistemático de los mecanismos de corrosión que experimentan los refractarios sílico-aluminosos, aluminosos y de alta alúmina con productos fluorados y aluminio en estado líquido. Se aportan datos termodinámicos que confirman el papel preponderante del ataque químico y de los mecanismos erosivos en el desgaste de materiales del sistema sílice-alúmina. Se discute, asimismo, la influencia de la composición de las fases cristalinas encontradas en el grado de agresión a los revestimientos cerámicos. Se propone, ante la agresividad de agentes químicamente activos, como la criolita o el fluoruro de aluminio, y la gran afinidad del aluminio por el oxígeno, no aconsejar la utilización de materiales oxídicos y nitrurados de alto valor para el revestimiento de hornos y bolsas de transporte de aluminio. Se propone, como línea de trabajo a seguir, la

  9. Invasive Lionfish (Pterosis volitans) Pose Public Health Threats.

    Science.gov (United States)

    Diaz, James H

    2015-01-01

    The lionfish, Pterosis volitans, a native of Indo-Pacific oceans, is a popular saltwater aquarium fish despite venomous spines on its fins. Lionfish were inadvertently introduced into the western Atlantic from Florida in the early 1990s and have overpopulated and dispersed widely into the Caribbean Sea and Gulf of Mexico. Initiatives to control lionfish populations were launched, including the National Oceanographic and Atmospheric Administration (NOAA)-sponsored "Lionfish as Food Campaign".2 Recently, scientists from the Food and Drug Administration (FDA) reported that lionfish caught off the US Virgin Islands contained ciguatoxins and could cause ciguatera fish poisoning (CFP); a seafood-borne poisoning without an antidote or any specific treatment, and a potential for prolonged neurotoxicity. Lionfish pose several public health threats. New strategies to control the lionfish population explosion in coastal waters and offshore fisheries are needed now to ensure seafood safety and public health. The lionfish, Pterosis volitans, is native to the reefs of the western Indian and Pacific Oceans (Figure 1). Brightly colored with red, white, and black stripes and adorned with feathery fins, the lionfish is a popular saltwater aquarium fish despite venomous spines on its fins (Figure 2). Lionfish were introduced into the western North Atlantic from Florida in the early 1990s after some specimens were discarded by dissatisfied amateur aquarists and others escaped from hurricane-flooded public aquariums.1 Since lionfish are voracious carnivores, have few natural predators, and reproduce prolifically, they have overpopulated and dispersed widely from Cape Hatteras to Florida, throughout the Caribbean Sea, and into the Gulf of Mexico.1 The population density of lionfish in its new, invaded territory now exceeds that of its native habitat.1 As a result, campaigns to control lionfish populations were launched in Florida and the Caribbean. Lionfish now pose several public

  10. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  11. Stereotype Threat and Gender Differences in Chemistry

    Science.gov (United States)

    Sunny, Cijy Elizabeth; Taasoobshirazi, Gita; Clark, Lauren; Marchand, Gwen

    2017-01-01

    Stereotype threat theory (STT) offers one explanation for achievement differences in math and science for both women and minority students. Specifically, STT posits that the perceived risk of confirming a negative stereotype about an individual's identity group acts as a psychological burden that negatively impacts performance. This study examined…

  12. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  13. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  14. Repeated checking induces uncertainty about future threat

    NARCIS (Netherlands)

    Giele, C.L.|info:eu-repo/dai/nl/318754460; Engelhard, I.M.|info:eu-repo/dai/nl/239681533; van den Hout, M.A.|info:eu-repo/dai/nl/070445354; Dek, E.C.P.|info:eu-repo/dai/nl/313959552; Damstra, Marianne; Douma, Ellen

    2015-01-01

    Studies have shown that obsessive-compulsive (OC) -like repeated checking paradoxically increases memory uncertainty. This study tested if checking also induces uncertainty about future threat by impairing the distinction between danger and safety cues. Participants (n = 54) engaged in a simulated

  15. Reducing Stereotype Threat in Urban Schools

    Science.gov (United States)

    Merillat, Bethany D.; Corrigan, Diane G.; Harper, Brian E.

    2018-01-01

    Research suggests student performance may be negatively influenced by stereotype threat, "being at risk of confirming, as self-characteristic, a negative stereotype about one's group" (Steele and Aronson in "J Personal Soc Psychol" 69(5):797, 1995). However, studies have also found that educating students about stereotype…

  16. Cyber threat intelligence exchange: A growing requirement

    CSIR Research Space (South Africa)

    Veerasamy, Namosha

    2017-06-01

    Full Text Available Managing the rise of cyber-attacks has become a growing challenge. Cyber space has become a battleground of threats ranging from malware to phishing, spam and password theft. Cybersecurity solutions mainly try to take a defensive stance and build a...

  17. Al Qaeda: Profile and Threat Assessment

    National Research Council Canada - National Science Library

    Katzman, Kenneth

    2005-01-01

    .... interests abroad, and against Western countries. But many believe that the Al Qaeda organization and its leadership are no longer as relevant to assessing the global Islamic terrorist threat as they were on September 11, 2001. Some believe U.S...

  18. Primary Auditory Cortex Regulates Threat Memory Specificity

    Science.gov (United States)

    Wigestrand, Mattis B.; Schiff, Hillary C.; Fyhn, Marianne; LeDoux, Joseph E.; Sears, Robert M.

    2017-01-01

    Distinguishing threatening from nonthreatening stimuli is essential for survival and stimulus generalization is a hallmark of anxiety disorders. While auditory threat learning produces long-lasting plasticity in primary auditory cortex (Au1), it is not clear whether such Au1 plasticity regulates memory specificity or generalization. We used…

  19. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  20. Avoidance: From threat encounter to action execution

    NARCIS (Netherlands)

    Arnaudova, I.

    2015-01-01

    Every day we encounter many threats to survival: a car speeding on a small street or an angry neighbor carrying an axe. Mostly, people go through their days not worrying that their chance of survival might be small. They avoid many dangers without even thinking about them (e.g., looking at both

  1. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic

  2. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  3. The Divisive Threat of Immigration in Europe

    Science.gov (United States)

    2012-12-01

    Wilders established the Party for Freedom (PVV), in 2005 with a strong anti-immigration agenda. The party believes Judeo-Christian and humanist ...Allied administration of post-WWI Europe. Right-wing movements of the 60’s and 80’s were a response to an existential threat during the Cold War rather

  4. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-01-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST…

  5. Health and environmental threats associated with the destruction of chemical weapons.

    Science.gov (United States)

    Matousek, Jirí

    2006-09-01

    Still existing arsenals of chemical weapons (CW) pose not only security threats for possible use in hostilities by state actors or misuse by terrorists but also safety threats to humans and biota due to leakages and possible accidents. The Chemical Weapons Convention (CWC) commits the States Parties (SPs) to destroy CW using technologies taking into consideration human health and environmental protection. It does not allow methods, routinely used up to the 1970s, such as earth burial, open-pit burning, and sea dumping. Long-term health and environmental threats and some accidents that have already occurred in the known localities of the sea-dumped and earth-buried arsenals of Nazi-German armed forces in the Baltic Region and of Imperial Japanese forces in the Far East Region are analyzed according to the impact of major CW and ammunition types (i.e., sulfur mustard--HD, tabun--GA, arsenicals--DA, DC, DM, arsine oil, and chloroacetophenone--CN). Any possible operations and handling with CW envisaged by the CWC as well as their verification are summarized taking into account the health threat they pose. CW and toxic armament waste to be destroyed and applied technologies (both developed and under current use in operational CW destruction facilities [CWDF]) are reviewed as are systems of health safety and environmental protection of the destruction/demilitarization stems from the extraordinary high toxicity of supertoxic lethal agents in man and biota. Problems of currently used Russian and U.S. standards for maximum allowable workplace concentrations and general population limits and possibilities of their determination by available analytical instrumentation are discussed.

  6. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  7. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  8. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  9. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  10. Upper Limit for Regional Sea Level Projections

    Science.gov (United States)

    Jevrejeva, Svetlana; Jackson, Luke; Riva, Riccardo; Grinsted, Aslak; Moore, John

    2016-04-01

    With more than 150 million people living within 1 m of high tide future sea level rise is one of the most damaging aspects of warming climate. The latest Intergovernmental Panel on Climate Change report (AR5 IPCC) noted that a 0.5 m rise in mean sea level will result in a dramatic increase the frequency of high water extremes - by an order of magnitude, or more in some regions. Thus the flood threat to the rapidly growing urban populations and associated infrastructure in coastal areas are major concerns for society. Hence, impact assessment, risk management, adaptation strategy and long-term decision making in coastal areas depend on projections of mean sea level and crucially its low probability, high impact, upper range. With probabilistic approach we produce regional sea level projections taking into account large uncertainties associated with Greenland and Antarctica ice sheets contribution. We calculate the upper limit (as 95%) for regional sea level projections by 2100 with RCP8.5 scenario, suggesting that for the most coastlines upper limit will exceed the global upper limit of 1.8 m.

  11. Perspectives on the Great Amazon Reef: Extension, Biodiversity, and Threats

    Directory of Open Access Journals (Sweden)

    Ronaldo B. Francini-Filho

    2018-04-01

    Full Text Available Here we provide a broad overview of the Great Amazon Reef System (GARS based on the first-ever video surveys of the region. This footage supports four major hypotheses: (1 the GARS area may be six times larger than previously suggested (up to 56,000 km2; (2 the GARS may extend deeper than previously suggested (up to 220 m; (3 the GARS is composed of a greater complexity and diversity of habitats than previously recognized (e.g., reef platforms, reef walls, rhodolith beds, and sponge bottoms; and (4 the GARS represents a useful system to test whether a deep corridor connects the Caribbean Sea to the Southwest Atlantic Ocean. We also call attention to the urgent need to adopt precautionary conservation measures to protect the region in the face of increasing threats from extractive oil and gas practices. With less than 5% of the potential area of the GARS surveyed so far, more research will be required to inform a systematic conservation planning approach and determine how best to establish a network of marine protected areas. Such planning will be required to reconcile extractive activities with effective biodiversity conservation in the GARS.

  12. Sea level hazards: Altimetric monitoring of tsunamis and sea level rise

    Science.gov (United States)

    Hamlington, Benjamin Dillon

    Whether on the short timescale of an impending tsunami or the much longer timescale of climate change-driven sea level rise, the threat stemming from rising and inundating ocean waters is a great concern to coastal populations. Timely and accurate observations of potentially dangerous changes in sea level are vital in determining the precautionary steps that need to be taken in order to protect coastal communities. While instruments from the past have provided in situ measurements of sea level at specific locations across the globe, satellites can be used to provide improved spatial and temporal sampling of the ocean in addition to producing more accurate measurements. Since 1993, satellite altimetry has provided accurate measurements of sea surface height (SSH) with near-global coverage. Not only have these measurements led to the first definitive estimates of global mean sea level rise, satellite altimetry observations have also been used to detect tsunami waves in the open ocean where wave amplitudes are relatively small, a vital step in providing early warning to those potentially affected by the impending tsunami. The use of satellite altimetry to monitor two specific sea level hazards is examined in this thesis. The first section will focus on the detection of tsunamis in the open ocean for the purpose of providing early warning to coastal inhabitants. The second section will focus on estimating secular trends using satellite altimetry data with the hope of improving our understanding of future sea level change. Results presented here will show the utility of satellite altimetry for sea level monitoring and will lay the foundation for further advancement in the detection of the two sea level hazards considered.

  13. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  14. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  15. Current nuclear threats and possible responses

    Science.gov (United States)

    Lamb, Frederick K.

    2005-04-01

    Over the last 50 years, the United States has spent more than 100 billion developing and building a variety of systems intended to defend its territory against intercontinental-range ballistic missiles. Most of these systems never became operational and ultimately all were judged ineffective. The United States is currently spending about 10 billion per year developing technologies and systems intended to defend against missiles that might be acquired in the future by North Korea or Iran. This presentation will discuss these efforts ad whether they are likely to be more effective than those of the past. It will also discuss the proper role of anti-ballistic programs at a time when the threat of a nuclear attack on the U.S. by terrorists armed with nuclear weapons is thought to be much higher than the threat of an attack by nuclear-armed ballistic missles.

  16. Surveillance and threat detection prevention versus mitigation

    CERN Document Server

    Kirchner, Richard

    2014-01-01

    Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years. Identifying and disrupting this surveillance is key to prevention of attacks. The systematic capture of suspicious events and the correlation of those events can reveal terrorist or criminal surveillance, allowing security professionals to employ appropriate countermeasures and identify the steps needed to apprehend the perpetrators. The results will dramatically increase the probability of prevention while streamlining protection assets and costs. Readers of Surveillance and Threat Detection will draw from real-world case studies that apply to their real-world security responsibilities. Ultimately, readers will come away with an understanding of how surveillance detection at a high-value, f...

  17. Self-Models and Relationship Threat

    Directory of Open Access Journals (Sweden)

    Máire B. Ford

    2015-07-01

    Full Text Available This study investigated a key claim of risk regulation theory, namely, that psychological internalizing of a relationship threat will serve as a mediator of the link between self-models (self-esteem and attachment anxiety and relationship responses (moving closer to a partner vs. distancing from a partner. Participants (N = 101 received feedback that threatened their current romantic relationship (or no feedback and then completed measures of internal–external focus, relationship closeness–distancing, and acceptance–rejection of the feedback. Results showed that participants with negative self-models responded to the relationship threat by becoming more internally focused and by distancing from their partners, whereas those with positive self-models became more externally focused and moved closer to their partners. Mediation analyses indicated that the link between self-models and relationship closeness–distancing was partially explained by internal focus.

  18. Método da hélice de Busch e a determinação da componente horizontal do campo magnético terrestre

    OpenAIRE

    Cavalcante,Marisa Almeida; Dias,Eliane Fernanda

    2006-01-01

    Este trabalho apresenta uma proposta experimental no estudo dos aspectos fenomenológicos envolvidos na trajetória de um feixe de elétrons sob a ação de campos elétricos e magnéticos. Os resultados deste trabalho estão sendo usados na disciplina de Estrutura da Matéria com o objetivo que os alunos possam compreender os princípios básicos envolvidos na construção de microscópios eletrônicos tais como a convergência de um feixe divergente de elétrons e a conseqüente formação da hélice cilíndrica...

  19. Smart Grid Security: Threats, Challenges, and Solutions

    OpenAIRE

    Sanjab, Anibal; Saad, Walid; Guvenc, Ismail; Sarwat, Arif; Biswas, Saroj

    2016-01-01

    The cyber-physical nature of the smart grid has rendered it vulnerable to a multitude of attacks that can occur at its communication, networking, and physical entry points. Such cyber-physical attacks can have detrimental effects on the operation of the grid as exemplified by the recent attack which caused a blackout of the Ukranian power grid. Thus, to properly secure the smart grid, it is of utmost importance to: a) understand its underlying vulnerabilities and associated threats, b) quanti...

  20. THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT

    Science.gov (United States)

    2016-04-01

    Putin’s intent. What we can do is learn from his actions, and what we see suggests growing Russian capabilities, significant military modernization...AU/ACSC/POWELL, N/AY16 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE MYTH OF THE RUSSIAN EXISTENTIAL THREAT...The methodology focuses on Russian capability, capacity, and intention to threaten NATO members’ existence. While Russia does possess nuclear weapons

  1. Hollow Threats: Why Coercive Diplomacy Fails

    Science.gov (United States)

    2015-06-01

    brand this as selection bias, the study of coercion has neglected the cumulative factor and is therefore worth bringing into the spotlight. As this...ended. Therefore, the Somali factions had both the luxury and foreknowledge to wait until the menace decreased and the costs increased (as...observation, was a trip wire. Since the luxury of hindsight demonstrates that Assad did use WMD and since that part of the deterrent threat was

  2. Water Privatization: A Threat to Human Rights?

    OpenAIRE

    Pavelich, Kelly

    2017-01-01

    In developing countries, women often have responsibilities that are water dependent, such as collecting water and tending to the sick (Sewpaul, 2008: 45) As unpolluted water supplies diminish, these tasks become increasingly difficult to accomplish. Women face greater threats to their security as they are forced to walk farther, occasionally into dangerous areas, and lose several hours of their day, potentially reducing the household income and resulting in missed economic opportunities (Sewp...

  3. Zika Virus: An Emerging Worldwide Threat

    OpenAIRE

    Irfan A. Rather; Jameel B. Lone; Vivek K. Bajpai; Woon K. Paek; Jeongheui Lim

    2017-01-01

    ZIKA virus (ZIKV) poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV) and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is bei...

  4. Threats and opportunities for information systems outsourcing

    CSIR Research Space (South Africa)

    Smuts, H

    2015-10-01

    Full Text Available Reference Inadequate or weak contract management, fuzzy focus [16, 30, 50, 58, 62, 64] Inadequate process (“how”) e.g. inadequate planning [16, 17, 30, 36, 57] Poor management of contractors and lack of governance [16, 17, 30, 46, 61, 64, 71... decision-making cycles, lack of proper programme management and disempowered outsource programme team members. Threats in the outsourcing process and the management of the outsourcing contract may result in poor management of contractors, a lack...

  5. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  6. Maritime Threat Detection using Plan Recognition

    Science.gov (United States)

    2012-11-01

    operate in close proximity to large but much less maneuverable vessels. Various approaches for automated threat and anomaly detection have been...version space techniques, and other closed -world reasoning algorithms, while probabilistic algorithms include those that use stochastic grammars and...differ along many dimensions, such as their agent relation (e.g., keyhole , intention, adversarial), what they infer (e.g., action, plan, goal

  7. Date Sensitive Computing Problems: Understanding the Threat

    Science.gov (United States)

    1998-08-29

    equipment on Earth.3 It can also interfere with electromagnetic signals from such devices as cell phones, radio, televison , and radar. By itself, the ...spacecraft. Debris from impacted satellites will add to the existing orbital debris problem, and could eventually cause damage to other satellites...Date Sensitive Computing Problems Understanding the Threat Aug. 17, 1998 Revised Aug. 29, 1998 Prepared by: The National Crisis Response

  8. Community Changes Address Common Health Threat

    Centers for Disease Control (CDC) Podcasts

    2013-09-30

    This podcast helps residents living in multiunit housing, like apartments and condos, understand the threat of secondhand smoke. It also helps residents understand what steps they can take to breathe a little easier if involuntarily exposed to secondhand smoke.  Created: 9/30/2013 by Division of Community Health, National Center for Chronic Disease Prevention and Health Promotion.   Date Released: 9/30/2013.

  9. Assessment of the Emerging Biocruise Threat

    Science.gov (United States)

    2000-08-01

    more about Los Angeles than they do about Taiwan.”15 And obviously believing in the efficacy of their long-range nuclear missile capability in... vaccinated against anthrax. Apparently, Hussein was deterred from using his WMD by U.S. and Israeli threats of nuclear retaliation. The credibility of the...gangrene, aflatoxin, trichothecene mycotoxins, wheat cover smut, ricin, hemorrhagic conjunctivitis virus, rotavirus , camel pox Israel Researching

  10. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  11. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  12. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  13. Toddlers’ Duration of Attention towards Putative Threat

    Science.gov (United States)

    Kiel, Elizabeth J.; Buss, Kristin A.

    2010-01-01

    Although individual differences in reactions to novelty in the toddler years have been consistently linked to risk for developing anxious behavior, toddlers’ attention towards a novel, putatively threatening stimulus while in the presence of other enjoyable activities has rarely been examined as a precursor to such risk. The current study examined how attention towards an angry-looking gorilla mask in a room with alternative opportunities for play in 24-month-old toddlers predicted social inhibition when children entered kindergarten. Analyses examined attention to threat above and beyond and in interaction with both proximity to the mask and fear of novelty observed in other situations. Attention to threat interacted with proximity to the mask to predict social inhibition, such that attention to threat most strongly predicted social inhibition when toddlers stayed furthest from the mask. This relation occurred above and beyond the predictive relation between fear of novelty and social inhibition. Results are discussed within the broader literature of anxiety development and attentional processes in young children. PMID:21373365

  14. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  15. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  16. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  17. Novel polymeric micelles for insect pest control: encapsulation of essential oil monoterpenes inside a triblock copolymer shell for head lice control

    Directory of Open Access Journals (Sweden)

    Alejandro Lucia

    2017-04-01

    Full Text Available Background Essential oil components (EOCs are molecules with interesting application in pest control, these have been evaluated against different insect pest from more than 100 years, but their practical use is rather limited. Thus, the enhancement of their bioavailability and manageability due to their dispersion in water can open new perspective for the preparation of formulations for the control of insect pest. In this work, we studied the encapsulation of different monoterpenes in a poloxamer shell in order to prepare aqueous formulations that can be used for the development of platforms used in pest control. Methods Micellar systems containing a 5 wt% of poloxamer 407 and 1.25 wt% of the different monoterpenes were prepared. Dynamic Light Scattering (DLS experiments were carried out to characterize the dispersion of the EOCs in water. The pediculicidal activity of these micellar systems was tested on head lice using an ex vivo immersion test. Results The poloxamers allowed the dispersion of EOCs in water due to their encapsulation inside the hydrophobic core of the copolymer micelles. From this study, we concluded that it is possible to make stable micellar systems containing water (>90 wt%, 1.25 wt% of different monoterpenes and a highly safe polymer (5wt% Poloxamer 407. These formulations were effective against head lice with mortality ranging from 30 to 60%, being the most effective emulsions those containing linalool, 1,8-cineole, α-terpineol, thymol, eugenol, geraniol and nonyl alcohol which lead to mortalities above 50%. Discussion Since these systems showed good pediculicidal activity and high physicochemical stability, they could be a new route for the green fabrication of biocompatible and biosustainable insecticide formulations.

  18. Parques científicos-tecnológicos y modelo triple-hélice. Situación del Caribe colombiano

    Directory of Open Access Journals (Sweden)

    John Jairo Herrera-Márquez

    2015-01-01

    Full Text Available Los Parques de Ciencia y Tecnología se han constituido en un fenómeno mundial debido al desarrollo económico y social que han logrado los países al implementar este sistema. El objetivo del presente artículo es describir el origen y evolución de los Parques de Ciencia y Tecnología más representativos del mundo, el papel del modelo Triple Hélice en su desarrollo y la viabilidad de estas iniciativas en Co - lombia. Para allegar esta información se realizó una revisión bibliográfica en artículos y libros publicados entre los años 2000 y 2015, en conjunto con información de instituciones gubernamentales nacionales e internacionales y datos propios obtenidos a partir de encuestas. Se propone una definición de Parque de Ciencia y Tecnología como una institución que cuenta con espacio inmobiliario con beneficios tributarios, donde se instalan universidades y empresas que, haciendo uso de políticas gubernamentales de ciencia y tecnología, presta servicios especializados y desarrolla procesos de innovación. Dada la necesaria interacción entre la universidad, la industria y el gobierno, los Parques de Ciencia y Tecnología son un escenario óptimo para la aplicación del modelo Triple Hélice. En la Región Caribe colombiana se dan condiciones propicias para poner en marcha proyectos de parques porque existen necesidades en la empresa, capacidades en las universidades y políticas de ciencia, tecnología e innovación apropiadas; sin embargo, se requieren grandes esfuerzos por parte de todos los actores para lograr implementar modelos de operación sustentables.

  19. Malófagos (Phthiraptera, Amblycera, Ischnocera em aves cativas no sudeste do Brasil Chewing lice (Phthiraptera, Amblycera, Ischnocera on captive birds in southeastern Brazil

    Directory of Open Access Journals (Sweden)

    Salete Oliveira da Silva

    2009-01-01

    Full Text Available Foram identificadas 12 espécies de malófagos no Parque Zoológico Municipal Quinzinho de Barros, Sorocaba e Fundação Jardim Zoológico, Rio de Janeiro. Ciconiphilus pectiniventris em Cygnus atratus (Anseriformes, Anatidae; Kurodaia sp. em Buteo albicaudatus (Falconiformes, Accipitridae; Degeeriella sp. em Falco sparverius (Falconiformes, Falconidae; Colpocephalum sp. e Goniocotes parviceps em Pavo cristatus (Galliformes, Phasianidae; Goniodes pavonis em Rhea americana (Rheiformes, Rheidae; Colpocephalum cristatae e Heptapsogaster sp. em Cariama cristata (Gruiformes, Cariamidae; Austrophilopterus cancellosus em Ramphastos dicolorus (Piciformes, Ramphastidae; Strigiphilus crucigerus em Otus choliba (Strigiformes, Strigidae; Kurodaia sp. em Rhinoptynx clamator (Strigiformes, Strigidae e Colpocephalum pectinatum em Speotyto cunicularia (Strigiformes, Strigidae. As relações parasito hospedeiros em Strigiformes são novas no Brasil.Twelve chewing lice species were identified in Parque Zoológico Municipal Quinzinho de Barros, Sorocaba and Fundação Jardim Zoológico, Rio de Janeiro. The parasites found were: Ciconiphilus pectiniventris in Cygnus atratus (Anseriformes, Anatidae; Kurodaia sp. in Buteo albicaudatus (Falconiformes, Accipitridae; Degeeriella sp. in Falco sparverius (Falconiformes, Falconidae; Colpocephalum sp. and Goniocotes parviceps in Pavo cristatus (Galliformes, Phasianidae; Goniodes pavonis in Rhea americana (Rheiformes, Rheidae; Colpocephalum cristatae and Heptapsogaster sp. in Cariama cristata (Gruiformes, Cariamidae; Austrophilopterus cancellosus in Ramphastos dicolorus (Piciformes, Ramphastidae; Strigiphilus crucigerus in Otus choliba (Strigiformes, Strigidae; Kurodaia sp. in Rhinoptynx clamator (Strigiformes, Strigidae and Colpocephalum pectinatum in Speotyto cunicularia (Strigiformes, Strigidae. The host-lice relationships are new in Strigiformes in Brazil.

  20. Experimentos de combustión con cascarilla de arroz en lecho fluidizado para la producción de ceniza rica en sílice

    Directory of Open Access Journals (Sweden)

    Juan Daniel Martínez Ángel

    2010-01-01

    Full Text Available A fin de contribuir con la valorización de residuos agrícolas que presentan dificultades de disposición, la utilización de energéticos renovables y la obtención de formas de energía más limpias y amigables con el medio ambiente, se investigó la combustión de cascarilla de arroz en un reactor de lecho fluidizado burbujeante y atmosférico. La metodología consistió en evaluar la influencia de altos excesos de aire, en la obtención de gases calientes y ceniza con altos contenidos de sílice en estado amorfo. Excesos de aire en el rango de 40% al 125%, mostraron que los valores cercanos al límite inferior establecido (40% favorecieron temperaturas superiores a 700ºC en el interior del reactor, dando origen a mayores eficiencias de conversión de la cascarilla, pero disminuyendo el potencial amorfo de la sílice contenida en la ceniza. Comportamiento contrario fue evidenciado en el límite superior del exceso de aire. Las concentraciones de los gases del proceso mostraron relativa variabilidad para cada condición de operación. Para el caso del CO, se reportaron emisiones promedio de 200 ppm (en una base seca del 11% de O2, para los excesos de aire comprendidos entre 40% y 82,5%.

  1. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  2. VEDS-Automated system for inspection of vehicles and containers for explosives and other threats

    International Nuclear Information System (INIS)

    Gozani, T.; Liu, F.; Sivakumar, M.

    2004-01-01

    Many parts of national infrastructures around the world are very vulnerable to terrorist threats in the form of large vehicle bombs. The larger bomb, the larger is the damage and its extent. The number of containers and vehicles crossing land or sea ports of entry is huge. Tough the probability is low, any vehicle may contain a threat. Any system addressing these enormous security tasks should obviously be based on excellent human intelligence to focus the attention on a much smaller number of high-risk containers and vehicles. These containers must then be subjected to a thorough and reliable inspection for the threats.Viable security system must incorporate a credible and effective inspection to achieve its purposes. It should have high performance and be operationally acceptable. This means the system must possess high detection capabilities, low false positive rate, fast response and provide automatic decision eliminating the need for human interpretation. Ancore has developed a range of new inspection devices, which are highly suitable for the above tasks. All the systems are automatic, material specific, high performance for a wide range and type of threats. Some of them are also highly modular, and compact. Some of the systems are fixed, other are relocatable, or fully mobile. The presentation will discuss Ancore's VEDS (Vehicle Explosive Detection System) which detects bulk explosives (expandable also to radiological and nuclear threats)) in marine containers, trucks and cars. The compact and rugged nature of the VEDS sensor makes it suitable for many forms of conveyance: mobile (van mounted), portal, forklift mounted, or mounted on container unloading rig. The physics principles of the system and some recent applications and results will be presented

  3. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  4. lllicit Radiological and Nuclear Trafficking, Smuggling and Security Incidents in the Black Sea Region since the Fall of the Iron Curtain – an Open Source Inventory

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2012-05-01

    Full Text Available Nuclear and radiological smuggling and trafficking incidents, events, and threats from the wider Black Sea area, 1990 – 2011  An Open Source Compilation prepared by Alex P. Schmid & Charlotte Spencer-Smith

  5. Glider communications and controls for the sea sentry mission.

    Energy Technology Data Exchange (ETDEWEB)

    Feddema, John Todd; Dohner, Jeffrey Lynn

    2005-03-01

    This report describes a system level study on the use of a swarm of sea gliders to detect, confirm and kill littoral submarine threats. The report begins with a description of the problem and derives the probability of detecting a constant speed threat without networking. It was concluded that glider motion does little to improve this probability unless the speed of a glider is greater than the speed of the threat. Therefore, before detection, the optimal character for a swarm of gliders is simply to lie in wait for the detection of a threat. The report proceeds by describing the effect of noise on the localization of a threat once initial detection is achieved. This noise is estimated as a function of threat location relative to the glider and is temporally reduced through the use of an information or Kalman filtering. In the next section, the swarm probability of confirming and killing a threat is formulated. Results are compared to a collection of stationary sensors. These results show that once a glider has the ability to move faster than the threat, the performance of the swarm is equal to the performance of a stationary swarm of gliders with confirmation and kill ranges equal to detection range. Moreover, at glider speeds greater than the speed of the threat, swarm performance becomes a weak function of speed. At these speeds swarm performance is dominated by detection range. Therefore, to future enhance swarm performance or to reduce the number of gliders required for a given performance, detection range must be increased. Communications latency is also examined. It was found that relatively large communication delays did little to change swarm performance. Thus gliders may come to the surface and use SATCOMS to effectively communicate in this application.

  6. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  7. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  8. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  9. A Relação Universidade-Empresa no Brasil e o "Argumento da Hélice Tripla"

    Directory of Open Access Journals (Sweden)

    Renato Dagnino

    2003-01-01

    Full Text Available A relação universidade-empresa (relação U-E é abordada tendo como guia o “argumento da Hélice Tripla” (argumento HT, entendido como combinação de duas correntes de pensamento elaboradas nos países avançados — a “Segunda Revolução Acadêmica” e a que ressalta a importância das relações com o entorno na competitividade das empresas — e de uma proposição de Política Científica e Tecnológica (PCT — os Pólos e Parques Tecnológicos — delas decorrente. Analisando a evolução das interpretações sobre a relação U-E na América Latina — os marcos de referência utilizados, as posturas analíticas ou disciplinares, sua influência junto à comunidade de pesquisa e na elaboração de PCT — mostra-se como o argumento HT contribuiu para que a interpretação que até o final dos anos 1980 era dominante perdesse influência e como o debate em curso entre essas duas atuais posições parece encaminhar-se. Por oferecer um padrão para análise crítica das mudanças nos modelos explicativo e normativo-institucional da PCT em países avançados e periféricos, o argumento HT pode informar novas interpretações, mais aderentes ao cenário de democratização ora em construção no País.The university-firm relationship (UFR is approached having as a guide the “Triple Helix statement” (TH, undestood as a combination of two currents of thought produced in advanced countries — the “Second Academic Revolution” and the one that stresses the relations between firms and their context as competitiveness factors — and an associated measure of Science and Technology Policy (STP — the Technological Parks. Analysing the evolution of UFR interpretations in Latin America — the frameworks used, the analytic or disciplinary postures, their influence on the research community and in the STP — the paper shows how TH debilitated the interpretation that had been dominant until the end of the 1980s, and how the debate

  10. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  11. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  12. Head Lice: Treatment

    Science.gov (United States)

    ... before treatment using the hot water (130°F) laundry cycle and the high heat drying cycle. Clothing ... does not imply endorsement by the Public Health Service or by the U.S. Department of Health and ...

  13. Treating Head Lice

    Science.gov (United States)

    ... Blood & Biologics Articulos en Espanol Protect Yourself Health Fraud Consumer Information by Audience For Seniors For Women ... feeds Follow FDA on Twitter Follow FDA on Facebook View FDA videos on YouTube View FDA photos ...

  14. A New Approach to Sea Transportation: An Application in Turkey

    Directory of Open Access Journals (Sweden)

    Alper Erturk

    2017-04-01

    Full Text Available This study has been conducted to detect the strengths and the improvement requiring areas of sea transportation in Turkey via SWOT analysis, and the opportunities this sector brings to Turkey and the threats that might appear have been put forward in several aspects. When the necessary advances have been made considering the outcomes of this study, it can be foreseen that Turkish navigation can make a swift progress and assume its place in the top 5 mercantile fleets of the World Trade Fleet. Moreover, this new approach that can be developed through the example of Turkey, especially in the context of SWOT analysis methodology, can get to be seen as a role model before the other developing countries.Sea transportation is not merely a transportation sector. Along with goods and human transportation, ship building industry, port services, sea insurance and sea tourism are among the many naval activities. Because of all these, sea transportation has a significant place in international trade. The overall commercial value of world trade mounting up to 15 trillion US dollars, 9 trillion dollars of this has been conducted via sea transportation. In other words, 60 percent of world commerce has been done through sea transportation (GISBIR, 2013. Furthermore, the volume of the dry bulk market via sea transportation is expected to grow by 6 percent between the years 2014 and 2018 (GISBIR, 2013.

  15. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  16. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  17. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  18. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  19. Climatic threats on the worldwide peace

    International Nuclear Information System (INIS)

    Valantin, J.M.

    2005-06-01

    This book approaches the climatic change under the international relation aspect. It recalls the progressive growth of the collective awareness about the threats of human activities on Earth's climate and analyzes more particularly the policies adopted by the US, UK and the European Union. It evokes also the problems encountered by the developing countries, the energy needs of which are continuously increasing. Finally, it puts the question of the capacity of the international community to solve, by negotiations and not by conflicts, the tensions generated by environmental crises. (J.S.)

  20. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  1. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  2. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  3. Chewing lice (Insecta: Phthiraptera) from estrildid finches (Aves: Passeriformes: Estrildidae) and louse-flies (Insecta: Diptera: Hippoboscidae) from birds in Senegal, with descriptions of three new species of the genus Brueelia

    Czech Academy of Sciences Publication Activity Database

    Sychra, O.; Literák, I.; Najer, T.; Čapek, Miroslav; Koubek, Petr; Procházka, Petr

    2010-01-01

    Roč. 2714, - (2010), s. 59-68 ISSN 1175-5326 R&D Projects: GA AV ČR IAA6093404; GA AV ČR IAA601690901; GA MŠk LC06073 Institutional research plan: CEZ:AV0Z60930519 Keywords : chewing lice * louse-flies * Passeriformes * Senegal Subject RIV: EG - Zoology Impact factor: 0.853, year: 2010 http://www.mapress.com/zootaxa/2010/f/zt02714p068.pdf

  4. Piezoelectric properties enhanced of Sr0.6(BiNa)0.2Bi2Nb2O9 ceramic by (LiCe) modification with charge neutrality

    International Nuclear Information System (INIS)

    Fang, Pinyang; Xi, Zengzhe; Long, Wei; Li, Xiaojuan; Li, Jin

    2013-01-01

    Graphical abstract: The oxygen vacancies were confirmed by the left figure. The role of oxygen vacancy on piezoelectric activities was obtained by comparing to the varieties of oxygen vacancy concentration and piezoelectric coefficient with (LiCe) modification. -- Highlights: • The Sr 0.6 (BiNa) 0.2 Bi 2 Nb 2 O 9 ceramic by (LiCe) modification with the charge neutrality was synthesized by the solid state reaction method. • The Curie temperature and piezoelectric coefficient were found to be T c ∼590 °C and d 33 ∼32 pC/N, respectively. • The mechanism of piezoelectric activities improved by (LiCe) modification was discussed. -- Abstract: Aurivillius-type ceramics, Sr 0.6−x (LiCe) x/2.5 (BiNa) 0.2 Bi 2 Nb 2 O 9 (SLCBNBNO) with the charge neutrality, were synthesized by using conventional solid-state processing. Phase analysis was performed by X-ray diffraction analyses (XRD) and Raman spectroscopy. Microstructural morphology was assessed by the scanning electron microscopy (SEM). Structural, dielectric, piezoelectric, ferroelectric, and electromechanical properties of the SLCBNBNO ceramics were investigated. Piezoelectric properties were significantly enhanced compared to Sr 0.6 (BiNa) 0.2 Bi 2 Nb 2 O 9 (SBNBN) ceramic and the maximum of piezoelectric coefficient d 33 of the SBNBN-LC6 ceramic was 32 pC/N with higher Curie temperature (T c ∼590 °C). In addition, mechanisms for the piezoelectric properties enhanced of the SBNBN-based ceramics were discussed

  5. Growing threat of intense tropical cyclones to East Asia over the period 1977–2010

    International Nuclear Information System (INIS)

    Park, Doo-Sun R; Ho, Chang-Hoi; Kim, Joo-Hong

    2014-01-01

    The threat of intense tropical cyclones (TCs) to East Asia has increased in recent decades. Integrated analyses of five available TC data sets for the period 1977–2010 revealed that the growing threat of TCs primarily results from the significant shift that the spatial positions of the maximum intensity of TCs moved closer to East Asian coastlines from Vietnam to Japan. This shift incurs a robust increase in landfall intensity over east China, Korea and Japan. In contrast, an increase of TC genesis frequency over the northern part of the South China Sea leads to a reduction in the maximum TC intensity before landfall, because of their short lifetime; thus, there are no clear tendencies in the landfall intensity across Vietnam, south China and Taiwan. All changes are related to the strengthening of the Pacific Walker circulation, closely linked with the recent manifestation that the warming trend of sea surface temperature in the tropical western Pacific is much higher than that in the central to eastern Pacific. (paper)

  6. THE THREAT OF THE CURRENT MARITIME PIRACY

    Directory of Open Access Journals (Sweden)

    JUAN C. FERNÁNDEZ SANZ

    2017-12-01

    Full Text Available This study aims to conduct an analysis of the current piracy situation -as defined in the UN Convention on the Law of the Sea 1982- and the International Maritime Organization’s armed robbery against ships concept. This analysis is focusing on those places in which it is more common the occurrence of these violations, such as Somalia and Southeast Asia. This study includes a statement of its causal factors, as well as a review of statistical and ‘modus operandi’ of those crimes. It will be also shown the identification of the geographical zones where the attacks at sea are more frequently. Finally it an study of the the answers and the naval operations that the international community has developed against those felonies, will be presented.

  7. Prefrontal control of attention to threat

    Directory of Open Access Journals (Sweden)

    Polly V Peers

    2013-02-01

    Full Text Available Attentional control refers to the regulatory processes that ensure that our actions are in accordance with our goals. Dual-system accounts view temperament as consisting of both individual variation in emotionality (e.g. trait anxiety and variation in regulatory attentional mechanisms that act to modulate emotionality. Increasing evidence links trait variation in attentional control to clinical mood and anxiety disorder symptoms, independent of trait emotionality. Attentional biases to threat have been robustly linked to mood and anxiety disorders. However, the role of variation in attentional control in influencing such biases, and the neural underpinnings of trait variation in attentional control, are unknown. Here, we show, that individual differences in trait attentional control, even when accounting for trait and state anxiety, are related to the magnitude of an attentional blink following threat-related targets. Moreover, we demonstrate that activity in dorsolateral prefrontal cortex, is observed specifically in relation to control of attention over threatening stimuli, in line with neural theories of attentional control, such as guided activation theory. These results have key implications for neurocognitive theories of attentional bias and emotional resilience.

  8. Religion, group threat and sacred values

    Directory of Open Access Journals (Sweden)

    Hammad Sheikh

    2012-03-01

    Full Text Available Sacred or protected values have important influences on decision making, particularly in the context of intergroup disputes. Thus far, we know little about the process of a value becoming sacred or why one person may be more likely than another to hold a sacred value. We present evidence that participation in religious ritual and perceived threat to the group lead people to be more likely to consider preferences as protected or sacred values. Specifically, three studies carried out with Americans and Palestinians show: (a that the more people participate in religious ritual the more likely they are to report a preference to be a sacred value (Studies 1--3; (b that people claim more sacred values when they are reminded of religious ritual (Study 2; and (c that the effect of religious ritual on the likelihood of holding a sacred value is amplified by the perception of high threat to the in-group (Study 3. We discuss implications of these findings for understanding intergroup conflicts, and suggest avenues for future research into the emergence and spread of sacred values.

  9. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  10. Initial perspectives on process threat management

    International Nuclear Information System (INIS)

    Whiteley, James R. Rob; Mannan, M. Sam

    2004-01-01

    Terrorist and criminal acts are now considered credible risks in the process industries. Deliberate attacks on the nation's petroleum refineries and chemical plants would pose a significant threat to public welfare, national security, and the US economy. To-date, the primary response of government and industry has been on improved security to prevent attacks and the associated consequences. While prevention is clearly preferred, the potential for successful attacks must be addressed. If plant security is breached, the extent of the inflicted damage is determined by the available plant safety systems and procedures. We refer to this 'inside the gate' response as process threat management. The authors have initiated a joint industry/academia study to address: - the level of safety provided by existing plant equipment and safety systems in response to a terrorist act, and; - identification of process (rather than security) needs or opportunities to address this new safety concern. This paper describes the initial perspectives and issues identified by the team at the beginning of the study

  11. Nuclear Smuggling and Threats to Lithuanian Security

    Directory of Open Access Journals (Sweden)

    Murauskaitė Eglė

    2016-12-01

    Full Text Available The article explores threats related to illicit trafficking of radioactive materials and dual-use goods applicable in state level nuclear programs, actualizing the global trends for the Baltic region. The article points to Eastern Europe’s changing risk profile in this respect, as increasing penetration of Russian criminal groups inside Ukraine and the destabilized situations in neighboring countries create an environment where the risk of nuclear smuggling is on the rise. Criminal entities can be seen forming new bonds, with trafficking routes intersecting and zones of influence shifting - consequently, an unusual level of criminal involvement in nuclear smuggling is observed, alongside a geographic shift of smuggling patterns. In addition, states seeking materials and technologies for their military programs have taken a notable interest in this region as a way of circumventing international transit regulations. The article looks at the likely implications of these new nuclear smuggling trends for the security of the Baltic states. It suggests that Lithuania may soon be facing a relatively new threat, and one that it is ill-prepared to counter. The article discusses the risk factors and indicators to watch before that risk becomes reality, and offers ways for Lithuania to contribute to addressing these increasingly acute problems on a regional level.

  12. Mitigating Inadvertent Insider Threats with Incentives

    Science.gov (United States)

    Liu, Debin; Wang, Xiaofeng; Camp, L. Jean

    Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a malicious outsider to use the privileges of the inattentive insider to implement an insider attack. This risk is as old as conversion of a weak user password into root access, but the term inadvertent insider is recently coined to identify the link between the behavior and the vulnerability. In this paper, we propose to mitigate this threat using a novel risk budget mechanism that offers incentives to an insider to behave according to the risk posture set by the organization. We propose assigning an insider a risk budget, which is a specific allocation of risk points, allowing employees to take a finite number of risk-seeking choice. In this way, the employee can complete her tasks without subverting the security system, as with absolute prohibitions. In the end, the organization penalizes the insider if she fails to accomplish her task within the budget while rewards her in the presence of a surplus. Most importantly. the risk budget requires that the user make conscious visible choices to take electronic risks. We describe the theory behind the system, including specific work on the insider threats. We evaluated this approach using human-subject experiments, which demonstrate the effectiveness of our risk budget mechanism. We also present a game theoretic analysis of the mechanism.

  13. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  14. Nuclear threats and emergency preparedness in Finland

    International Nuclear Information System (INIS)

    Mustonen, R.; Aaltonen, H.; Laaksonen, J.; Lahtinen, J.; Rantavaara, A.; Reponen, H.; Rytoemaa, T.; Suomela, M.; Toivonen, H.; Varjoranta, T.

    1995-10-01

    The political and economic upheavals which have taken place in Eastern Europe have had an impact on radiation and nuclear safety throughout Europe. Emergency preparedness systems for unexpected nuclear events have been developed further in all European countries, and prosperous western nations have invested in improving the safety of East European nuclear power plants. The economic crisis facing countries of the former Soviet Union has also promoted illicit trade in nuclear materials; this has made it necessary for various border guards and police authorities to intensify their collaboration and to tighten border controls. On 3-4 October 1995, Finnish Centre for Radiation and Nuclear Safety (STUK) arranged a seminar on nuclear threats and emergency preparedness in Finland. In addition to STUK experts, a wide range of rescue and civil defence authorities, environmental health specialists and other persons engaged in emergency preparedness attended the seminar. The publication contains a compilation of reports presented at the seminar. The reports cover a broad spectrum of nuclear threats analyzed at STUK, the impacts of radioactive fallout on human beings and on the environment, and preparedness systems by which the harmful effects of radiation or nuclear accidents can, if necessary, be minimized. (33 figs., 5 tabs.)

  15. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  16. Sea Lion Diet Data

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — California sea lions pup and breed at four of the nine Channel Islands in southern California. Since 1981, SWFSC MMTD has been conducting a diet study of sea lions...

  17. Should We Leave? Attitudes towards Relocation in Response to Sea Level Rise

    Directory of Open Access Journals (Sweden)

    Jie Song

    2017-12-01

    Full Text Available The participation of individuals contributes significantly to the success of sea level rise adaptation. This study therefore addresses what influences people’s likelihood of relocating away from low-lying areas in response to rising sea levels. The analysis was based on a survey conducted in the City of Panama Beach in Florida (USA. Survey items relate to people’s risk perception, hazard experience, threat appraisal, and coping appraisal, whose theoretical background is Protection Motivation Theory. Descriptive and correlation analysis was first performed to highlight critical factors which were then examined by a multinomial Logit model. Results show that sea level rise awareness is the major explanatory variable. Coping appraisal is qualitatively viewed as a strong predictor for action, while threat appraisal is statistically significant in driving relocation intention. These factors should be integrated in current risk communication regarding sea level rise.

  18. The Strategic Threat of Inevitable Climate Change

    Science.gov (United States)

    2013-03-01

    balances that affect US national security.19 United Nations Secretary-General Ban Ki-moon, addressing the 2012 U.N. climate talks in Doha, Qatar ...flooding and increase the salinity of rivers, bays and aquifers . With higher sea level, coastal regions would also be subject to increased wind and flood...importantly, when action must be taken. In 2012, Doha, Qatar hosted the 18th annual UN climate conference. On the surface, it seems like a

  19. Fin whales and microplastics: The Mediterranean Sea and the Sea of Cortez scenarios.

    Science.gov (United States)

    Fossi, Maria Cristina; Marsili, Letizia; Baini, Matteo; Giannetti, Matteo; Coppola, Daniele; Guerranti, Cristiana; Caliani, Ilaria; Minutoli, Roberta; Lauriano, Giancarlo; Finoia, Maria Grazia; Rubegni, Fabrizio; Panigada, Simone; Bérubé, Martine; Urbán Ramírez, Jorge; Panti, Cristina

    2016-02-01

    The impact that microplastics have on baleen whales is a question that remains largely unexplored. This study examined the interaction between free-ranging fin whales (Balaenoptera physalus) and microplastics by comparing populations living in two semi-enclosed basins, the Mediterranean Sea and the Sea of Cortez (Gulf of California, Mexico). The results indicate that a considerable abundance of microplastics and plastic additives exists in the neustonic samples from Pelagos Sanctuary of the Mediterranean Sea, and that pelagic areas containing high densities of microplastics overlap with whale feeding grounds, suggesting that whales are exposed to microplastics during foraging; this was confirmed by the observation of a temporal increase in toxicological stress in whales. Given the abundance of microplastics in the Mediterranean environment, along with the high concentrations of Persistent Bioaccumulative and Toxic (PBT) chemicals, plastic additives and biomarker responses detected in the biopsies of Mediterranean whales as compared to those in whales inhabiting the Sea of Cortez, we believe that exposure to microplastics because of direct ingestion and consumption of contaminated prey poses a major threat to the health of fin whales in the Mediterranean Sea. Copyright © 2015 Elsevier Ltd. All rights reserved.

  20. Middle Range Sea Ice Prediction System of Voyage Environmental Information System in Arctic Sea Route

    Science.gov (United States)

    Lim, H. S.

    2017-12-01

    Due to global warming, the sea ice in the Arctic Ocean is melting dramatically in summer, which is providing a new opportunity to exploit the Northern Sea Route (NSR) connecting Asia and Europe ship route. Recent increases in logistics transportation through NSR and resource development reveal the possible threats of marine pollution and marine transportation accidents without real-time navigation system. To develop a safe Voyage Environmental Information System (VEIS) for vessels operating, the Korea Institute of Ocean Science and Technology (KIOST) which is supported by the Ministry of Oceans and Fisheries, Korea has initiated the development of short-term and middle range prediction system for the sea ice concentration (SIC) and sea ice thickness (SIT) in NSR since 2014. The sea ice prediction system of VEIS consists of AMSR2 satellite composite images (a day), short-term (a week) prediction system, and middle range (a month) prediction system using a statistical method with re-analysis data (TOPAZ) and short-term predicted model data. In this study, the middle range prediction system for the SIC and SIT in NSR is calibrated with another middle range predicted atmospheric and oceanic data (NOAA CFSv2). The system predicts one month SIC and SIT on a daily basis, as validated with dynamic composite SIC data extracted from AMSR2 L2 satellite images.

  1. Prioritizing land and sea conservation investments to protect coral reefs.

    Directory of Open Access Journals (Sweden)

    Carissa J Klein

    Full Text Available BACKGROUND: Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming and in the sea (e.g. overfishing. Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification. Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. METHODOLOGY/PRINCIPAL FINDINGS: Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. CONCLUSIONS/SIGNIFICANCE: Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems.

  2. Prioritizing land and sea conservation investments to protect coral reefs.

    Science.gov (United States)

    Klein, Carissa J; Ban, Natalie C; Halpern, Benjamin S; Beger, Maria; Game, Edward T; Grantham, Hedley S; Green, Alison; Klein, Travis J; Kininmonth, Stuart; Treml, Eric; Wilson, Kerrie; Possingham, Hugh P

    2010-08-30

    Coral reefs have exceptional biodiversity, support the livelihoods of millions of people, and are threatened by multiple human activities on land (e.g. farming) and in the sea (e.g. overfishing). Most conservation efforts occur at local scales and, when effective, can increase the resilience of coral reefs to global threats such as climate change (e.g. warming water and ocean acidification). Limited resources for conservation require that we efficiently prioritize where and how to best sustain coral reef ecosystems. Here we develop the first prioritization approach that can guide regional-scale conservation investments in land- and sea-based conservation actions that cost-effectively mitigate threats to coral reefs, and apply it to the Coral Triangle, an area of significant global attention and funding. Using information on threats to marine ecosystems, effectiveness of management actions at abating threats, and the management and opportunity costs of actions, we calculate the rate of return on investment in two conservation actions in sixteen ecoregions. We discover that marine conservation almost always trumps terrestrial conservation within any ecoregion, but terrestrial conservation in one ecoregion can be a better investment than marine conservation in another. We show how these results could be used to allocate a limited budget for conservation and compare them to priorities based on individual criteria. Previous prioritization approaches do not consider both land and sea-based threats or the socioeconomic costs of conserving coral reefs. A simple and transparent approach like ours is essential to support effective coral reef conservation decisions in a large and diverse region like the Coral Triangle, but can be applied at any scale and to other marine ecosystems.

  3. A Lesson Not to Be Learned? Understanding Stereotype Threat Does Not Protect Women from Stereotype Threat

    Science.gov (United States)

    Tomasetto, Carlo; Appoloni, Sara

    2013-01-01

    This research examines whether reading a text presenting scientific evidence concerning the phenomenon of stereotype threat improves or disrupts women's performance in a subsequent math task. In two experimental conditions participants (N=118 ) read a text summarizing an experiment in which stereotypes, and not biological differences, were shown…

  4. Feeling the Threat: Stereotype Threat as a Contextual Barrier to Women's Science Career Choice Intentions

    Science.gov (United States)

    Deemer, Eric D.; Thoman, Dustin B.; Chase, Justin P.; Smith, Jessi L.

    2014-01-01

    Social cognitive career theory (SCCT; Lent, Brown, & Hackett, 1994, 2000) holds that contextual barriers inhibit self-efficacy and goal choice intentions from points both near and far from the active career development situation. The current study examined the influence of one such proximal barrier, stereotype threat, on attainment of these…

  5. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  6. AoA Region: Red Sea And Gulf of Aden

    Digital Repository Service at National Institute of Oceanography (India)

    Naqvi, S.W.A.

    . The Secretariat for PERSGA was formally established in Jeddah following the Cairo Declaration of September 1995. PERSGA’s mandate is to perform functions necessary for the management of the Jeddah Convention and its Action Plan. As a result, PERSGA, in close... collaboration with relevant regional and international organizations, began implementing activities and programmes to deal with the various threats facing the coastal and marine environments in the Red Sea and Gulf of Aden region. The Strategic Action...

  7. Surface combatant readiness to confront a sea control navy

    OpenAIRE

    Wissel, Nicholas E.

    2008-01-01

    This thesis proposes to correct the shortfalls in the US Surface Combatants ability to counter a Sea-Control Navy. The concept counters this threat using unmanned aerial systems, decoys, and a layered defense. We analyze the performance with a Filtering Model of Salvo Warfare that is an extension of the Hughes Salvo Equations. The model incorporates the diluting effect of decoys upon enemy salvos and accounts for the historical reality of leakers. We conclude that in the absence of air suppor...

  8. China's Crisis Bargaining in the South China Sea Dispute (2010-2013)

    OpenAIRE

    Ramadhani, Eryan

    2014-01-01

    As one of China’s most intricate territorial dispute, the South China Sea dispute has sufficiently consumed significant amount of Chinese leaders’ attention in Beijing. This paper reveals that China exerts signaling strategy in its crisis bargaining over the South China Sea dispute. This strategy contains reassurance as positive signal through offering negotiation and appearing self-restraint and of negative signal by means of escalatory acts and verbal threats. China’s crisis bargaining in t...

  9. Review of the systematics, biology and ecology of lice from pinnipeds and river otters (Insecta: Phthiraptera: Anoplura: Echinophthiriidae).

    Science.gov (United States)

    Soledad Leonardi, Maria; Palma, Ricardo Luis

    2013-01-01

    We present a literature review of the sucking louse family Echinophthiriidae, its five genera and twelve species parasitic on pinnipeds (fur seals, sea lions, walruses, true seals) and the North American river otter. We give detailed synonymies and published records for all taxonomic hierarchies, as well as hosts, type localities and repositories of type material; we highlight significant references and include comments on the current taxonomic status of the species. We provide a summary of present knowledge of the biology and ecology for eight species. Also, we give a host-louse list, and a bibliography to the family as complete as possible.

  10. El modelo de Triple Hélice de relaciones universidad, industria y gobierno: un análisis crítico

    Directory of Open Access Journals (Sweden)

    González de la Fe, Teresa

    2009-08-01

    Full Text Available In this essay, I attend to the Triple Helix Model of rela tions among university, industry and government, broadly used in innovation studies. The model was proposed by Henry Etzkowitz and Löet Leyersdorf and it has been very succesful as a heuristic for analysis of innovation process and as a normative guide for innovation policies. Moreover, its theoretical foundations are suited with perspectives from evolutive and institutionalist theories of economic science, at the same time that it takes in account sociological variables usually unattended in economic theory. By other hand, the accumulative knowledge about diverse experiences of triple helix more than one decade ago has shown that the Triple Helix model is adequated as a impeller for innovations not only directed to market but also to various social problems. In spite of it, the model has originated critics pointing to its supporting functions and its weaknesses for adecuated descriptions and explanations of complex processes of innovation.Se revisará el modelo de Triple Hélice de relaciones entre universidad, industria y gobierno, ampliamente usado en los estudios de la innovación. Impulsado por Etzkowitz y Leyersdorf, el modelo ha resultado fructífero como heurística para el análisis de los procesos de innovación y como esquema normativo para políticas de innovación. Además, los fundamentos teóricos del modelo casan bien con los enfoques de las teorías evolucionista e institucionalista en economía, al tiempo que toman en cuenta variables sociológicas tradicionalmente descuidadas por la teoría económica. Por otro lado, la acumulación de conocimiento en torno a experiencias de triples hélices durante más de una década ha mostrado que el modelo sirve como impulsor de innovaciones no sólo destinadas al mercado sino también a diferentes problemas sociales. Pese a ello, ha suscitado críticas que señalan sus funciones legitimadoras y sus debilidades para la descripci

  11. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  12. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  13. Threats and opportunities of plant pathogenic bacteria.

    Science.gov (United States)

    Tarkowski, Petr; Vereecke, Danny

    2014-01-01

    Plant pathogenic bacteria can have devastating effects on plant productivity and yield. Nevertheless, because these often soil-dwelling bacteria have evolved to interact with eukaryotes, they generally exhibit a strong adaptivity, a versatile metabolism, and ingenious mechanisms tailored to modify the development of their hosts. Consequently, besides being a threat for agricultural practices, phytopathogens may also represent opportunities for plant production or be useful for specific biotechnological applications. Here, we illustrate this idea by reviewing the pathogenic strategies and the (potential) uses of five very different (hemi)biotrophic plant pathogenic bacteria: Agrobacterium tumefaciens, A. rhizogenes, Rhodococcus fascians, scab-inducing Streptomyces spp., and Pseudomonas syringae. Copyright © 2013 Elsevier Inc. All rights reserved.

  14. Stereotype Threat and Women's Performance in Physics

    Science.gov (United States)

    Marchand, Gwen C.; Taasoobshirazi, Gita

    2013-12-01

    Stereotype threat (ST), which involves confirming a negative stereotype about one's group, is a factor thought to contribute to the gender gap in science achievement and participation. This study involved a quasi-experiment in which 312 US high school physics students were randomly assigned, via their classroom cluster, to one of three ST conditions. The conditions included an explicit ST condition, an implicit ST condition, and a nullified condition. Results indicated that males in all three conditions performed similarly on a set of physics problems. Females in the nullified condition outperformed females in the explicit ST condition and females in the implicit and explicit conditions performed similarly. Males performed better than females in the implicit and explicit ST conditions, but male and female performance on the physics problems was not significantly different in the nullified condition. The implications of these findings for physics instruction and future research on gender differences in physics and ST in science are discussed.

  15. Biophysics and the Challenges of Emerging Threats

    CERN Document Server

    Puglisi, Joseph D

    2009-01-01

    This volume is a collection of articles from the proceedings of the International School of Structural Biology and Magnetic Resonance 8th Course: Biophysics and the Challenges of Emerging Threats. This NATO Advance Study Institute (ASI) was held in Erice at the Ettore Majorana Foundation and Centre for Scientific Culture on 19 through 30 June 2007. The ASI brought together a diverse group of experts who bridged the fields of virology and biology, biophysics, chemistry and physics. Prominent lecturers and students from around the world representant a total of 24 countries participated in the NATO ASI organized by Professors Joseph Puglisi (Stanford University, USA) and Alexander Arseniev (Moscow, RU). The central hypothesis underlying this ASI was that interdisciplinary research, merging principles of physics, chemistry and biology, can drive new discovery in detecting and fighting bioterrorism agents, lead to cleaner environments, and help propel development in NATO partner countries. The ASI merged the relat...

  16. Consequences of a changing CBRN threat

    International Nuclear Information System (INIS)

    Medema, J.

    2009-01-01

    The OPCW now counts 186 member States. Member States that possessed chemical weapons (CW) are destroying those weapons, albeit at a slow pace. In the coming decade most, if not all, of the 100.000 + tons of CW from the previous century will have been destroyed. Of the 12± States, not part of the OPCW, four of them potentially have CW but their quantities are restricted to less than 1000 tons. About one kg of the more potent nerve agent or Mustard gas is required to produce on average one casualty amongst unprotected troops, 1000 tons potentially can produce 1 million casualties. Protection, passive chemical defense, is therefore mandatory. However, once a detection and protection system is in place, with a protection factor of say one thousand, the amount required to produce one casualty amongst troops in a military scenario becomes prohibitive. Furthermore, available CW quantities will have been reduced by pre-emptive airstrikes and the aggressor will have little chance to fully deploy his CW capability. The threat from massive CW with units facing several attacks per week has changed to incidental attacks on a smaller scale and with far lower frequency. This should have consequences for the chemical defense posture of the forces, Detection and protection are still required but the protection can have a lower capacity, less spares per individual. Because the number of incidents will be far lower it might be more cost effective to abandon contaminated equipment than to decontaminate it. As the number of CW casualties entering the military medical system will be small it might be better to find cures for diseases from biological weapons than to spent money on improved therapies for nerve agent or mustard. Although research in CW medical over the last 50 years was great, it has not produced a therapy for mustard or a significant improvement over the old therapy for nerve agent poisoning. With a declining CW threat the BW threat is on the rise, making a passive

  17. The nuclear threat. 6. enl. ed.

    International Nuclear Information System (INIS)

    Anders, G.

    1993-01-01

    This is the sixth edition of 'The last days and end of time', augmented by a foreword, which was first published in 1972. The reflections it contains cannot become outdated because their object: the risk of global catastrophe, persists. But it continues to exist not only because we can never now hope to efface what knowledge we have of self-annihilation methods, but also because we have become frighteningly used to the fact of being threatened. What we fight is not this or that adversary who attacks, or might be got rid of, by nuclear means, but the nuclear situation as such. Since this enemy is the enemy of all human beings, those who up to now have considered each other as adversaries should rally as allies against the common threat. (orig./HP) [de

  18. Planting time for maximization of yield of vinegar plant calyx (Hibiscus sabdariffa L. Época de plantio para maximização daprodução de cálices de vinagreira (Hibiscus sabdariffa L.

    Directory of Open Access Journals (Sweden)

    Nilmar Eduardo Arbex de Castro

    2004-06-01

    Full Text Available The objective of this work was to evaluate the yield of calyxes of Hibiscus sabdariffa L, a medicinal plant, at four planting times in Lavras - MG. The treatments were four planting times (October 18th, November 15th, December 18th 2001 and January 15th 2002 and a harvest was proceeded when practically there were no developing calyxes, almost at the end of the plant cycle. The numbers of calyxes per plant, the fresh and dry biomasses of calyxes and quality were taken into account. It follows that planting time influenced yield per plant and the fresh and dry biomasses of calyxes, differing from each other by Tukey test at 5%. In October planting, there was a higher yield (2,522kg/ha with a yield 5.24 as high relative to the planting of the month of January (481 kg/ha. The planting s in the month of November to December showed yields of 1,695 and 1,093 kg/ha of dry calyxes, respectively and in relation to the same months of January, yield was of 3.52 to 2.27 times more. Harvest must be done as soon as the calyxes are ripe in order to preserve quality.Objetivou-se avaliar a produtividade de cálices de Hibiscus sabdariffa L., planta medicinal, em quatro épocas de plantio em Lavras - M.G. Os tratamentos foram quatro épocas de plantio (18 de outubro; 15 de novembro; 18 de dezembro de 2001 e 15 de janeiro de 2002 e realizada uma colheita quando praticamente não existiam cálices em desenvolvimento, quase no final do ciclo da planta. Foram considerados os números de cálices por planta, as fitomassas frescas e secas dos cálices e a qualidade. Concluiu-se que a época de plantio influenciou o rendimento por planta e as fitomassas frescas e secas dos cálices, diferindo entre si pelo teste de Tukey a 5%. No plantio de outubro, houve maior rendimento (2.522 kg/ha, com produção de 5,24 vezes a mais em relação ao plantio do mês de janeiro (481 kg/ha. Os plantios nos meses de novembro e dezembro tiveram produções de 1.695 e 1.093 kg.ha-1 de cálices

  19. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  20. The CBRNE Threat Needs New Dedicated Analysers

    International Nuclear Information System (INIS)

    Stienstra, S.

    2007-01-01

    Introduction: After the 9-11 attack by terrorists several governments realized their vulnerability towards creative asymmetric attacks. Due to increasing complexity of our society we create more vulnerability towards terror attacks. More chemical substances than we realize can be misused to destabilize our modern society. Recently aircraft passengers were confronted with new regulations, which limit the amount of fluid, which a passenger can bring on board with hand luggage. How far should we go limiting the allowance to bring liquids and substances on board? It indicates that we need new analytic instruments for screening the safety of luggage in all types of transport. Study Design: An inventory was made of the present demand for safe transport and its vulnerability to terror attacks. Also the safety and safety awareness in public buildings, offices and industrial complexes was assessed. Knowing the demand for a certain safety level, an inventory was made to identify analytical equipment, which can be used to check passengers and luggage on possible threats. The same can be used for protecting public areas, offices and industrial complexes. Results And Discussion: It is amazing how some governments, financially driven, underestimate the consequences of CBRNE incidences and disasters. Both threats due to release of dangerous substances just by accident and deliberate abuse of chemicals and/or biologicals by terror organizations is underestimated. Financial rationales are often the cause that the preparedness is less that technically could be possible. Still some commercial companies realize the importance of safety and preparedness towards terror attacks and take their precautions. Several detection systems are now under development and a new market of safety devices comes into existence. Conclusion: Key question is how far we would like to go with defending us with technical devices against potential terror attacks. Also the design of buildings, transport

  1. Zika Virus: An Emerging Worldwide Threat

    Directory of Open Access Journals (Sweden)

    Irfan A. Rather

    2017-07-01

    Full Text Available ZIKA virus (ZIKV poses a severe threat to the world. Recent outbreaks of ZIKV after 2007 along with its quick transmission have made this virus a matter of international concern. The virus shows symptoms that are similar to those caused in the wake of dengue virus (DENV and other flaviviruses, which makes it difficult to discern the viral infection. Diagnosis is further complicated as the virus cross-reacts with antibodies of other viruses. Currently, molecular diagnosis of the virus is being performed by RT-PCR and IgM-captured enzyme-linked immunosorbent assay (MAC-ELISA. The real brunt of the virus is, however, borne by children and adults alike. Case studies of the ZIKV outbreaks in the French Polynesia and other places have suggested that there is a close link between the ZIKV and Gullian-Barre syndrome (GBS. The GBS has closely followed in areas facing ZIKV outbreaks. Although solid evidence is yet to emerge, clinical data integration has revealed a large number of ZIKV patients having GBS. Moreover, the amniotic fluids, blood cord, and miscarriage tissues of mothers have been detected with ZIKV, which indicates that the virus either gets transferred from mother to fetus or seeks direct entry in the fetus, causing microcephaly and other brain anomalies in the newborn babies. Studies on mice have confirmed the link between the ZIKV infection during pregnancy and microcephaly in babies. Reports have highlighted the sexual transmission of the ZIKV, as it has been detected in the semen and saliva of affected persons. The intensity with which the ZIKA is spreading can collapse the health sector of several countries, which are poor. A comprehensive strategy is a need of an hour to combat this virus so as to prevent its transmission and avert the looming threat. At the same time, more research on the cure of the ZIKV is imperative.

  2. Sea level report

    International Nuclear Information System (INIS)

    Schwartz, M.L.

    1979-01-01

    Study of Cenozoic Era sea levels shows a continual lowering of sea level through the Tertiary Period. This overall drop in sea level accompanied the Pleistocene Epoch glacio-eustatic fluctuations. The considerable change of Pleistocene Epoch sea level is most directly attributable to the glacio-eustatic factor, with a time span of 10 5 years and an amplitude or range of approximately 200 m. The lowering of sea level since the end of the Cretaceous Period is attributed to subsidence and mid-ocean ridges. The maximum rate for sea level change is 4 cm/y. At present, mean sea level is rising at about 3 to 4 mm/y. Glacio-eustacy and tectono-eustacy are the parameters for predicting sea level changes in the next 1 my. Glacio-eustatic sea level changes may be projected on the basis of the Milankovitch Theory. Predictions about tectono-eustatic sea level changes, however, involve predictions about future tectonic activity and are therefore somewhat difficult to make. Coastal erosion and sedimentation are affected by changes in sea level. Erosion rates for soft sediments may be as much as 50 m/y. The maximum sedimentation accumulation rate is 20 m/100 y

  3. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  4. Performance Assessment of Communication Enhancement Devices TEA HI Threat Headset

    Science.gov (United States)

    2015-08-01

    AFRL-RH-WP-TR-2015-0076 Performance Assessment of Communication Enhancement Devices: TEA HI Threat Headset Hilary L. Gallagher...of Communication Enhancement Devices: TEA HI Threat Headset 5a. CONTRACT NUMBER FA8650-14-D-6501 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...technology in military applications. Objective performance data provided an assessment of the performance of these devices. The TEA HI Threat headset

  5. The effects of takeover threats of shareholders and firm value

    OpenAIRE

    Haan, Marco; Riyanto, Yohanes

    2000-01-01

    We study the role of takeover threats as a corporate control mechanism using Aghion and Tirole's (1997) model of formal and real authority. Shareholders do not monitor the manager's actions, since ownership is widely dispersed. A corporate raider may monitor, and steps in if a profit opportunity exists. In our model, a takeover threat decreases the manager's effort and does not benefit shareholders. The effect of a takeover threat on the expected value of the firm is ambiguous. It is in the i...

  6. Planning a radar system for protection from the airborne threat

    International Nuclear Information System (INIS)

    Greneker, E.F.; McGee, M.C.

    1986-01-01

    A planning methodology for developing a radar system to protect nuclear materials facilities from the airborne threat is presented. Planning for physical security to counter the airborne threat is becoming even more important because hostile acts by terrorists are increasing and airborne platforms that can be used to bypass physical barriers are readily available. The comprehensive system planning process includes threat and facility surveys, defense hardening, analysis of detection and early warning requirements, optimization of sensor mix and placement, and system implementation considerations

  7. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  8. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  9. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  10. Relative sea-level rise and the conterminous United States : Consequences of potential land inundation in terms of population at risk and GDP loss

    NARCIS (Netherlands)

    Haer, Toon; Kalnay, Eugenia; Kearney, Michael; Moll, Henk

    2013-01-01

    Global sea-level rise poses a significant threat not only for coastal communities as development continues but also for national economies. This paper presents estimates of how future changes in relative sea-level rise puts coastal populations at risk, as well as affect overall GDP in the

  11. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  12. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  13. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  14. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  15. Evaluating Threats in Multinational Marine Ecosystems: A Coast Salish First Nations and Tribal Perspective.

    Directory of Open Access Journals (Sweden)

    Joseph K Gaydos

    Full Text Available Despite the merit of managing natural resources on the scale of ecosystems, evaluating threats and managing risk in ecosystems that span multiple countries or jurisdictions can be challenging. This requires each government involved to consider actions in concert with actions being taken in other countries by co-managing entities. Multiple proposed fossil fuel-related and port development projects in the Salish Sea, a 16,925 km2 inland sea shared by Washington State (USA, British Columbia (Canada, and Indigenous Coast Salish governments, have the potential to increase marine vessel traffic and negatively impact natural resources. There is no legal mandate or management mechanism requiring a comprehensive review of the potential cumulative impacts of these development activities throughout the Salish Sea and across the international border. This project identifies ongoing and proposed energy-related development projects that will increase marine vessel traffic in the Salish Sea and evaluates the threats each project poses to natural resources important to the Coast Salish. While recognizing that Coast Salish traditions identify all species as important and connected, we used expert elicitation to identify 50 species upon which we could evaluate impact. These species were chosen because Coast Salish depend upon them heavily for harvest revenue or as a staple food source, they were particularly culturally or spiritually significant, or they were historically part of Coast Salish lifeways. We identified six development projects, each of which had three potential impacts (pressures associated with increased marine vessel traffic: oil spill, vessel noise and vessel strike. Projects varied in their potential for localized impacts (pressures including shoreline development, harbor oil spill, pipeline spill, coal dust accumulation and nearshore LNG explosion. Based on available published data, impact for each pressure/species interaction was rated as

  16. Global and local threats to coral reef functioning and existence: review and predictions

    Energy Technology Data Exchange (ETDEWEB)

    Wilkinson, C.R. [Australian Institute of Marine Sciences, Townsville, Qld. (Australia)

    1999-07-01

    Factors causing global degradation of coral reefs are examined briefly as a basis for predicting the likely consequences of increases in these factors. The earlier consensus was that widespread but localized damage from natural factors such as storms, and direct anthropogenic effects such as increased sedimentation, pollution and exploitation, posed the largest immediate threat to coral reefs. Now truly global factors associated with accelerating Global Climate Change are either damaging coral reefs or have the potential to inflict greater damage in the immediate future e.g. increases in coral bleaching and mortality, and reduction in coral calcification due to changes in sea-water chemistry with increasing carbon dioxide concentrations. Rises in sea level will probably disrupt human communities and their cultures by making coral cays uninhabitable, whereas coral reefs will sustain minimal damage from the rise in sea level. The short-term (decades) prognosis is that major reductions are almost certain in the extent and biodiversity of coral reefs, and severe disruptions to cultures and economies dependent on reef resources will occur. The long-term (centuries to millennia) prognosis is more encouraging because coral reefs have remarkable resilience to severe disruption and will probably show this resilience in the future when climate changes either stabilize or reverse.

  17. Salish Sea Genetics - Salish Sea genetic inventory

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Salish Sea comprises most of the Puget Sound water area. Marine species are generally assemblages of discrete populations occupying various ecological niches....

  18. Protecting facilities against terrorism and sabotage. Is Jamaica prepared to deal with this potential threat?

    International Nuclear Information System (INIS)

    Powell, E.D.

    2001-01-01

    Full text: Jamaica, a developing Caribbean country, is presently experiencing an economic recession. This has lead to the government having considerable difficulty in acquiring much needed financing, even financing that is necessary to protect the county's resources and facilities from terrorist and sabotage. Essential national facilities include our international airports, embassies and High Commission, hospitals, utility plants - electricity, water and telecommunications, oil-refineries, government ministries, parliamentary houses and educational facilities. These facilities are vulnerable to terrorist attacks and sabotages. Terrorist acts and acts of sabotage can come from internal as well as external sources, they can be commandeered from the air, land or sea. They can be politically, socio-economically or otherwise motivated. As a third world developing nation, Jamaica does not have the capability or the resources necessary to secure all its assets, the government must prioritize on such resource allocation. With its high level of debt servicing, dealing with recurrent and capital expenditure and addressing other social issues, some important issues will be placed on the back burner, dealing with terrorism and sabotage will fall in the category. One contributing factor is the fact that to date the incidents of terrorism and sabotage have been few to non-existent. This has encouraged the government to become somewhat complacent, subscribing to the belief that acts of terrorism and sabotage will never happen. This practice can be detrimental to the country, as one cannot underestimate the threat of terrorism and sabotage. With the steady increase in drug related incidents and with the deportation agreement the government has with some first world countries such as the USA and England, this threat is very realistic. Drug 'Lords'/'Dons' are known to promote terrorism and sabotage as revenge mechanism against governments for unfavorable decision handed down by the

  19. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  20. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  1. Black Sea Energy Security - Present and Future

    Directory of Open Access Journals (Sweden)

    Florinel Iftode

    2011-05-01

    Full Text Available We chose this theme to highlight the need for continuous and sustained human society to secure energy resources needed to survive, needs reflected in an increasingly in recent years in the strategies adopted at both states, as at the level of international organizations. Achieving security and stability in the wider Black Sea area has been among the priorities of each country's interests in this region. In this context, state and non-state actors were being called to come up with new solutions to achieve those interests. Certainly not in all cases the negotiations were completed or not yet found a generally accepted formula for others to apply, but most of them show off their values. The main environmental threats to security environment in the Black Sea region are represented by ethnic conflicts and territorial secessionism. A significant contribution to the security environment of the Black Sea region has the phenomenon of globalization, which in this region is manifested by a steady increase in traffic and volume of shipping passage of communication, which largely affects the security in the region. Globalization and the need for energy resources in the Black Sea was an important area not only as energy transport route, but as a potential supplier of material energy (oil and natural gas. Black Sea Basin can be stabilized and secured only by the will and input from all States and interested international organizations in pragmatic and effective institutional frameworks, meant to promote and protect the common interests of countries decided to participate in actions aimed at ensuring a stable environment security.

  2. A new genus and twenty new species of Australian jumping plant-lice (Psylloidea: Triozidae) from Eremophila and Myoporum (Scrophulariaceae: Myoporeae).

    Science.gov (United States)

    Taylor, Gary S; Fagan-Jeffries, Erinn P; Austin, Andy D

    2016-02-05

    The Triozidae is a diverse, cosmopolitan family of jumping plant-lice (Hemiptera: Psylloidea) from an exceptionally diverse range of plant families, but with few described Australian species. As a direct outcome of the Australian Biological Resources Study Bush Blitz species discovery program, many new Psylloidea from novel host plants in remote localities have been revealed. In this study a new genus Myotrioza Taylor gen. nov. and 20 new species are described from southern and central Australia which also establishes the first host plant records from Eremophila and Myoporum (Scrophulariaceae: Myoporeae). New species, delineated using a combination of morphological and mitochondrial COI sequence data, are: Myotrioza clementsiana sp. nov., M. darwinensis sp. nov., M. desertorum sp. nov., M. eremi sp. nov., M. eremophili sp. nov., M. flindersiana sp.nov., M. gawlerensis sp. nov., M. insularis sp. nov., M. interioris sp. nov., M. interstantis sp. nov., M. longifoliae sp. nov., M. markmitchelli sp. nov., M. myopori sp. nov., M. oppositifoliae sp. nov., M. pantonii sp. nov., M. platycarpi sp. nov., M. remota sp. nov., M. scopariae sp. nov., M. serrulatae sp. nov., and M. telowiensis sp. nov. Genetic divergence data, host associations, biogeographic data, diagnoses and a key to species are presented. Myotrioza appears to be particularly diverse in ephemeral southern Australia, especially in inland Western Australia and South Australia, matching regions of high diversity of the host genera; some species are likely to be short range endemics.

  3. Danish attitudes and reactions to the threat of sea-level rise

    DEFF Research Database (Denmark)

    Fenger, Jes; Buch, Erik; Jakobsen, Per Roed

    2008-01-01

    , where the approach has largely been a "wait and see" attitude. Economical evaluations have been either unofficial or absent. More attention has been paid to the impacts on coastal ecosystems, especially saltmarshes and sand dunes. Here the choice of action will depend on attitudes to and weighing...

  4. High Noon on the High Seas: A Proximity-Complexity Model of Maritime Piracy Threats

    Science.gov (United States)

    2009-04-01

    International Maritime Bureau, Annual Report: Piracy and Armed Robbery Against Ships (Kuala Lumpur: International Chamber of Commerce , 2008). 4...Against Ships (Kuala Lumpur: International Chamber of Commerce , 2007). 7. International Maritime Bureau, Annual Report: Piracy and Armed Robbery...Against Ships (Kuala Lumpur: International Chamber of Commerce , 2008). 8. Statistical Package for the Social Sciences (SPSS) 11.0 for Windows Student

  5. Global distribution of two fungal pathogens threatening endangered sea turtles.

    Science.gov (United States)

    Sarmiento-Ramírez, Jullie M; Abella-Pérez, Elena; Phillott, Andrea D; Sim, Jolene; van West, Pieter; Martín, María P; Marco, Adolfo; Diéguez-Uribeondo, Javier

    2014-01-01

    Nascent fungal infections are currently considered as one of the main threats for biodiversity and ecosystem health, and have driven several animal species into critical risk of extinction. Sea turtles are one of the most endangered groups of animals and only seven species have survived to date. Here, we described two pathogenic species, i.e., Fusarium falciforme and Fusarium keratoplasticum, that are globally distributed in major turtle nesting areas for six sea turtle species and that are implicated in low hatch success. These two fungi possess key biological features that are similar to emerging pathogens leading to host extinction, e.g., high virulence, and a broad host range style of life. Their optimal growth temperature overlap with the optimal incubation temperature for eggs, and they are able to kill up to 90% of the embryos. Environmental forcing, e.g., tidal inundation and clay/silt content of nests, were correlated to disease development. Thus, these Fusarium species constitute a major threat to sea turtle nests, especially to those experiencing environmental stressors. These findings have serious implications for the survival of endangered sea turtle populations and the success of conservation programs worldwide.

  6. Global distribution of two fungal pathogens threatening endangered sea turtles.

    Directory of Open Access Journals (Sweden)

    Jullie M Sarmiento-Ramírez

    Full Text Available Nascent fungal infections are currently considered as one of the main threats for biodiversity and ecosystem health, and have driven several animal species into critical risk of extinction. Sea turtles are one of the most endangered groups of animals and only seven species have survived to date. Here, we described two pathogenic species, i.e., Fusarium falciforme and Fusarium keratoplasticum, that are globally distributed in major turtle nesting areas for six sea turtle species and that are implicated in low hatch success. These two fungi possess key biological features that are similar to emerging pathogens leading to host extinction, e.g., high virulence, and a broad host range style of life. Their optimal growth temperature overlap with the optimal incubation temperature for eggs, and they are able to kill up to 90% of the embryos. Environmental forcing, e.g., tidal inundation and clay/silt content of nests, were correlated to disease development. Thus, these Fusarium species constitute a major threat to sea turtle nests, especially to those experiencing environmental stressors. These findings have serious implications for the survival of endangered sea turtle populations and the success of conservation programs worldwide.

  7. Phocine Distemper Virus in Northern Sea Otters in the Pacific Ocean, Alaska, USA

    Science.gov (United States)

    Mazet, Jonna A.K.; Gill, Verena A.; Doroff, Angela M.; Burek, Kathy A.; Hammond, John A.

    2009-01-01

    Phocine distemper virus (PDV) has caused 2 epidemics in harbor seals in the Atlantic Ocean but had never been identified in any Pacific Ocean species. We found that northern sea otters in Alaska are infected with PDV, which has created a disease threat to several sympatric and decreasing Pacific marine mammals. PMID:19523293

  8. Sinking ships: conservation options for endemic taxa threatened by sea level rise

    Science.gov (United States)

    Joyce Maschinski; Michael S. Ross; Hong Liu; Joe O' Brien; Erick J. von Wettberg; Kristin E. Haskins

    2011-01-01

    Low-elevation islands face threats from sea level rise (SLR) and increased storm intensity. Evidence of endangered species’ population declines and shifts in vegetation communities are already underway in the Florida Keys. SLR predictions indicate large areas of these habitats may be eliminated in the next century. Using the Florida Keys as a model system, we present a...

  9. Living with sea-level rise and climate change: a case study of the Netherlands

    NARCIS (Netherlands)

    van Koningsveld, M.; Mulder, J.P.M. P.M.; Stive, M.J.F.; van der Valk, L.; van der Weck, A.W.

    2008-01-01

    Based on historical hindsight, this paper shows that sea-level rise has played a fundamental role in the development of the low-lying environment of the Netherlands. It was beneficial in morphological terms during the mid-Holocene, but from Roman times, it has been a threat to the coastal zone

  10. Contemporary Arctic Sea Level

    Science.gov (United States)

    Cazenave, A. A.

    2017-12-01

    During recent decades, the Arctic region has warmed at a rate about twice the rest of the globe. Sea ice melting is increasing and the Greenland ice sheet is losing mass at an accelerated rate. Arctic warming, decrease in the sea ice cover and fresh water input to the Arctic ocean may eventually impact the Arctic sea level. In this presentation, we review our current knowledge of contemporary Arctic sea level changes. Until the beginning of the 1990s, Arctic sea level variations were essentially deduced from tide gauges located along the Russian and Norwegian coastlines. Since then, high inclination satellite altimetry missions have allowed measuring sea level over a large portion of the Arctic Ocean (up to 80 degree north). Measuring sea level in the Arctic by satellite altimetry is challenging because the presence of sea ice cover limits the full capacity of this technique. However adapted processing of raw altimetric measurements significantly increases the number of valid data, hence the data coverage, from which regional sea level variations can be extracted. Over the altimetry era, positive trend patterns are observed over the Beaufort Gyre and along the east coast of Greenland, while negative trends are reported along the Siberian shelf. On average over the Arctic region covered by satellite altimetry, the rate of sea level rise since 1992 is slightly less than the global mea sea level rate (of about 3 mm per year). On the other hand, the interannual variability is quite significant. Space gravimetry data from the GRACE mission and ocean reanalyses provide information on the mass and steric contributions to sea level, hence on the sea level budget. Budget studies show that regional sea level trends over the Beaufort Gyre and along the eastern coast of Greenland, are essentially due to salinity changes. However, in terms of regional average, the net steric component contributes little to the observed sea level trend. The sea level budget in the Arctic

  11. Arctic Sea Level Reconstruction

    DEFF Research Database (Denmark)

    Svendsen, Peter Limkilde

    Reconstruction of historical Arctic sea level is very difficult due to the limited coverage and quality of tide gauge and altimetry data in the area. This thesis addresses many of these issues, and discusses strategies to help achieve a stable and plausible reconstruction of Arctic sea level from...... 1950 to today.The primary record of historical sea level, on the order of several decades to a few centuries, is tide gauges. Tide gauge records from around the world are collected in the Permanent Service for Mean Sea Level (PSMSL) database, and includes data along the Arctic coasts. A reasonable...... amount of data is available along the Norwegian and Russian coasts since 1950, and most published research on Arctic sea level extends cautiously from these areas. Very little tide gauge data is available elsewhere in the Arctic, and records of a length of several decades,as generally recommended for sea...

  12. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  13. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  14. Physical threat and self-evaluative emotions in smoking cessation

    NARCIS (Netherlands)

    Dijkstra, A; Den Dijker, L

    Negative self-evaluative emotions (e.g., feeling dissatisfied with oneself, feeling stupid) are considered to indicate a threat to the self that can be caused by an external physical threat (e.g., smoking). A sample of 363 smokers was tested twice, with an interval of 8 months. Prospective analyses

  15. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    interests. These threats were separate from traditional regional or state-centered threats, and included such diverse issues as terrorism, mass migrations ...organizations as examples of TOC; the Sinaloa Cartel, the Yakuza, the Camorra. This conceptual framework leads to the conclusion that the best way to deal

  16. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  17. Does Manipulating Stereotype Threat Condition Change Performance Goal State

    Science.gov (United States)

    Simmons, Cecil Max

    2010-01-01

    This study tested whether the Stereotype Threat effect is mediated by achievement goals, in particular performance-avoidance goals. Threat level was altered before a difficult math test to observe how the endorsement by females of various achievement goal dimensions was affected. 222 people (96 females) in a pre-calculus class at a Mid-Western…

  18. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  19. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  20. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  1. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  2. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  3. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  4. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  5. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  6. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  7. Science priorities for reducing the threat of invasive species

    Science.gov (United States)

    E. A. Chornesky; A. M. Bartuska; G. H. Aplet; J. Cummings-Carlson; F. W. Davis; J. Eskow; D. R. Gordon; K. W. Gottschalk; R. A. Haack; A. J. Hansen; R. N. Mack; F. J. Rahel; M. A. Shannon; L. A. Wainger; T. B. Wigley

    2005-01-01

    Invasive species pose a major, yet poorly addressed, threat to sustainable forestry. Here we set forth an interdisciplinary science strategy of research, development, and applications to reduce this threat. To spur action by public and private entities that too often are slow, reluctant, or unable to act, we recommend (a) better integrating invasive species into...

  8. Prejudice towards Muslims in The Netherlands : Testing integrated threat theory

    NARCIS (Netherlands)

    Velasco González, Karina; Verkuyten, Maykel; Weesie, Jeroen; Poppe, Edwin

    2008-01-01

    This study uses integrated threat theory to examine Dutch adolescents’ (N ¼ 1; 187) prejudice towards Muslim minorities. One out of two participants was found to have negative feelings towards Muslims. Perceived symbolic and realistic threat and negative stereotypes were examined as mediators

  9. Modeling and Verification of Insider Threats Using Logical Analysis

    DEFF Research Database (Denmark)

    Kammuller, Florian; Probst, Christian W.

    2017-01-01

    and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider...

  10. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  11. Evaluating and ranking threats to the long-term persistence of polar bears

    Science.gov (United States)

    Atwood, Todd C.; Marcot, Bruce G.; Douglas, David C.; Amstrup, Steven C.; Rode, Karyn D.; Durner, George M.; Bromaghin, Jeffrey F.

    2015-01-01

    The polar bear (Ursus maritimus) was listed as a globally threatened species under the U.S. Endangered Species Act (ESA) in 2008, mostly due to the significant threat to their future population viability from rapidly declining Arctic sea ice. A core mandate of the ESA is the development of a recovery plan that identifies steps to maintain viable populations of a listed species. A substantive evaluation of the relative influence of putative threats to population persistence is helpful to recovery planning. Because management actions must often be taken in the face of substantial information gaps, a formalized evaluation hypothesizing potential stressors and their relationships with population persistence can improve identification of relevant conservation actions. To this end, we updated a Bayesian network model previously used to forecast the future status of polar bears worldwide. We used new information on actual and predicted sea ice loss and polar bear responses to evaluate the relative influence of plausible threats and their mitigation through management actions on the persistence of polar bears in four ecoregions. We found that polar bear outcomes worsened over time through the end of the century under both stabilized and unabated greenhouse gas (GHG) emission pathways. Under the unabated pathway (i.e., RCP 8.5), the time it took for polar bear populations in two of four ecoregions to reach a dominant probability of greatly decreased was hastened by about 25 years. Under the stabilized GHG emission pathway (i.e., RCP 4.5), where GHG emissions peak around the year 2040, the polar bear population in the Archipelago Ecoregion of High Arctic Canada never reached a dominant probability of greatly decreased, reinforcing earlier suggestions of this ecoregion’s potential to serve as a long-term refugium. The most influential drivers of adverse polar bear outcomes were declines to overall sea ice conditions and to the marine prey base. Improved sea ice conditions

  12. Modelling travel and residence times in the eastern Irish Sea

    International Nuclear Information System (INIS)

    Dabrowski, T.; Hartnett, M.

    2008-01-01

    The Irish Sea, which lies between 51 deg. N-56 deg. N and 2 deg. 50'W-7 deg. W, provides a sheltered environment to exploit valuable fisheries resource. Anthropogenic activity is a real threat to its water quality. The majority of freshwater input down rivers flows into the eastern Irish Sea. The structure of the water circulation was not well understood during the planning of Sellafield nuclear plant outfall site in the eastern Irish Sea. A three-dimensional primitive equation numerical model was applied to the Irish Sea to simulate both barotropic and baroclinic circulation within the region. High accuracy was achieved with regard to the prediction of both tidal circulation and surface and nearbed water temperatures across the region. The model properly represented the Western Irish Sea Gyre, induced by thermal stratification and not known during planning Sellafield. Passive tracer simulations based on the developed hydrodynamic model were used to deliver residence times of the eastern Irish Sea region for various times of the year as well as travel times from the Sellafield outfall site to various locations within the Irish Sea. The results indicate a strong seasonal variability of travel times from Sellafield to the examined locations. Travel time to the Clyde Sea is the shortest for the autumnal tracer release (90 days); it takes almost a year for the tracer to arrive at the same location if it is released in January. Travel times from Sellafield to Dublin Bay fall within the range of 180-360 days. The average residence time of the entire eastern Irish Sea is around 7 months. The areas surrounding the Isle of Man are initially flushed due to a predominant northward flow; a backwater is formed in Liverpool Bay. Thus, elevated tracer concentrations are predicted in Liverpool Bay in the case of accidental spills at the Sellafield outfall site

  13. Zika Virus: An Emerging Global Health Threat

    Directory of Open Access Journals (Sweden)

    Rahul Mittal

    2017-12-01

    Full Text Available Zika virus (ZIKV is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV, and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease.

  14. Nuclear weapons: new threats, new challenges

    International Nuclear Information System (INIS)

    Durand, D.

    2005-01-01

    After a brief history of the Iranian nuclear crisis since 2003, the author discusses the four aspects of this crisis which make it a textbook case: a country which wants to control the whole nuclear process and therefore may reach the capacity to produce military-grade uranium (this raises the question of the relationship between nuclear energy and disarmament), the validity and efficiency of international controls is at stake, divergence may appear on the ways to have international treaties respected (different approaches between Europe and the USA), a country which is looking for nuclear weapon for matters of regional security and power (this raises the issue of a new approach to security). Then, the author describes the new nuclear threats: proliferating states, terrorist groups, and states with nuclear weapons (attitude of the USA, China, Russia, France and the United Kingdom, perspective of a nuclear disarmament of Europe). He gives an overview of the current status of disarmament and of treaties (START, NPT), and discusses the opportunities to save the non proliferation treaty from collapsing in 2005

  15. Calculating the new global nuclear terrorism threat

    International Nuclear Information System (INIS)

    2001-01-01

    Experts from around the world are meeting at the IAEA on 29 October to 2 November at an international symposium on nuclear safeguards, verification, and security. A special session on 2 November focuses on the issue of combating nuclear terrorism. Although terrorists have never used a nuclear weapon, reports that some terrorist groups, particularly al-Qaeda, have attempted to acquire nuclear material is a cause of great concern. According to the IAEA, since 1993, there have been 175 cases of trafficking in nuclear material and 201 cases of trafficking in other radioactive sources (medical, industrial). However, only 18 of these cases have actually involved small amounts of highly enriched uranium or plutonium, the material needed to produce a nuclear bomb. IAEA experts judge the quantities involved to be insufficient to construct a nuclear explosive device. The IAEA experts have evaluated the risks for nuclear terrorism in these three categories: Nuclear facilities; Nuclear Material; Radioactive Sources. The IAEA is proposing a number of new initiatives, including strengthening border monitoring, helping States search for and dispose of orphan sources and strengthening the capabilities of the IAEA Emergency Response Centre to react to radiological emergencies following a terrorist attack. In the short term, the IAEA estimates that at least $30-$50 million annually will be needed to strengthen and expand its programs to meet this terrorist threat

  16. Nuclear threat. A clear and present danger

    International Nuclear Information System (INIS)

    Kikuchi, Masahiro; Nakagome, Yoshihiro

    2005-01-01

    It was disappointed at the discussion in the review conference of the NPT held in 2005. The fact may be caused by the estrangement between the international urgent issues related to the non-proliferation and the effectiveness of archaic measures through the NPT. However, it should not be recognized that the international obligation and worth of NPT has been gone. The NPT referred the typical international situation under the cold war era. Although several permanent issues of the nuclear non-proliferation exist in current discussions, the activities relevant to the NPT may not be effect against newly unstable situations after the September 11th of 2001. Urgent challenges to be taken are that we must strictly analyze the interventions between 'the clear and present danger' of our world and the nuclear herms, and must take appropriate actions toward them without influences from previous international situations that might be subsisted in current international treaties and agreements. This paper identified the features of nuclear threats based on the four categories and examined the possibilities of nuclear terrorism from previous facts with the inductive inference. The results identified the possibility of nuclear facility attack and of radioactive materials theft by the Polico-Religious Groups and others are stood out. The authors would suggest the important of urgent recognition to establish the certain security system against nuclear terrorism. (author)

  17. The concept of leakage in threat assessment.

    Science.gov (United States)

    Meloy, J Reid; O'Toole, Mary Ellen

    2011-01-01

    Leakage in the context of threat assessment is the communication to a third party of an intent to do harm to a target. Third parties are usually other people, but the means of communication vary, and include letters, diaries, journals, blogs, videos on the internet, emails, voice mails, and other social media forms of transmission. Leakage is a type of warning behavior that typically infers a preoccupation with the target, and may signal the research, planning, and implementation of an attack. Nomothetic data suggest that leakage occurs in a majority of cases of attacks on and assassinations of public figures, adult mass murders, adolescent mass murders, and school or campus shootings: very low-frequency, but catastrophic acts of intended and targeted violence. Idiographic or case data illustrate the various permutations of leakage. We discuss the operational importance of the concept, place it in the context of other warning behaviors, emphasize the need for further research, and outline risk management strategies for the mitigation of such acts of violence in both law enforcement and clinical mental health settings. Copyright © 2011 John Wiley & Sons, Ltd.

  18. Zika Virus: An Emerging Global Health Threat

    Science.gov (United States)

    Mittal, Rahul; Nguyen, Desiree; Debs, Luca H.; Patel, Amit P.; Liu, George; Jhaveri, Vasanti M.; S. Kay, Sae-In; Mittal, Jeenu; Bandstra, Emmalee S.; Younis, Ramzi T.; Chapagain, Prem; Jayaweera, Dushyantha T.; Liu, Xue Zhong

    2017-01-01

    Zika virus (ZIKV) is an emerging healthcare threat. The presence of the mosquito Aedes species across South and Central America in combination with complementary climates have incited an epidemic of locally transmitted cases of ZIKV infection in Brazil. As one of the most significant current public health concerns in the Americas, ZIKV epidemic has been a cause of alarm due to its known and unknown complications. At this point, there has been a clear association between ZIKV infection and severe clinical manifestations in both adults and neonates, including but not limited to neurological deficits such as Guillain-Barré syndrome (GBS) and microcephaly, respectively. The gravity of the fetal anomalies linked to ZIKV vertical transmission from the mother has prompted a discussion on whether to include ZIKV as a formal member of the TORCH [Toxoplasma gondii, other, rubella virus, cytomegalovirus (CMV), and herpes] family of pathogens known to breach placental barriers and cause congenital disease in the fetus. The mechanisms of these complex phenotypes have yet to be fully described. As such, diagnostic tools are limited and no effective modalities are available to treat ZIKV. This article will review the recent advancements in understanding the pathogenesis of ZIKV infection as well as diagnostic tests available to detect the infection. Due to the increase in incidence of ZIKV infections, there is an immediate need to develop new diagnostic tools and novel preventive as well as therapeutic modalities based on understanding the molecular mechanisms underlying the disease. PMID:29276699

  19. Lab-to-Lab Cooperative Threat Reduction

    Science.gov (United States)

    Hecker, Siegfried S.

    2017-11-01

    It is difficult to imagine today how dramatically global nuclear risks changed 25 years ago as the Soviet Union disintegrated. Instead of the threat of mutual nuclear annihilation, the world became concerned that Russia and the other 14 former Soviet states would lose control of their huge nuclear assets - tens of thousands of nuclear weapons, more than a million kilograms of fissile materials, hundreds of thousands of nuclear workers, and a huge nuclear complex. I will describe how scientists and engineers at the DOE laboratories, with a focus on Los Alamos, Lawrence Livermore and Sandia national laboratories, joined forces with those at the Russian nuclear weapon institutes for more than 20 years to avoid what looked like the perfect nuclear storm - a story told in the two-volume book Doomed to Cooperate1 published in 2016. Due to an internal processing error, an incorrect version of this article was published on 15 November 2017 that omitted the footnotes. AIP Publishing apologizes for this error. An updated version of this article, including the missing footnotes, was published on 21 November 2017.

  20. Informal caregivers in hospitals: Opportunities and threats.

    Science.gov (United States)

    Amiresmaili, Mohammadreza; Emrani, Zahra

    2018-05-20

    High hospital costs are a challenge that health system face. Additionally, studies identified manpower deficiency as a problem in health system. Hospital is a place where patients with different physical and mental conditions come to. Their families and friends' companionship can facilitate this situation for them. This study illustrates the roles of informal caregivers in hospital. This is a phenomenological qualitative study. Data were gathered through semistructured interviews. We interviewed 22 informal caregivers and 9 nurse staffs from different departments of hospital. They were selected through purposeful and snowball sampling approach. The framework method was used for data analysis. We found 3 main themes including (a) roles of informal caregivers, (b) opportunities of presence of the informal caregivers in the hospital, and (c) threats of presence of informal caregivers. This study shows some roles for informal caregivers including mental supports, consultation, decision-making, and care roles. Concerning the shortage of manpower in Iran's hospitals, nurses have less time to take care of each patient; therefore, using informal caregivers as an implicit strategy to overcome nursing shortage and to reduce hospital costs seems to be beneficial. We suggest that an appropriate plan is necessary to make use of them for filling this gap to some extent, as well as providing training sessions and facilities for companions acting as informal caregivers. Copyright © 2018 John Wiley & Sons, Ltd.