WorldWideScience

Sample records for support based threat

  1. Threat evaluation and weapon assignment decision support: A ...

    African Journals Online (AJOL)

    ... stands within the context of a ground based air defence system (GBADS) at the turn of the twenty first century. However, much of the contents of the paper maye generalized to military environments other than a GBADS one. Keywords: Threat evaluation, weapon assignment, decision support. ORiON Vol. 23 (2) 2007: pp.

  2. Building relationships with foreign governments in support of threat reduction

    International Nuclear Information System (INIS)

    Cajigal, George L.

    2007-01-01

    The effectiveness of any multinational effort in support of threat reduction depends on the relationship developed between the nation receiving the assistance and the donor nations. The effectiveness of this relationship must be based on a solid legal and cooperative framework that establishes the ground rules for the interaction between all parties involved. The author proposes in this paper to outline major considerations by the donor nation and the nation receiving the assistance as they establish an effective approach to threat-reduction efforts. The legal framework needs to be founded on a well-developed, country-to-country agreement that establishes general ground rules and officially recognizes the collaborative effort in an internationally binding document between signatories. This document normally addresses such issues as liability, tax exemptions, import duties, contracts, applicable environmental regulations, etc. Also, of utmost importance is the establishment of a collaborative framework. The basis for such a collaborative framework must be the buy-in into a common objective, the willingness to share concerns and work toward resolutions, and continuous communications. Only when a proper legal framework and a collaborative approach are established can effective relationships be built to enhance threat-reduction efforts. (author)

  3. Puerto Rico Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  4. USVI Land-Based Threat to Benthic Habitats

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data set describes the potential threat of sediment delivery and land-based sources of pollution to benthic habitats. This dataset is derived from NOAA's study,...

  5. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  6. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  7. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    International Nuclear Information System (INIS)

    Upadhyayula, Venkata K.K.

    2012-01-01

    Highlights: ► Smart sensors are needed for detection of chemical and biological threat agents. ► Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. ► Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. ► Functionalized GNPs support multiple analytical methods for sensing threat agents. ► Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad range of threat agents, including radioactive substances, explosive compounds, chemical warfare agents, biotoxins, and

  8. Functionalized gold nanoparticle supported sensory mechanisms applied in detection of chemical and biological threat agents: A review

    Energy Technology Data Exchange (ETDEWEB)

    Upadhyayula, Venkata K.K., E-mail: Upadhyayula.Venkata@epa.gov [Oak Ridge Institute of Science and Education (ORISE), MC-100-44, PO Box 117, Oak Ridge, TN 37831 (United States)

    2012-02-17

    Highlights: Black-Right-Pointing-Pointer Smart sensors are needed for detection of chemical and biological threat agents. Black-Right-Pointing-Pointer Smart sensors detect analytes with rapid speed, high sensitivity and selectivity. Black-Right-Pointing-Pointer Functionalized gold nanoparticles (GNPs) can potentially smart sense threat agents. Black-Right-Pointing-Pointer Functionalized GNPs support multiple analytical methods for sensing threat agents. Black-Right-Pointing-Pointer Threat agents of all types can be detected using functionalized GNPs. - Abstract: There is a great necessity for development of novel sensory concepts supportive of smart sensing capabilities in defense and homeland security applications for detection of chemical and biological threat agents. A smart sensor is a detection device that can exhibit important features such as speed, sensitivity, selectivity, portability, and more importantly, simplicity in identifying a target analyte. Emerging nanomaterial based sensors, particularly those developed by utilizing functionalized gold nanoparticles (GNPs) as a sensing component potentially offer many desirable features needed for threat agent detection. The sensitiveness of physical properties expressed by GNPs, e.g. color, surface plasmon resonance, electrical conductivity and binding affinity are significantly enhanced when they are subjected to functionalization with an appropriate metal, organic or biomolecular functional groups. This sensitive nature of functionalized GNPs can be potentially exploited in the design of threat agent detection devices with smart sensing capabilities. In the presence of a target analyte (i.e., a chemical or biological threat agent) a change proportional to concentration of the analyte is observed, which can be measured either by colorimetric, fluorimetric, electrochemical or spectroscopic means. This article provides a review of how functionally modified gold colloids are applied in the detection of a broad

  9. Perceived Threat Associated with Police Officers and Black Men Predicts Support for Policing Policy Reform

    Directory of Open Access Journals (Sweden)

    Allison Louise Skinner

    2016-07-01

    Full Text Available Racial disparities in policing and recent high-profile incidents resulting in the deaths of Black men have ignited a national debate on policing policies. Given evidence that both police officers and Black men may be associated with threat, we examined the impact of perceived threat on support for reformed policing policies. Across three studies we found correlational evidence that perceiving police officers as threatening predicts increased support for reformed policing practices (e.g., limiting the use of lethal force and matching police force demographics to those of the community. In contrast, perceiving Black men as threatening predicted reduced support for policing policy reform. Perceived threat also predicted willingness to sign a petition calling for police reform. Experimental evidence indicated that priming participants to associate Black men with threat could also reduce support for policing policy reform, and this effect was moderated by internal motivation to respond without prejudice. Priming participants to associate police officers with threat did not increase support for policing policy reform. Results indicate that resistance to policing policy reform is associated with perceiving Black men as threatening. Moreover, findings suggest that publicizing racially charged police encounters, which may conjure associations between Black men and threat, could reduce support for policing policy reform.

  10. New threats and new challenges for radiological decision support

    DEFF Research Database (Denmark)

    Andersson, Kasper Grann; Astrup, Poul; Mikkelsen, Torben

    2011-01-01

    It is described how ongoing work will extend European standard decision support systems currently integrated in the nuclear power plant preparedness in many countries, to enable estimation of the radiological consequences of atmospheric dispersion of contaminants following a terror attack in a city....... Factors relating to the contaminant release processes, dispersion, deposition and post deposition migration are discussed, and non-radiological issues are highlighted in relation to decision making....

  11. Threats and Supports to Female Students' Math Beliefs and Achievement.

    Science.gov (United States)

    McKellar, Sarah E; Marchand, Aixa D; Diemer, Matthew A; Malanchuk, Oksana; Eccles, Jacquelynne S

    2018-03-23

    This study examines how student perceptions of teacher practices contribute to female high school students' math beliefs and achievement. Guided by the expectancy-value framework, we hypothesized that students' motivation beliefs and achievement outcomes in mathematics are fostered by teachers' emphasis on the relevance of mathematics and constrained by gender-based differential treatment. To examine these questions, structural equation modeling was applied to a longitudinal panel of 518 female students from the Maryland Adolescent Development in Context Study. While controlling for prior achievement and race, gendered differential treatment was negatively associated with math beliefs and achievement, whereas relevant math instruction was positively associated with these outcomes. These findings suggest inroads that may foster positive math motivational beliefs and achievement among young women. © 2018 Society for Research on Adolescence.

  12. Norwegian support in development of regulations of radioactive waste management in central Asia-threat assessment

    International Nuclear Information System (INIS)

    Zhunussova, Tamara; Sneve, Malgorzata; Liland, Astrid; Strand, Per; Kim, Alexander; Mirsaidov, Ulmas; Tolongutov, Baigabyl

    2011-01-01

    In Central Asia (CA) the radioactive waste comes mainly from uranium mining and milling, nuclear weapon testing and nuclear power development and other ionizing sources. This waste was produced, to a greater extent, by the military-industrial complex and the uranium and non-uranium industry, and, to a lesser extent, by the nuclear industry and in the process of use of isotope products. Exploitation and mining of uranium and thorium deposits produce a large amount of solid and liquid radioactive waste, as well volatile contaminants which need a proper management. In Central Asia the wastes are mainly stored at the surface in large piles and represent a long-term potential health and environmental hazard. The process of remediating legacy sites of the past and reducing the threats is now getting under way, with the design and implementation of remediation activities, partly with international support. However, there is a significant lack in the regulatory basis for carrying out such remediation work, including a lack of relevant radiation and environmental safety norms and standards, licensing procedures and requirements for monitoring etc., as well as expertise to transform such a basis into practice. Accordingly, the objective of the proposed project is to assist the relevant regulatory authorities in Kazakhstan, Kirgizstan and Tajikistan to develop national robust and adequate regulations and procedures, taking into account the international guidance and Norwegian experience with regulatory support projects in Russia. Specific expected results in the project period include: a threat assessment report identifying priority areas for regulatory development, based on the status of current regulatory documents and the hazard presented by the different sites and facilities; development of national radioactive waste management strategies in each country; development of an enhanced regulatory framework for supervision of nuclear matters, and an enhanced safety culture

  13. Real-time threat evaluation in a ground based air defence environment

    Directory of Open Access Journals (Sweden)

    JN Roux

    2008-06-01

    Full Text Available In a military environment a ground based air defence operator is required to evaluate the tactical situation in real-time and protect Defended Assets (DAs on the ground against aerial threats by assigning available Weapon Systems (WSs to engage enemy aircraft. Since this aerial environment requires rapid operational planning and decision making in stress situations, the associated responsibilities are typically divided between a number of operators and computerized systems that aid these operators during the decision making processes. One such a Decision Support System (DSS, a threat evaluation and weapon assignment system, assigns threat values to aircraft (with respect to DAs in real-time and uses these values to propose possible engagements of observed enemy aircraft by anti-aircraft WSs. In this paper a design of the threat evaluation part of such a DSS is put forward. The design follows the structured approach suggested in [Roux JN & van Vuuren JH, 2007, Threat evaluation and weapon assignment decision support: A review of the state of the art, ORiON, 23(2, pp. 151-187], phasing in a suite of increasingly complex qualitative and quantitative model components as more (reliable data become available.

  14. Negating Stereotype Threat: Autonomy Support and Academic Identification Boost Performance of African American College Students

    Science.gov (United States)

    Nadler, Dustin R.; Komarraju, Meera

    2016-01-01

    Using a 2 × 2 factorial design, we examined the effects of stereotype threat and autonomy support on the test performance of 190 African American college students. Participants completed a set of 7 easy and 7 difficult problems from Raven's Progressive Matrices and a survey including measures of Academic Self-Concept, Learning Climate, and…

  15. Keeping engaged during deployment : The interplay between self-efficacy, family support, and threat exposure

    NARCIS (Netherlands)

    Delahaij, R.; Kamphuis, W.; Berg, C.E. van den

    2016-01-01

    This study investigated the importance of 2 resilience resources for service members’ ability to deal with threat during deployment. Military self-efficacy and family support were measured before deployment and related to work engagement and burnout levels of service members during deployment. We

  16. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  17. Vision-based threat detection in dynamic environments.

    Energy Technology Data Exchange (ETDEWEB)

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  18. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  19. Modeling and Security Threat Assessments of Data Processed in Cloud Based Information Systems

    Directory of Open Access Journals (Sweden)

    Darya Sergeevna Simonenkova

    2016-03-01

    Full Text Available The subject of the research is modeling and security threat assessments of data processed in cloud based information systems (CBIS. This method allow to determine the current security threats of CBIS, state of the system in which vulnerabilities exists, level of possible violators, security properties and to generate recommendations for neutralizing security threats of CBIS.

  20. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  1. The Practice of Campus-Based Threat Assessment: An Overview

    Science.gov (United States)

    Pollard, Jeffrey W.; Nolan, Jeffrey J.; Deisinger, Eugene R. D.

    2012-01-01

    This article provides an overview of threat assessment and management as implemented on campuses of higher education. Standards of practice and state calls for implementation are cited. An overview of some of the basic principles for threat assessment and management implementation is accompanied by examples of how they are utilized. Pitfalls…

  2. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  3. Security Measurement for Unknown Threats Based on Attack Preferences

    Directory of Open Access Journals (Sweden)

    Lihua Yin

    2018-01-01

    Full Text Available Security measurement matters to every stakeholder in network security. It provides security practitioners the exact security awareness. However, most of the works are not applicable to the unknown threat. What is more, existing efforts on security metric mainly focus on the ease of certain attack from a theoretical point of view, ignoring the “likelihood of exploitation.” To help administrator have a better understanding, we analyze the behavior of attackers who exploit the zero-day vulnerabilities and predict their attack timing. Based on the prediction, we propose a method of security measurement. In detail, we compute the optimal attack timing from the perspective of attacker, using a long-term game to estimate the risk of being found and then choose the optimal timing based on the risk and profit. We design a learning strategy to model the information sharing mechanism among multiattackers and use spatial structure to model the long-term process. After calculating the Nash equilibrium for each subgame, we consider the likelihood of being attacked for each node as the security metric result. The experiment results show the efficiency of our approach.

  4. Reactivity to unpredictable threat as a treatment target for fear-based anxiety disorders.

    Science.gov (United States)

    Gorka, S M; Lieberman, L; Klumpp, H; Kinney, K L; Kennedy, A E; Ajilore, O; Francis, J; Duffecy, J; Craske, M G; Nathan, J; Langenecker, S; Shankman, S A; Phan, K L

    2017-10-01

    Heightened reactivity to unpredictable threat (U-threat) is a core individual difference factor underlying fear-based psychopathology. Little is known, however, about whether reactivity to U-threat is a stable marker of fear-based psychopathology or if it is malleable to treatment. The aim of the current study was to address this question by examining differences in reactivity to U-threat within patients before and after 12-weeks of selective serotonin reuptake inhibitors (SSRIs) or cognitive-behavioral therapy (CBT). Participants included patients with principal fear (n = 22) and distress/misery disorders (n = 29), and a group of healthy controls (n = 21) assessed 12-weeks apart. A well-validated threat-of-shock task was used to probe reactivity to predictable (P-) and U-threat and startle eyeblink magnitude was recorded as an index of defensive responding. Across both assessments, individuals with fear-based disorders displayed greater startle magnitude to U-threat relative to healthy controls and distress/misery patients (who did not differ). From pre- to post-treatment, startle magnitude during U-threat decreased only within the fear patients who received CBT. Moreover, within fear patients, the magnitude of decline in startle to U-threat correlated with the magnitude of decline in fear symptoms. For the healthy controls, startle to U-threat across the two time points was highly reliable and stable. Together, these results indicate that startle to U-threat characterizes fear disorder patients and is malleable to treatment with CBT but not SSRIs within fear patients. Startle to U-threat may therefore reflect an objective, psychophysiological indicator of fear disorder status and CBT treatment response.

  5. Toward a Visualization-Supported Workflow for Cyber Alert Management using Threat Models and Human-Centered Design

    Energy Technology Data Exchange (ETDEWEB)

    Franklin, Lyndsey; Pirrung, Megan A.; Blaha, Leslie M.; Dowling, Michelle V.; Feng, Mi

    2017-10-09

    Cyber network analysts follow complex processes in their investigations of potential threats to their network. Much research is dedicated to providing automated tool support in the effort to make their tasks more efficient, accurate, and timely. This tool support comes in a variety of implementations from machine learning algorithms that monitor streams of data to visual analytic environments for exploring rich and noisy data sets. Cyber analysts, however, often speak of a need for tools which help them merge the data they already have and help them establish appropriate baselines against which to compare potential anomalies. Furthermore, existing threat models that cyber analysts regularly use to structure their investigation are not often leveraged in support tools. We report on our work with cyber analysts to understand they analytic process and how one such model, the MITRE ATT&CK Matrix [32], is used to structure their analytic thinking. We present our efforts to map specific data needed by analysts into the threat model to inform our eventual visualization designs. We examine data mapping for gaps where the threat model is under-supported by either data or tools. We discuss these gaps as potential design spaces for future research efforts. We also discuss the design of a prototype tool that combines machine-learning and visualization components to support cyber analysts working with this threat model.

  6. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  7. Study on a Threat-Countermeasure Model Based on International Standard Information

    Directory of Open Access Journals (Sweden)

    Guillermo Horacio Ramirez Caceres

    2008-12-01

    Full Text Available Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and specifying threats which affect IT environments. In addition, the proposed knowledge base system aims at fusing similar security control policies and objectives in order to create effective security guidelines for specific IT environments. As a result, a knowledge base of security objectives was developed on the basis of the relationships inside the standards as well as the relationships between different standards. In addition, a web application was developed which displays details about the most common threats to information systems, and for each threat presents a set of related security control policies from different international standards, including ISO/IEC 27002.

  8. Congressionally-Direct Homeland Defense and Civil Support Threat Information Collection

    National Research Council Canada - National Science Library

    Addicott, Jeffrey

    2008-01-01

    .... In addition, the comprehensive study included a first ever compilation of the non-release provisions from four nations facing serious terrorism threats -- Israel, Colombia, France, and the United...

  9. Construction of Index System Based on Advanced Persistent Threat

    Directory of Open Access Journals (Sweden)

    Lin Jia

    2017-01-01

    Full Text Available With the proliferation of advanced persistent threat (APT, APT attack effect evaluation is playing an increasingly important role in cyberspace. As one of the hot issues of network security, the evaluation to its attack effect can quantify the harm caused by APT. Then according to the evaluation results, we can derive specific measures to the network attack. At present, a lot of work has done in the network attack effect evaluation index system. However, a significant barrier to the development of APT attack effect evaluation is that the existing index system is either from the point of view of the network security situation, or for a single attack weapons to customize. In this paper, an evaluation index system is proposed through analysing the features of APT. Through this index system, we can not only quantify APT attack effect, but also visually observe the APT ability from various angles. Then, we use the analytic hierarchy process (AHP to model the evaluation process and calculate the weight of each indicator. Finally, the Ukrainian Power Outages is taken as an example to validate the proposed index system. The experimental results verify the effectiveness of the index system.

  10. Group affiliation in self-management: support or threat to identity?

    Science.gov (United States)

    Bossy, Dagmara; Knutsen, Ingrid Ruud; Rogers, Anne; Foss, Christina

    2017-02-01

    Self-management is considered important in chronic illness, and contemporary health policy recommends participation in support groups for individuals with chronic conditions. Although withdrawal from or non-participation in support groups is an important problem, there is limited knowledge about individuals' own motivation for participation in or withdrawal from self-management support groups. To investigate how individuals with type 2 diabetes perceive participation in group-based self-management support. This is a qualitative focus group study using a semi-structured interview guide. Sixteen participants diagnosed with type 2 diabetes were included in the study. Individuals with and without group affiliations were mixed in three focus groups to trigger discussions. In the analysis, reoccurring themes of engagement and discussions between participants were focused within a theoretical frame of institutional logic. The focus groups are seen as social spaces where participants construct identity. Both participation and non-participation in group-based self-management support are associated with dealing with the stigma of having type 2 diabetes. Negotiations contribute to constructing an illness dignity as a response to the logic of moral responsibility for the disease. Contemporary policy contributes to societal understandings of individuals with type 2 diabetes as morally inadequate. Our study shows that group-based self-management support may counteract blame and contribute in negotiations of identity for individuals with type 2 diabetes. This mechanism makes participation in groups beneficial for some but stigma inducing for others. © 2016 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  11. Helping Parents Cope with Suicide Threats: An Approach Based on Nonviolent Resistance.

    Science.gov (United States)

    Omer, Haim; Dolberger, Dan Isaac

    2015-09-01

    Parent training in nonviolent resistance was adapted to deal with situations of suicide threat by children, adolescents, and young adults. The approach aims at reducing the risk potential and the mutual distress surrounding the threat-interaction. Parent training in nonviolent resistance has been shown to help parents move from helplessness to presence, from isolation to connectedness, from submission to resistance, from escalation to self-control, and from mutual distancing and hostility to care and support. Those emphases can be crucial for the diminution of suicide risk. Parents show good ability to implement the approach and report gains on various areas over and beyond the reduction in suicide threat. A particular advantage is that the method can be used also in cases where the young person threatening suicide is not willing to cooperate. © 2015 Family Process Institute.

  12. Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

    Science.gov (United States)

    2016-05-10

    international law, national law, behavioral norms and ethical principles have no restraining effects on them.5 This emerging complexity paradigm is one...similar to a biome: a major ecological community of organisms adapted to a particular climatic or environmental condition on a large geographic area in...Awareness through tracking agents and agency in the threat environment is paramount to building an accurate ecological frame of the operational environment

  13. Identifying Threats Using Graph-based Anomaly Detection

    Science.gov (United States)

    Eberle, William; Holder, Lawrence; Cook, Diane

    Much of the data collected during the monitoring of cyber and other infrastructures is structural in nature, consisting of various types of entities and relationships between them. The detection of threatening anomalies in such data is crucial to protecting these infrastructures. We present an approach to detecting anomalies in a graph-based representation of such data that explicitly represents these entities and relationships. The approach consists of first finding normative patterns in the data using graph-based data mining and then searching for small, unexpected deviations to these normative patterns, assuming illicit behavior tries to mimic legitimate, normative behavior. The approach is evaluated using several synthetic and real-world datasets. Results show that the approach has high truepositive rates, low false-positive rates, and is capable of detecting complex structural anomalies in real-world domains including email communications, cellphone calls and network traffic.

  14. A reproductive threat-based model of evolved sex differences in jealousy.

    Science.gov (United States)

    Sagarin, Brad J; Becker, D Vaughn; Guadagno, Rosanna E; Wilkinson, Wayne W; Nicastle, Lionel D

    2012-08-10

    Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex). Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' reproductive outcomes are differentially at risk. This model is supported by data from a web-based study in which lesbians, gay men, bisexual women and men, and heterosexual women and men responded to a hypothetical infidelity scenario with the sex of the rival randomly determined. After reading the scenario, participants indicated which type of infidelity (sexual versus emotional) would cause greater distress. Consistent with predictions, heterosexual women and men showed a sex difference when contemplating opposite-sex infidelities but not when contemplating same-sex infidelities, whereas lesbians and gay men showed no sex difference regardless of whether the infidelity was opposite-sex or same-sex.

  15. A Reproductive Threat-Based Model of Evolved Sex Differences in Jealousy

    Directory of Open Access Journals (Sweden)

    Brad J. Sagarin

    2012-07-01

    Full Text Available Although heterosexual women and men consistently demonstrate sex differences in jealousy, these differences disappear among lesbians and gay men as well as among heterosexual women and men contemplating same-sex infidelities (infidelities in which the partner and rival are the same sex. Synthesizing these past findings, the present paper offers a reproductive threat-based model of evolved sex differences in jealousy that predicts that the sexes will differ only when the jealous perceivers' reproductive outcomes are differentially at risk. This model is supported by data from a web-based study in which lesbians, gay men, bisexual women and men, and heterosexual women and men responded to a hypothetical infidelity scenario with the sex of the rival randomly determined. After reading the scenario, participants indicated which type of infidelity (sexual versus emotional would cause greater distress. Consistent with predictions, heterosexual women and men showed a sex difference when contemplating opposite-sex infidelities but not when contemplating same-sex infidelities, whereas lesbians and gay men showed no sex difference regardless of whether the infidelity was opposite-sex or same-sex.

  16. Descriptive Analysis and Strategic Options to Defeat Commodity-Based Threat Financing Methodologies Related to Gold

    Science.gov (United States)

    2015-09-01

    auditing firms. 14. SUBJECT TERMS Counter threat finance, commodity-based money laundering , terrorist financing, social network analysis, bright...51 2. Asia/Pacific Group on Money Laundering ................................52 3. Caribbean Financial Action Task Force...53 4. Eurasian Group on Combating Money Laundering and Financing of Terrorism

  17. The dark side of the sublime: Distinguishing a threat-based variant of awe.

    Science.gov (United States)

    Gordon, Amie M; Stellar, Jennifer E; Anderson, Craig L; McNeil, Galen D; Loew, Daniel; Keltner, Dacher

    2017-08-01

    Theoretical conceptualizations of awe suggest this emotion can be more positive or negative depending on specific appraisal processes. However, the emergent scientific study of awe rarely emphasizes its negative side, classifying it instead as a positive emotion. In the present research we tested whether there is a more negative variant of awe that arises in response to vast, complex stimuli that are threatening (e.g., tornadoes, terrorist attack, wrathful god). We discovered people do experience this type of awe with regularity (Studies 1 & 4) and that it differs from other variants of awe in terms of its underlying appraisals, subjective experience, physiological correlates, and consequences for well-being. Specifically, threat-based awe experiences were appraised as lower in self-control and certainty and higher in situational control than other awe experiences, and were characterized by greater feelings of fear (Studies 2a & 2b). Threat-based awe was associated with physiological indicators of increased sympathetic autonomic arousal, whereas positive awe was associated with indicators of increased parasympathetic arousal (Study 3). Positive awe experiences in daily life (Study 4) and in the lab (Study 5) led to greater momentary well-being (compared with no awe experience), whereas threat-based awe experiences did not. This effect was partially mediated by increased feelings of powerlessness during threat-based awe experiences. Together, these findings highlight a darker side of awe. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  18. Distinguishing stereotype threat from priming effects : On the role of the social self and threat-based concerns (Retracted article. See vol. 104, pg. 196, 2013)

    NARCIS (Netherlands)

    Marx, David M.; Stapel, Diederik A.

    It has been argued that priming negative stereotypic traits is sufficient to cause stereotype threat. The present research challenges this assumption by highlighting the role of the social self and targets' concerns about confirming a negative group-based stereotype. Specifically, in 3 experiments

  19. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  20. A Computer System for CBRN Contamination Threats Analysis Support, Prediction Their Effects and Alarming the Population: Polish Case Study

    Directory of Open Access Journals (Sweden)

    Tarapata Zbigniew

    2017-01-01

    Full Text Available The article outlines a concept for the system supporting analyses of threats related to contamination and alarming (WAZkA, for the purpose of the National System for Detection of Contamination and Alarming (Krajowy System Wykrywania Skażeń i Alarmowania, KSWSiA in Poland. Additionally, the article presents the point of designing such system, its concept and components. The main objective of WAZkA is to support the following processes of the KSWSiA: information exchange between the system elements and coordination of the system operations, as well as to prepare assessment and expert analyses, needed by the decision-making bodies, with respect to risk emergency situations during natural disasters, technical failures or other events resulting in biological, chemical or radioactive contamination. The selected modules included in the WAZkA system: Event Tree Analyzer, visualization module (COP and emulators of the threats monitoring systems, were described as well as the idea of using the system for the purpose of training, including the designed emulators of the risk monitoring systems together with the scenario editor. The Event Tree Anlyzer is a graphical representation of a chronological sequence of events, significant from the point of view of the functioning of the object, which occur after a given event that initiates such sequence. COP is the GIS tool, which allows to present an operating situation on the basis of background maps. The application offers a possibility of enriching the presented operating situation with the risk data provided in the form of NATO ADat-P3 (CBRN reports. Emulators of the threats monitoring systems allow to generate, in an artificial and user-controlled manner, data on risks, which “pretend” to be real data obtained from the monitoring systems. The above approach significantly facilitates the organization of training and learning about rare situations or situations that have never occurred, but that are

  1. A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

    OpenAIRE

    Li Qiang; Yang Ze-Ming; Liu Bao-Xu; Jiang Zheng-Wei

    2016-01-01

    With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain a...

  2. On the early detection of threats in the real world based on open-source information on the internet

    NARCIS (Netherlands)

    Bouma, H.; Rajadell Rojas, O.; Worm, D.T.H.; Versloot, C.A.; Wedemeijer, H.

    2012-01-01

    Many threats in the real world can be related to activities of persons on the internet. Internet surveillance aims to detect threats in an early stage and to assist in finding suspects based on information from the web. However, the amount of data on the internet rapidly increases and it is time

  3. Law enforcers recognition level emerging threats based on physical appearance and behavior signs the enemy

    Directory of Open Access Journals (Sweden)

    R.M. Radzievskiy

    2015-02-01

    Full Text Available Purpose: examine the effectiveness of the training method of differential approach to the choice of means of influence on the action of law enforcers opponent with different levels of aggressiveness. Material : the experiment involved 15 students of the Kyiv National Academy of Internal Affairs and the 15 employees of the State Guard of Ukraine. Results : presented curriculum for special physical and tactical training. The program details the conceptual apparatus of THREATS and DANGERS manifestations of different levels of aggressiveness opponent (case analysis of its motor behavior. The study participants underwent 7 day course focused training. The basis of the course is an advanced theoretical base. The base is aimed at developing knowledge and skills of employees in determining the level of danger. Including threats from testing and modeling episodes of extreme situations the options cadets. Conclusions : In the simulated collision situations with aggressive opponent to the students significantly improved the adequacy of the response to the threat of execution time and within the legal grounds. Recognition was determined by the level of aggressiveness manifest manners enemy, his emotions, motivation, motor behavior, positional arrangement for 2 - 3 seconds. The program contributed to the development of qualities: attention, orientation, perception, motor lead.

  4. A Study on OS Selection Using ANP Based Choquet Integral in Terms of Cyber Threats

    OpenAIRE

    Goztepe, Kerim

    2016-01-01

    Critical systems are today exposed to new kinds of security threats. Cyber security is determine with cyberspace safe from threats, it is called cyber-threats. Cyber-threats is applied the malicious use of information and communication technologies or the behaviour of attackers. Because of the importance of cyber threats, operating system (OS) selection is a critical decision that can significantly affect future competitiveness and performance of an organization. It is increasingly valuable i...

  5. Use of Vertically Integrated Ice in WRF-Based Forecasts of Lightning Threat

    Science.gov (United States)

    McCaul, E. W., jr.; Goodman, S. J.

    2008-01-01

    Previously reported methods of forecasting lightning threat using fields of graupel flux from WRF simulations are extended to include the simulated field of vertically integrated ice within storms. Although the ice integral shows less temporal variability than graupel flux, it provides more areal coverage, and can thus be used to create a lightning forecast that better matches the areal coverage of the lightning threat found in observations of flash extent density. A blended lightning forecast threat can be constructed that retains much of the desirable temporal sensitivity of the graupel flux method, while also incorporating the coverage benefits of the ice integral method. The graupel flux and ice integral fields contributing to the blended forecast are calibrated against observed lightning flash origin density data, based on Lightning Mapping Array observations from a series of case studies chosen to cover a wide range of flash rate conditions. Linear curve fits that pass through the origin are found to be statistically robust for the calibration procedures.

  6. Hardening Unmanned Aerial Systems Against High Power Microwave Threats in Support of Forward Operations

    Science.gov (United States)

    2017-04-01

    energy (DE) weapons, HPM are not attenuated greatly by atmospheric obstacles such as clouds , rain and fog. While currently expensive to develop...distributed basing in Japan’s Ryuku Islands as part of a mission package to suppress and destroy the PRC’s batteries of HQ -9A surface-to-air missile systems

  7. Instantaneous threat detection based on a semantic representation of activities, zones and trajectories

    NARCIS (Netherlands)

    Burghouts, G.J; Schutte, K; Hove, R.J.M. ten; Broek, S.P. van den; Baan, J.; Rajadell, O.; Huis, J.R. van; Rest, J.H.C. van; Hanckmann, P.; Bouma, H.; Sanroma, G.; Evans, M.; Ferryman, J.

    2014-01-01

    Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The theft takes place in very different forms, in the midst of many

  8. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal; Pernici, B; Gulla, J.A.

    2007-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not

  9. A knowledge-based approach to estimating the magnitude and spatial patterns of potential threats to soil biodiversity.

    Science.gov (United States)

    Orgiazzi, Alberto; Panagos, Panos; Yigini, Yusuf; Dunbar, Martha B; Gardi, Ciro; Montanarella, Luca; Ballabio, Cristiano

    2016-03-01

    Because of the increasing pressures exerted on soil, below-ground life is under threat. Knowledge-based rankings of potential threats to different components of soil biodiversity were developed in order to assess the spatial distribution of threats on a European scale. A list of 13 potential threats to soil biodiversity was proposed to experts with different backgrounds in order to assess the potential for three major components of soil biodiversity: soil microorganisms, fauna, and biological functions. This approach allowed us to obtain knowledge-based rankings of threats. These classifications formed the basis for the development of indices through an additive aggregation model that, along with ad-hoc proxies for each pressure, allowed us to preliminarily assess the spatial patterns of potential threats. Intensive exploitation was identified as the highest pressure. In contrast, the use of genetically modified organisms in agriculture was considered as the threat with least potential. The potential impact of climate change showed the highest uncertainty. Fourteen out of the 27 considered countries have more than 40% of their soils with moderate-high to high potential risk for all three components of soil biodiversity. Arable soils are the most exposed to pressures. Soils within the boreal biogeographic region showed the lowest risk potential. The majority of soils at risk are outside the boundaries of protected areas. First maps of risks to three components of soil biodiversity based on the current scientific knowledge were developed. Despite the intrinsic limits of knowledge-based assessments, a remarkable potential risk to soil biodiversity was observed. Guidelines to preliminarily identify and circumscribe soils potentially at risk are provided. This approach may be used in future research to assess threat at both local and global scale and identify areas of possible risk and, subsequently, design appropriate strategies for monitoring and protection of soil

  10. Defense against Insider Threat: a Framework for Gathering Goal-based Requirements

    NARCIS (Netherlands)

    Nunes Leal Franqueira, V.; van Eck, Pascal

    2006-01-01

    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a very worrying situation, as insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. As a result, organizations can suffer financial losses

  11. Migrants and emerging public health issues in a globalized world: threats, risks and challenges, an evidence-based framework.

    Science.gov (United States)

    Gushulak, Bd; Weekers, J; Macpherson, Dw

    2009-01-01

    International population mobility is an underlying factor in the emergence of public health threats and risks that must be managed globally. These risks are often related, but not limited, to transmissible pathogens. Mobile populations can link zones of disease emergence to lowprevalence or nonendemic areas through rapid or high-volume international movements, or both. Against this background of human movement, other global processes such as economics, trade, transportation, environment and climate change, as well as civil security influence the health impacts of disease emergence. Concurrently, global information systems, together with regulatory frameworks for disease surveillance and reporting, affect organizational and public awareness of events of potential public health significance. International regulations directed at disease mitigation and control have not kept pace with the growing challenges associated with the volume, speed, diversity, and disparity of modern patterns of human movement. The thesis that human population mobility is itself a major determinant of global public health is supported in this article by review of the published literature from the perspective of determinants of health (such as genetics/biology, behavior, environment, and socioeconomics), population-based disease prevalence differences, existing national and international health policies and regulations, as well as inter-regional shifts in population demographics and health outcomes. This paper highlights some of the emerging threats and risks to public health, identifies gaps in existing frameworks to manage health issues associated with migration, and suggests changes in approach to population mobility, globalization, and public health. The proposed integrated approach includes a broad spectrum of stakeholders ranging from individual health-care providers to policy makers and international organizations that are primarily involved in global health management, or are influenced

  12. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  13. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  14. The Ego-Defensive Role of Legitimacy: How Threat-Based Justifications Protect the Self-Esteem of Discriminators.

    Science.gov (United States)

    Pereira, Cicero Roberto; Álvaro, José Luis; Vala, Jorge

    2018-05-01

    This article analyzes the ego-defensive role played by legitimation, by examining the hypothesis that threat-based justifications attenuate the negative effect on an individual's self-esteem caused by his or her becoming aware of his or her own discriminatory behavior. Across three studies (including a pilot experiment), participants who were led to believe that they had acted in a discriminatory way experienced a decrease in their self-esteem. In Study 1 ( N = 116), this effect was nullified when discrimination was justified by either symbolic or realistic threat perceptions. Study 2 ( N = 250) replicated this pattern of results and went further by showing that discrimination affects self-esteem only in more egalitarian individuals, whereas for those less egalitarian, it affects their social image. According to the ego-defensive role of legitimation, a meta-analytical integration of the results confirmed that the influence of discrimination in depressing self-esteem is moderated by threat-based justifications.

  15. Invited Article: Threats to physician autonomy in a performance-based reimbursement system.

    Science.gov (United States)

    Larriviere, Daniel G; Bernat, James L

    2008-06-10

    Physician autonomy is currently threatened by the external application of pay for performance standards and required conformity to practice guidelines. This phenomenon is being driven by concerns over the economic viability of increasing per capita health care expenditures without a concomitant rise in favorable health outcomes and by the unjustified marked variations among physicians' practice patterns. Proponents contend that altering the reimbursement system to encourage physicians to make choices based upon the best available evidence would be one way to ensure better outcomes per health care dollar spent. Although physician autonomy is most easily justified when decisions are made by appealing to the best available evidence, incentivizing decision-making risks sacrificing physician autonomy to political and social forces if the limitations of evidence-based medicine are not respected. Any reimbursement system designed to encourage physicians to utilize the best available evidence by providing financial incentives must recognize physicians who try to play to the numbers as well as physicians who refuse to follow the best available evidence if doing so would conflict with good medicine or patient preferences. By designing, promulgating, and updating evidence-based clinical practice guidelines, medical specialty societies can limit threats to physician autonomy while improving medical practice.

  16. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Brown, Christopher R.; Ferryman, Thomas A.

    2013-10-01

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developed based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

  17. An Agent-Based Intervention to Assist Drivers Under Stereotype Threat: Effects of In-Vehicle Agents' Attributional Error Feedback.

    Science.gov (United States)

    Joo, Yeon Kyoung; Lee-Won, Roselyn J

    2016-10-01

    For members of a group negatively stereotyped in a domain, making mistakes can aggravate the influence of stereotype threat because negative stereotypes often blame target individuals and attribute the outcome to their lack of ability. Virtual agents offering real-time error feedback may influence performance under stereotype threat by shaping the performers' attributional perception of errors they commit. We explored this possibility with female drivers, considering the prevalence of the "women-are-bad-drivers" stereotype. Specifically, we investigated how in-vehicle voice agents offering error feedback based on responsibility attribution (internal vs. external) and outcome attribution (ability vs. effort) influence female drivers' performance under stereotype threat. In addressing this question, we conducted an experiment in a virtual driving simulation environment that provided moment-to-moment error feedback messages. Participants performed a challenging driving task and made mistakes preprogrammed to occur. Results showed that the agent's error feedback with outcome attribution moderated the stereotype threat effect on driving performance. Participants under stereotype threat had a smaller number of collisions when the errors were attributed to effort than to ability. In addition, outcome attribution feedback moderated the effect of responsibility attribution on driving performance. Implications of these findings are discussed.

  18. The bases of development of systems of control and protection information from internal threats

    Directory of Open Access Journals (Sweden)

    Валерий Евгеньевич Жужжалов

    2013-12-01

    Full Text Available The present article is devoted to the analysis of information security in the conditions of high-growth hi-tech means of information processing and information security development of systems from internal threats.

  19. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  20. Financial Derivatives (Based on Two Supports Evaluation

    Directory of Open Access Journals (Sweden)

    Tiberiu Socaciu

    2016-07-01

    Full Text Available In this paper we build a PDE like Black-Scholes equation in hypothesis of a financial derivative that is dependent on two supports (usual is dependent only on one support, like amoption based on gold, when national currency has a great float.Keywords: Financial derivatives, derivatives evaluation, derivatives based on two supports, extended Itō like lemma.

  1. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  2. Organizational Creativity and IT-based Support

    Directory of Open Access Journals (Sweden)

    Celina M. Olszak

    2016-05-01

    Full Text Available The main aim of this paper is to provide a theoretically and empirically grounded discussion on IT-based organizational creativity support. This study attempts to answer the following questions: (1 what is the issue of organizational creativity and its IT-based support, (2 what is the demand for IT –based organizational creativity support; (3 what are the main determinants and barriers to IT-based organizational creativity support; and (4 what success factors are crucial for IT-based organizational creativity support. This paper presents the analysis results of a survey conducted in 25 selected organizations. The paper provides valuable information on the possibilities of IT applications in organizational creativity support as well as the associated success factors. It makes useful contribution to our better understanding of IT-based organizational creativity support issues.

  3. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  4. Support system of a structure on a support base

    International Nuclear Information System (INIS)

    Arene, G.; Renaux, C.; Minguet, J.L.; Chantot, H.

    1984-01-01

    Two series of strips are fixed to the structure to be supported and to the base to define each one a closed convex envelope; the strips are flexible in the radial direction with regard to the envelope. The two series of strips are connected by a treillis of rigid bars set to form juxtaposed V or X. A good transversal rigidity and a certain radial flexibility are obtained. The invention can be applied to a fast neutron nuclear reactor, the reactor comprising a vertical axis vessel filled with liquid metal; the vessel rests on a support foundation by means of the support system proposed by the invention. The support system allows the supported structure to resist the effects of an eventual earthquake and brutal temperature variations [fr

  5. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of); Schneider, Erich [The University of Texas, Austin (United States)

    2015-05-15

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values.

  6. Physical Protection System Design Analysis against Insider Threat based on Game Theoretic Modeling

    International Nuclear Information System (INIS)

    Kim, Kyo-Nam; Suh, Young-A; Yim, Man-Sung; Schneider, Erich

    2015-01-01

    This study explores the use of game-theoretic modeling of physical protection analysis by incorporating the implications of an insider threat. The defender-adversary interaction along with the inclusion of an insider is demonstrated using a simplified test case problem at an experimental fast reactor system. Non-detection probability and travel time are used as a baseline of physical protection parameters in this model. As one of the key features of the model is its ability to choose among security upgrades given the constraints of a budget, the study also performed cost benefit analysis for security upgrades options. In this study, we analyzed the expected adversarial path and security upgrades with a limited budget with insider threat modeled as increasing the non-detection probability. Our test case problem categorized three types of adversary paths assisted by the insider and derived the largest insider threat in terms of the budget for security upgrades. More work needs to be done to incorporate complex dimensions of insider threats, which include but are not limited to: a more realistic mapping of insider threat, accounting for information asymmetry between the adversary, insider, and defenders, and assignment of more pragmatic parameter values

  7. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  8. Comparison of Efficacy and Threat Perception Processes in Predicting Smoking among University Students Based on Extended Parallel Process Model

    Directory of Open Access Journals (Sweden)

    S. Bashirian

    2014-04-01

    Full Text Available Introduction & Objective: The survey of smoking as the most toxic, common and cheapest ad-diction, and its psychological and demographic variables especially among the youth who are efficient and constructive individuals of the society is of great importance. This study was performed to compare efficacy and threat perception in predicting cigarette smoking among university students based on Expended Parallel Process Model (EPPM. Material & Methods: This cross sectional descriptive study was carried out on 700 college stu-dents of Hamadan recruited with a stratified sampling method. The participants completed a self-administered questionnaire including demographic characteristics, smoking status and EPPM Data analysis was done with the SPSS software (version 16, using t-test, one way ANOVA, Pierson correlation and logistic regression methods. Results: The average scores of threat and efficacy perception were 39.7 and 38.6, respectively. The prevalence of cigarette smoking among participants was 27.1 percent. Also, there were significant differences between the average score of efficacy perception and age, gender, his-tory of drug abuse and dwelling of students (P<0.05. Efficacy and threat perception both predicted student cigarette smoking. Conclusions: Cognitive mediating process of threat perception was a more powerful predictor of cigarette smoking as an unsafe behavior. Therefore, increasing self efficacy and response efficacy of university students aimed at facilitating the acceptance of safe behavior could be note-worthy as a principle in education. (Sci J Hamadan Univ Med Sci 2014; 21 (1:58-65

  9. Standoff Methods for the Detection of Threat Agents: A Review of Several Promising Laser-Based Techniques

    Directory of Open Access Journals (Sweden)

    J. Bruce Johnson

    2014-01-01

    Full Text Available Detection of explosives, explosive precursors, or other threat agents presents a number of technological challenges for optical sensing methods. Certainly detecting trace levels of threat agents against a complex background is chief among these challenges; however, the related issues of multiple target distances (from standoff to proximity and sampling time scales (from passive mines to rapid rate of march convoy protection for different applications make it unlikely that a single technique will be ideal for all sensing situations. A number of methods for spanning the range of optical sensor technologies exist which, when integrated, could produce a fused sensor system possessing a high level of sensitivity to threat agents and a moderate standoff real-time capability appropriate for portal screening of personnel or vehicles. In this work, we focus on several promising, and potentially synergistic, laser-based methods for sensing threat agents. For each method, we have briefly outlined the technique and report on the current level of capability.

  10. Real-time threat evaluation in a ground based air defence ...

    African Journals Online (AJOL)

    manned aerial vehicles [17, 29], unmanned combat aerial vehicles [48] and .... including a suite of TE models which may be implemented on three levels of increasing ... The complexity surrounding the analysis of a system threat category ...... and a maintenance process), as well as the data flow between these processes.

  11. A Feasibility Study on Detection of Insider Threats based on Human Bio-signals

    Energy Technology Data Exchange (ETDEWEB)

    Suh, Young A; Yim, Man-Sung [KAIST, Daejeon (Korea, Republic of)

    2016-10-15

    The insider threat means that trusted workers in an organization might carry out harmful acts from the negligent use of classified data to potentially sabotage the workplace. Surveys and studies conducted over the last decade have consistently shown the critical nature of the insider threats problem, in both government and private sectors. The shortcomings of existing systems, such as mental self-assessment and peer review, are very subjective, biased-assessments and employed infrequently. To overcome these limitations, this study investigates the feasibility of detecting and predicting an insider threat by using human biodata, from smart wearable devices. This paper showed the feasibility of predicting and detecting insider threats using EEG, GSR and ECG signals. In the section 2.1, two research hypotheses were established to identify the significant difference on EEG, GSR and ECG signals when the subject decided bad action and is the placed in deceit situation. These hypotheses were tested using two kinds of pilot experiments in the form of input (stimulus) and output (checking response of physiological signals and reaction time)

  12. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  13. Responsibility/Threat Overestimation Moderates the Relationship Between Contamination-Based Disgust and Obsessive-Compulsive Concerns About Sexual Orientation.

    Science.gov (United States)

    Ching, Terence H W; Williams, Monnica T; Siev, Jedidiah; Olatunji, Bunmi O

    2018-05-01

    Disgust has been shown to perform a "disease-avoidance" function in contamination fears. However, no studies have examined the relevance of disgust to obsessive-compulsive (OC) concerns about sexual orientation (e.g., fear of one's sexual orientation transforming against one's will, and compulsive avoidance of same-sex and/or gay or lesbian individuals to prevent that from happening). Therefore, we investigated whether the specific domain of contamination-based disgust (i.e., evoked by the perceived threat of transmission of essences between individuals) predicted OC concerns about sexual orientation, and whether this effect was moderated/amplified by obsessive beliefs, in evaluation of a "sexual orientation transformation-avoidance" function. We recruited 283 self-identified heterosexual college students (152 females, 131 males; mean age = 20.88 years, SD = 3.19) who completed three measures assessing disgust, obsessive beliefs, and OC concerns about sexual orientation. Results showed that contamination-based disgust (β = .17), responsibility/threat overestimation beliefs (β = .15), and their interaction (β = .17) each uniquely predicted OC concerns about sexual orientation, ts = 2.22, 2.50, and 2.90, ps contamination-based disgust accompanied by strong responsibility/threat overestimation beliefs predicted more severe OC concerns about sexual orientation, β = .48, t = 3.24, p contamination-based disgust, and exacerbated by responsibility/threat overestimation beliefs. Treatment for OC concerns about sexual orientation should target such beliefs.

  14. Gender-, Race-, and Income-Based Stereotype Threat: The Effects of Multiple Stigmatized Aspects of Identity on Math Performance and Working Memory Function

    Science.gov (United States)

    Tine, Michele; Gotlieb, Rebecca

    2013-01-01

    This study compared the relative impact of gender-, race-, and income-based stereotype threat and examined if individuals with multiple stigmatized aspects of identity experience a larger stereotype threat effect on math performance and working memory function than people with one stigmatized aspect of identity. Seventy-one college students of the…

  15. Transferring x-ray based automated threat detection between scanners with different energies and resolution

    Science.gov (United States)

    Caldwell, M.; Ransley, M.; Rogers, T. W.; Griffin, L. D.

    2017-10-01

    A significant obstacle to developing high performance Deep Learning algorithms for Automated Threat Detection (ATD) in security X-ray imagery, is the difficulty of obtaining large training datasets. In our previous work, we circumvented this problem for ATD in cargo containers, using Threat Image Projection and data augmentation. In this work, we investigate whether data scarcity for other modalities, such as parcels and baggage, can be ameliorated by transforming data from one domain so that it approximates the appearance of another. We present an ontology of ATD datasets to assess where transfer learning may be applied. We define frameworks for transfer at the training and testing stages, and compare the results for both methods against ATD where a common data source is used for training and testing. Our results show very poor transfer, which we attribute to the difficulty of accurately matching the blur and contrast characteristics of different scanners.

  16. A value- and expectancy-based approach to understanding residents' intended response to a wildfire threat

    DEFF Research Database (Denmark)

    McNeill, Ilona M.; Dunlop, Patrick D.; Skinner, Timothy C.

    2016-01-01

    To motivate residents to evacuate early in case of a wildfire threat, it is important to know what factors underlie their response-related decision-making. The current paper examines the role of the value and expectancy tied to potential outcomes of defending vs evacuating on awareness...... or wait and see. These findings have important implications for strategies to influence residents' response-related decision-making....

  17. Ultrasensitive microchip based on smart microgel for real-time online detection of trace threat analytes.

    Science.gov (United States)

    Lin, Shuo; Wang, Wei; Ju, Xiao-Jie; Xie, Rui; Liu, Zhuang; Yu, Hai-Rong; Zhang, Chuan; Chu, Liang-Yin

    2016-02-23

    Real-time online detection of trace threat analytes is critical for global sustainability, whereas the key challenge is how to efficiently convert and amplify analyte signals into simple readouts. Here we report an ultrasensitive microfluidic platform incorporated with smart microgel for real-time online detection of trace threat analytes. The microgel can swell responding to specific stimulus in flowing solution, resulting in efficient conversion of the stimulus signal into significantly amplified signal of flow-rate change; thus highly sensitive, fast, and selective detection can be achieved. We demonstrate this by incorporating ion-recognizable microgel for detecting trace Pb(2+), and connecting our platform with pipelines of tap water and wastewater for real-time online Pb(2+) detection to achieve timely pollution warning and terminating. This work provides a generalizable platform for incorporating myriad stimuli-responsive microgels to achieve ever-better performance for real-time online detection of various trace threat molecules, and may expand the scope of applications of detection techniques.

  18. A Threat- and Efficacy-Based Framework to Understand Confidence in Vaccines among the Public Health Workforce

    Directory of Open Access Journals (Sweden)

    Lainie Rutkow

    2013-04-01

    Full Text Available The Extended Parallel Process Model (EPPM is an established threat- and efficacy-based behavioral framework for understanding health behaviors in the face of uncertain risk. A growing body of research has applied this model to understand these behaviors among the public health workforce. In this manuscript, we aim to explore the application of this framework to the public health workforce, with a novel focus on their confidence in vaccines and perceptions of vaccine injury compensation mechanisms. We characterize specific connections between EPPM’s threat and efficacy dimensions and relevant vaccine policy frameworks and highlight how these connections can usefully inform training interventions for public health workers to enhance their confidence in these vaccine policy measures.

  19. Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering

    Science.gov (United States)

    Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan

    2015-01-01

    The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.

  20. Model to Counter the Threats in the Data Transmission System PLC-based Technology with the Use of Petri Nets

    Directory of Open Access Journals (Sweden)

    A. A. Balaev

    2010-06-01

    Full Text Available In the article the most important aspects of information security technology Power Line Communica tions, namely the provision of conditions accessibility and integrity, are considered. It is shown that these aspects of the PLC-Technology has some internal “potential” counter, at least, such a widespread threat to both natural disturbances and/or artificial origin. The possibility of such an implementation using the simplified mathematical model of the PLC-based technologies of the theory of Petri nets is presented.

  1. The Racial and Economic Context of Trump Support: Evidence for Threat, Identity, and Contact Effects in the 2016 Presidential Election

    OpenAIRE

    Tropp, Linda; Knowles, Eric

    2018-01-01

    Donald Trump's ascent to the Presidency of the United States defied the expectations of many social scientists, pundits, and laypeople. To date, most efforts to understand Trump's rise have focused on personality and demographic characteristics of White Americans. In contrast, the present work leverages a nationally representative sample of Whites to examine how contextual factors may have shaped support for Trump during the 2016 presidential primaries. Results reveal that neighborhood-level ...

  2. A review and meta-analysis of age-based stereotype threat: negative stereotypes, not facts, do the damage.

    Science.gov (United States)

    Lamont, Ruth A; Swift, Hannah J; Abrams, Dominic

    2015-03-01

    Stereotype threat effects arise when an individual feels at risk of confirming a negative stereotype about their group and consequently underperforms on stereotype relevant tasks (Steele, 2010). Among older people, underperformance across cognitive and physical tasks is hypothesized to result from age-based stereotype threat (ABST) because of negative age-stereotypes regarding older adults' competence. The present review and meta-analyses examine 22 published and 10 unpublished articles, including 82 effect sizes (N = 3882) investigating ABST on older people's (Mage = 69.5) performance. The analysis revealed a significant small-to-medium effect of ABST (d = .28) and important moderators of the effect size. Specifically, older adults are more vulnerable to ABST when (a) stereotype-based rather than fact-based manipulations are used (d = .52); (b) when performance is tested using cognitive measures (d = .36); and (c) occurs reliably when the dependent variable is measured proximally to the manipulation. The review raises important theoretical and methodological issues, and areas for future research. (c) 2015 APA, all rights reserved).

  3. Evaluation and analysis of USNRC material accounting to support an upgrade rule reducing the threat of insider falsification

    International Nuclear Information System (INIS)

    McDonnel, J.L.; Chilton, P.D.; Kufahl, G.E.; Vergari, A.A.

    1980-01-01

    The April 1978, NRC MCandA Task Force Report identified weaknesses in current material accounting (MA) systems. The current study is an effort which examines the generic system vulnerabilities and develops or recommends 1) concepts, principles and methods for protecting MA data from falsification, 2) MA checks and balances for detecting theft or diversion and 3) MA organizational criteria which support safeguards effectiveness. The effect of implementation of developed safeguards protection principles is reported together with a graphic procedure which facilitates analysis and comprehension of results. 2 refs

  4. Protecting computer-based medical devices: defending against viruses and other threats.

    Science.gov (United States)

    2005-07-01

    The increasing integration of computer hardware has exposed medical devices to greater risks than ever before. More and more devices rely on commercial off-the-shelf software and operating systems, which are vulnerable to the increasing proliferation of viruses and other malicious programs that target computers. Therefore, it is necessary for hospitals to take steps such as those outlined in this article to ensure that their computer-based devices are made safe and continue to remain safe in the future. Maintaining the security of medical devices requires planning, careful execution, and a commitment of resources. A team should be created to develop a process for surveying the security status of all computerized devices in the hospital and making sure that patches and other updates are applied as needed. These patches and updates should be approved by the medical system supplier before being implemented. The team should consider using virtual local area networks to isolate susceptible devices on the hospital's network. All security measures should be carefully documented, and the documentation should be kept up-to-date. Above all, care must be taken to ensure that medical device security involves a collaborative, supportive partnership between the hospital's information technology staff and biomedical engineering personnel.

  5. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  6. Web-Based Learning Support System

    Science.gov (United States)

    Fan, Lisa

    Web-based learning support system offers many benefits over traditional learning environments and has become very popular. The Web is a powerful environment for distributing information and delivering knowledge to an increasingly wide and diverse audience. Typical Web-based learning environments, such as Web-CT, Blackboard, include course content delivery tools, quiz modules, grade reporting systems, assignment submission components, etc. They are powerful integrated learning management systems (LMS) that support a number of activities performed by teachers and students during the learning process [1]. However, students who study a course on the Internet tend to be more heterogeneously distributed than those found in a traditional classroom situation. In order to achieve optimal efficiency in a learning process, an individual learner needs his or her own personalized assistance. For a web-based open and dynamic learning environment, personalized support for learners becomes more important. This chapter demonstrates how to realize personalized learning support in dynamic and heterogeneous learning environments by utilizing Adaptive Web technologies. It focuses on course personalization in terms of contents and teaching materials that is according to each student's needs and capabilities. An example of using Rough Set to analyze student personal information to assist students with effective learning and predict student performance is presented.

  7. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  8. Context based support for Clinical Reasoning

    DEFF Research Database (Denmark)

    Vilstrup Pedersen, Klaus

    2004-01-01

    In many areas of the medical domain, the decision process i.e. reasoning, involving health care professionals is distributed, cooperative and complex. Computer based decision support systems has usually been focusing on the outcome of the decision making and treated it as a single task....... In this paper a framework for a Clinical Reasoning Knowledge Warehouse (CRKW) is presented, intended to support the reasoning process, by providing the decision participants with an analysis platform that captures and enhances information and knowledge. The CRKW mixes theories and models from Artificial...... Intelligence, Knowledge Management Systems and Business Intelligence to make context sensitive, patient case specific analysis and knowledge management. The knowledge base consists of patient health records, reasoning process information and clinical guidelines. Patient specific information and knowledge...

  9. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  10. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  11. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Energy Technology Data Exchange (ETDEWEB)

    Mills, Richard T [ORNL; Hoffman, Forrest M [ORNL; Kumar, Jitendra [ORNL; HargroveJr., William Walter [USDA Forest Service

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The approaches explored here are based on k-means cluster analysis of this massive data set, which provides a basis for defining the bounds of the expected or normal phenological patterns that indicate healthy vegetation at a given geographic location. We briefly describe the computational approaches we have used to make cluster analysis of such massive data sets feasible, describe approaches we have explored for distinguishing between normal and abnormal phenology, and present some examples in which we have applied these approaches to identify various forest disturbances in the CONUS.

  12. Risk-based emergency decision support

    International Nuclear Information System (INIS)

    Koerte, Jens

    2003-01-01

    In the present paper we discuss how to assist critical decisions taken under complex, contingent circumstances, with a high degree of uncertainty and short time frames. In such sharp-end decision regimes, standard rule-based decision support systems do not capture the complexity of the situation. At the same time, traditional risk analysis is of little use due to variability in the specific circumstances. How then, can an organisation provide assistance to, e.g. pilots in dealing with such emergencies? A method called 'contingent risk and decision analysis' is presented, to provide decision support for decisions under variable circumstances and short available time scales. The method consists of nine steps of definition, modelling, analysis and criteria definition to be performed 'off-line' by analysts, and procedure generation to transform the analysis result into an operational decision aid. Examples of pilots' decisions in response to sudden vibration in offshore helicopter transport method are used to illustrate the approach

  13. Securing 'supportive environments' for health in the face of ecosystem collapse: meeting the triple threat with a sociology of creative transformation.

    Science.gov (United States)

    Poland, Blake; Dooris, Mark; Haluza-Delay, Randolph

    2011-12-01

    In this paper, we reflect on and explore what remains to be done to make the concept of supportive environments--one of the Ottawa Charter's five core action areas--a reality in the context of growing uncertainty about the future and accelerated pace of change. We pay particular attention to the physical environment, while underscoring the inextricable links between physical and social environments, and particularly the need to link social and environmental justice. The paper begins with a brief orientation to three emerging threats to health equity, namely ecological degradation, climate change, and peak oil, and their connection to economic instability, food security, energy security and other key determinants of health. We then present three contrasting perspectives on the nature of social change and how change is catalyzed, arguing for an examination of the conditions under which cultural change on the scale required to realize the vision of 'supportive environments for all' might be catalyzed, and the contribution that health promotion as a field could play in this process. Drawing on sociological theory, and specifically practice theory and the work of Pierre Bourdieu, we advocate rethinking education for social change by attending more adequately to the social conditions of transformative learning and cultural change. We conclude with an explication of three key implications for health promotion practice: a more explicit alignment with those seeking to curtail environmental destruction and promote environmental justice, strengthening engagement with local or settings-focused 'communities of practice' (such as the Transition Town movement), and finding new ways to creatively 'engage emergence', a significant departure from the current dominant focus on 'risk management'.

  14. A display to support knowledge based behavior

    International Nuclear Information System (INIS)

    Lindsay, R.W.

    1990-01-01

    A computerized display has been created for the Experimental Breeder Reactor II (EBR-II) that incorporates information from plant sensors in a thermodynamic model display. The display is designed to provide an operator with an overall view of the plant process as a heat engine. The thermodynamics of the plant are depicted through the use of ionic figures, animated by plant signals, that are related to the major plant components and systems such as the reactor, intermediate heat exchanger, secondary system, evaporators, superheaters, steam system, steam drum, and turbine-generator. This display supports knowledge based reasoning for the operator as well as providing the traditional rule and skill based behavior, and includes side benefits such a inherent signal validation

  15. A display to support knowledge based behavior

    International Nuclear Information System (INIS)

    Lindsay, R.W.

    1990-01-01

    This paper reports on a computerized display that has been created for the Experimental Breeder Reactor II that incorporates information from plant sensors in a thermodynamic model display. The display is designed to provide an operator with an overall view of the plant process as a heat engine. The thermodynamics of the plant are depicted through the use of iconic figures, animated by plant signals, that are related to the major plant components and systems such as the reactor, intermediate heat exchanger, secondary system, evaporators, superheaters, steam system, steam drum, and turbine-generator. This display supports knowledge based reasoning for the operator as well as providing data for the traditional rule and skill based behavior, and includes side benefits such as inherent signal validation

  16. Are needs to manage uncertainty and threat associated with political conservatism or ideological extremity?

    Science.gov (United States)

    Jost, John T; Napier, Jaime L; Thorisdottir, Hulda; Gosling, Samuel D; Palfai, Tibor P; Ostafin, Brian

    2007-07-01

    Three studies are conducted to assess the uncertainty- threat model of political conservatism, which posits that psychological needs to manage uncertainty and threat are associated with political orientation. Results from structural equation models provide consistent support for the hypothesis that uncertainty avoidance (e.g., need for order, intolerance of ambiguity, and lack of openness to experience) and threat management (e.g., death anxiety, system threat, and perceptions of a dangerous world) each contributes independently to conservatism (vs. liberalism). No support is obtained for alternative models, which predict that uncertainty and threat management are associated with ideological extremism or extreme forms of conservatism only. Study 3 also reveals that resistance to change fully mediates the association between uncertainty avoidance and conservatism, whereas opposition to equality partially mediates the association between threat and conservatism. Implications for understanding the epistemic and existential bases of political orientation are discussed.

  17. Optimization-based decision support to assist in logistics planning for hospital evacuations.

    Science.gov (United States)

    Glick, Roger; Bish, Douglas R; Agca, Esra

    2013-01-01

    The evacuation of the hospital is a very complex process and evacuation planning is an important part of a hospital's emergency management plan. There are numerous factors that affect the evacuation plan including the nature of threat, availability of resources and staff the characteristics of the evacuee population, and risk to patients and staff. The safety and health of patients is of fundamental importance, but safely moving patients to alternative care facilities while under threat is a very challenging task. This article describes the logistical issues and complexities involved in planning and execution of hospital evacuations. Furthermore, this article provides examples of how optimization-based decision support tools can help evacuation planners to better plan for complex evacuations by providing real-world solutions to various evacuation scenarios.

  18. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  19. Biggest Threats

    Science.gov (United States)

    ... Resistant Tuberculosis HAI/AR Prevention Programs Supporting Advances & Innovations to Slow AR Funding Announcements Federal Engagement in ... Word file Microsoft Excel file Audio/Video file Apple Quicktime file RealPlayer file Text file Zip Archive ...

  20. Mammals on the EDGE: conservation priorities based on threat and phylogeny.

    Directory of Open Access Journals (Sweden)

    Nick J B Isaac

    2007-03-01

    Full Text Available Conservation priority setting based on phylogenetic diversity has frequently been proposed but rarely implemented. Here, we define a simple index that measures the contribution made by different species to phylogenetic diversity and show how the index might contribute towards species-based conservation priorities. We describe procedures to control for missing species, incomplete phylogenetic resolution and uncertainty in node ages that make it possible to apply the method in poorly known clades. We also show that the index is independent of clade size in phylogenies of more than 100 species, indicating that scores from unrelated taxonomic groups are likely to be comparable. Similar scores are returned under two different species concepts, suggesting that the index is robust to taxonomic changes. The approach is applied to a near-complete species-level phylogeny of the Mammalia to generate a global priority list incorporating both phylogenetic diversity and extinction risk. The 100 highest-ranking species represent a high proportion of total mammalian diversity and include many species not usually recognised as conservation priorities. Many species that are both evolutionarily distinct and globally endangered (EDGE species do not benefit from existing conservation projects or protected areas. The results suggest that global conservation priorities may have to be reassessed in order to prevent a disproportionately large amount of mammalian evolutionary history becoming extinct in the near future.

  1. Ensuring good governance to address emerging and re-emerging animal disease threats: supporting the veterinary services of developing countries to meet OIE international standards on quality.

    Science.gov (United States)

    Vallat, B; Mallet, E

    2006-04-01

    As an effect of increased globalisation, animal diseases, in particular those transmissible to man, have an immediate global economic and social impact. This fact, dramatically illustrated by the current avian influenza epizootic in South-East Asia and Eastern Europe, clearly demonstrates the crucial importance of the national Veterinary Services (VS) for the prevention, early detection and response for the efficient control of animal diseases. Complying with this mission for the VS presupposes the existence of appropriate governance and legislation and of an official system to control their quality and reliability- an obvious weakness in many developing and in transition countries. The World Organisation for Animal Health (OIE) has therefore developed a project aiming at strengthening the VS in those countries facing the greatest animal health threats and to bring them into line with OIE international standards already adopted by the same countries. Based on the evaluation of the VS and subsequent actions at the global, regional and national levels, the project will have a significant beneficial impact on the targeted countries as well as the international community as a whole, not only in the fields of agriculture, food security and production, and food safety, but also for the local and global prevention of emerging and re-emerging diseases of veterinary and public health importance. The project will be implemented in strong collaboration with the Food and Agriculture Organization. The actions proposed must be considered eligible for the concept of International Public Good.

  2. IGENPRO knowledge-based operator support system

    International Nuclear Information System (INIS)

    Morman, J. A.

    1998-01-01

    Research and development is being performed on the knowledge-based IGENPRO operator support package for plant transient diagnostics and management to provide operator assistance during off-normal plant transient conditions. A generic thermal-hydraulic (T-H) first-principles approach is being implemented using automated reasoning, artificial neural networks and fuzzy logic to produce a generic T-H system-independent/plant-independent package. The IGENPRO package has a modular structure composed of three modules: the transient trend analysis module PROTREN, the process diagnostics module PRODIAG and the process management module PROMANA. Cooperative research and development work has focused on the PRODIAG diagnostic module of the IGENPRO package and the operator training matrix of transients used at the Braidwood Pressurized Water Reactor station. Promising simulator testing results with PRODIAG have been obtained for the Braidwood Chemical and Volume Control System (CVCS), and the Component Cooling Water System. Initial CVCS test results have also been obtained for the PROTREN module. The PROMANA effort also involves the CVCS. Future work will be focused on the long-term, slow and mild degradation transients where diagnoses of incipient T-H component failure prior to forced outage events is required. This will enhance the capability of the IGENPRO system as a predictive maintenance tool for plant staff and operator support

  3. Inducing Attitude Change toward Online Gaming among Adolescent Players Based on Dissonance Theory: The Role of Threats and Justification of Effort

    Science.gov (United States)

    Wan, Chin-Sheng; Chiou, Wen-Bin

    2010-01-01

    The negative impact of online gaming on adolescents has received much attention. The question of how to reduce their pathological use of online gaming is a critical issue. Based on the concept of external justification in dissonance theory, this experimental study aimed to examine whether severity of threat and justification of effort would impact…

  4. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  5. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  6. Introduction to solid supported membrane based electrophysiology.

    Science.gov (United States)

    Bazzone, Andre; Costa, Wagner Steuer; Braner, Markus; Călinescu, Octavian; Hatahet, Lina; Fendler, Klaus

    2013-05-11

    The electrophysiological method we present is based on a solid supported membrane (SSM) composed of an octadecanethiol layer chemisorbed on a gold coated sensor chip and a phosphatidylcholine monolayer on top. This assembly is mounted into a cuvette system containing the reference electrode, a chlorinated silver wire. After adsorption of membrane fragments or proteoliposomes containing the membrane protein of interest, a fast solution exchange is used to induce the transport activity of the membrane protein. In the single solution exchange protocol two solutions, one non-activating and one activating solution, are needed. The flow is controlled by pressurized air and a valve and tubing system within a faraday cage. The kinetics of the electrogenic transport activity is obtained via capacitive coupling between the SSM and the proteoliposomes or membrane fragments. The method, therefore, yields only transient currents. The peak current represents the stationary transport activity. The time dependent transporter currents can be reconstructed by circuit analysis. This method is especially suited for prokaryotic transporters or eukaryotic transporters from intracellular membranes, which cannot be investigated by patch clamp or voltage clamp methods.

  7. Development of a bead-based Luminex assay using lipopolysaccharide specific monoclonal antibodies to detect biological threats from Brucella species.

    Science.gov (United States)

    Silbereisen, Angelika; Tamborrini, Marco; Wittwer, Matthias; Schürch, Nadia; Pluschke, Gerd

    2015-10-05

    Brucella, a Gram-negative bacterium, is classified as a potential bioterrorism agent mainly due to the low dose needed to cause infection and the ability to transmit the bacteria via aerosols. Goats/sheep, cattle, pigs, dogs, sheep and rodents are infected by B. melitensis, B. abortus, B. suis, B. canis, B. ovis and B. neotomae, respectively, the six classical Brucella species. Most human cases are caused by B. melitensis and B. abortus. Our aim was to specifically detect Brucellae with 'smooth' lipopolysaccharide (LPS) using a highly sensitive monoclonal antibody (mAb) based immunological assay. To complement molecular detection systems for potential bioterror agents, as required by international biodefense regulations, sets of mAbs were generated by B cell hybridoma technology and used to develop immunological assays. The combination of mAbs most suitable for an antigen capture assay format was identified and an immunoassay using the Luminex xMAP technology was developed. MAbs specific for the LPS O-antigen of Brucella spp. were generated by immunising mice with inactivated B. melitensis or B. abortus cells. Most mAbs recognised both B. melitensis and B. abortus and antigen binding was not impeded by inactivation of the bacterial cells by γ irradiation, formalin or heat treatment, a step required to analyse the samples immunologically under biosafety level two conditions. The Luminex assay recognised all tested Brucella species with 'smooth' LPS with detection limits of 2×10(2) to 8×10(4) cells per mL, depending on the species tested. Milk samples spiked with Brucella spp. cells were identified successfully using the Luminex assay. In addition, the bead-based immunoassay was integrated into a multiplex format, allowing for simultaneous, rapid and specific detection of Brucella spp., Bacillus anthracis, Francisella tularensis and Yersinia pestis within a single sample. Overall, the robust Luminex assay should allow detection of Brucella spp. in both natural

  8. Considering threats of nuclear terrorism

    International Nuclear Information System (INIS)

    Sato, Satoshi

    2013-01-01

    Anti-terrorism measures of nuclear power station in Japan consisted of three physical protection areas separated into limited access area, protected area with disposition of riot police riding in special guard vehicle, and inner area. Drilling of measures to protect against terrorism had been conducted based on design basis threat (DBT) and effectiveness of anti-terrorism measures corresponding with updated DBT had been evaluated by the inspection. Since nuclear power station had been target of terrorism using bomb, aircraft or military operation in overseas countries, anti-terrorism measures of nuclear power station in Japan should be paid more attention so as to overcome their weakness supported by Government's commitments like United States. (T. Tanaka)

  9. Stereotype Threat and College Academic Performance: A Latent Variables Approach*

    Science.gov (United States)

    Owens, Jayanti; Massey, Douglas S.

    2013-01-01

    Stereotype threat theory has gained experimental and survey-based support in helping explain the academic underperformance of minority students at selective colleges and universities. Stereotype threat theory states that minority students underperform because of pressures created by negative stereotypes about their racial group. Past survey-based studies, however, are characterized by methodological inefficiencies and potential biases: key theoretical constructs have only been measured using summed indicators and predicted relationships modeled using ordinary least squares. Using the National Longitudinal Survey of Freshman, this study overcomes previous methodological shortcomings by developing a latent construct model of stereotype threat. Theoretical constructs and equations are estimated simultaneously from multiple indicators, yielding a more reliable, valid, and parsimonious test of key propositions. Findings additionally support the view that social stigma can indeed have strong negative effects on the academic performance of pejoratively stereotyped racial-minority group members, not only in laboratory settings, but also in the real world. PMID:23950616

  10. Threats to Mediterranean rangelands: a case study based on the views of citizens in the Viotia prefecture, Greece.

    Science.gov (United States)

    Kyriazopoulos, Apostolos P; Arabatzis, Garyfallos; Abraham, Eleni M; Parissi, Zoi M

    2013-11-15

    Rangelands in Greece constitute a very important natural resource as they occupy 40% of the total surface. Not only is their forage production essential for the development of extensive livestock farming, but also they play a key role in outdoor recreational activities, protection from erosion, provision of water supplies and biodiversity conservation. However, land use changes, inappropriate management and wildfires threaten their existence. The research was conducted among the citizens of Viotia prefecture, an area close to Athens, Greece, using personal interviews with a structured questionnaire in 2008. The aim was to record citizens' opinions regarding the threats to rangelands. The results suggest that the main threats as perceived by the respondents, are land use changes especially for urban development, and wildfires. The application of cluster analysis highlighted the differentiation among the respondents in ranking these threats. The more ecologically aware citizens recognised that mismanagement, abandonment and agriculture also threaten rangelands. These threats can have a considerable impact on the lives of the local people. Policy makers and managers should take the opinions of local citizens into consideration, and engage them in decision making so that sustainable management policies could be applied. Copyright © 2013 Elsevier Ltd. All rights reserved.

  11. Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats

    Science.gov (United States)

    Richard Trans Mills; Forrest M Hoffman; Jitendra Kumar; William W. Hargrove

    2011-01-01

    We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The...

  12. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  13. Visual Support for Porting Large Code Bases

    NARCIS (Netherlands)

    Broeksema, Bertjan; Telea, Alexandru

    2011-01-01

    We present a tool that helps C/C++ developers to estimate the effort and automate software porting. Our tool supports project leaders in planning a porting project by showing where a project must be changed, how many changes are needed, what kinds of changes are needed, and how these interact with

  14. Technology support for military capability based acquisition

    CSIR Research Space (South Africa)

    Thaba, Mphahlela

    2017-05-01

    Full Text Available gap between capability planning and acquisition of product systems in the SANDF. (Thaba J et al, 2015). The need for decision support tools and technologies to assist capability planners to close this gap and make sound decisions has become more...

  15. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  16. Density Based Support Vector Machines for Classification

    OpenAIRE

    Zahra Nazari; Dongshik Kang

    2015-01-01

    Support Vector Machines (SVM) is the most successful algorithm for classification problems. SVM learns the decision boundary from two classes (for Binary Classification) of training points. However, sometimes there are some less meaningful samples amongst training points, which are corrupted by noises or misplaced in wrong side, called outliers. These outliers are affecting on margin and classification performance, and machine should better to discard them. SVM as a popular and widely used cl...

  17. Rapid response tools and datasets for post-fire modeling: Linking Earth Observations and process-based hydrological models to support post-fire remediation

    Science.gov (United States)

    M. E. Miller; M. Billmire; W. J. Elliot; K. A. Endsley; P. R. Robichaud

    2015-01-01

    Preparation is key to utilizing Earth Observations and process-based models to support post-wildfire mitigation. Post-fire flooding and erosion can pose a serious threat to life, property and municipal water supplies. Increased runoff and sediment delivery due to the loss of surface cover and fire-induced changes in soil properties are of great concern. Remediation...

  18. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    ); the utilization of the international statement of threat by states, organizations, and sites in developing their own statement of threat, recognition of vulnerabilities, and creation of threat based design (concepts) for the implementation of security measures; an approach to the acquisition of resources to provide for the realization of internationally accepted security measures. (author)

  19. Fisk-based criteria to support validation of detection methods for drinking water and air.

    Energy Technology Data Exchange (ETDEWEB)

    MacDonell, M.; Bhattacharyya, M.; Finster, M.; Williams, M.; Picel, K.; Chang, Y.-S.; Peterson, J.; Adeshina, F.; Sonich-Mullin, C.; Environmental Science Division; EPA

    2009-02-18

    This report was prepared to support the validation of analytical methods for threat contaminants under the U.S. Environmental Protection Agency (EPA) National Homeland Security Research Center (NHSRC) program. It is designed to serve as a resource for certain applications of benchmark and fate information for homeland security threat contaminants. The report identifies risk-based criteria from existing health benchmarks for drinking water and air for potential use as validation targets. The focus is on benchmarks for chronic public exposures. The priority sources are standard EPA concentration limits for drinking water and air, along with oral and inhalation toxicity values. Many contaminants identified as homeland security threats to drinking water or air would convert to other chemicals within minutes to hours of being released. For this reason, a fate analysis has been performed to identify potential transformation products and removal half-lives in air and water so appropriate forms can be targeted for detection over time. The risk-based criteria presented in this report to frame method validation are expected to be lower than actual operational targets based on realistic exposures following a release. Note that many target criteria provided in this report are taken from available benchmarks without assessing the underlying toxicological details. That is, although the relevance of the chemical form and analogues are evaluated, the toxicological interpretations and extrapolations conducted by the authoring organizations are not. It is also important to emphasize that such targets in the current analysis are not health-based advisory levels to guide homeland security responses. This integrated evaluation of chronic public benchmarks and contaminant fate has identified more than 200 risk-based criteria as method validation targets across numerous contaminants and fate products in drinking water and air combined. The gap in directly applicable values is

  20. Screening-level exposure-based prioritization to identify potential POPs, vPvBs and planetary boundary threats among Arctic contaminants

    Directory of Open Access Journals (Sweden)

    Efstathios Reppas-Chrysovitsinos

    2017-06-01

    Full Text Available A report that reviews Arctic contaminants that are not currently regulated as persistent organic pollutants (POPs under international treaties was recently published by the Arctic Monitoring and Assessment Programme (AMAP. We evaluated 464 individual chemicals mentioned in the AMAP report according to hazard profiles for POPs, very persistent and very bioaccumulative (vPvB chemicals, and two novel and distinct hazard profiles we derived from the planetary boundary threat framework. The two planetary boundary threat profiles assign high priority to chemicals that will be mobile and poorly reversible environmental contaminants. Utilizing persistence as a proxy for poor reversibility, we defined two exposure-based hazard profiles; airborne persistent contaminants (APCs and waterborne persistent contaminants (WPCs that are potential planetary boundary threats. We used in silico estimates of physicochemical properties and multimedia models to calculate hazard metrics for persistence, bioaccumulation and long-range transport potential, then we synthesized this information into four exposure-based hazard scores of the potential of each AMAP chemical to fit each of the POP, vPvB, APC and WPC exposure-based hazard profiles. As an alternative to adopting a “bright line” score that represented cause for concern, we scored the AMAP chemicals by benchmarking against a reference set of 148 known and relatively well-studied contaminants and expressed their exposure-based hazard scores as percentile ranks against the scores of the reference set chemicals. Our results show that scores in the four exposure-based hazard profiles provide complementary information about the potential environmental exposure-based hazards of the AMAP chemicals. Our POP, vPvB, APC and WPC exposure-based hazard scores identify high priority chemicals for further study from among the AMAP contaminants.

  1. Supporting smartphone-based behavioral activation

    DEFF Research Database (Denmark)

    Bardram, Jakob Eyvind; Rohani, Darius A.; Tuxen, Nanna

    2017-01-01

    Behavioral activation has shown to be a simple yet efective therapy for depressive patients. The method relies on extensive collection of patient reported activity data on an hourly basis. We are currently in the process of designing a smartphone-based behavioral activation system for depressive...... disorders. However, it is an open question to what degree patients would use this approach given the high demand for user input. In order to investigate this question, we collected paper-based behavioral activation forms from 5 patients, covering in total 18 weeks, 115 days, and 1,614 hours of self......-reported activity data. In this paper we present an analysis of this data and discuss the implications for the design of a smartphone-based system for behavioral activation....

  2. Decision support based on process mining

    NARCIS (Netherlands)

    Aalst, van der W.M.P.; Burstein, F.; Holsapple, C.W.

    2008-01-01

    Process mining techniques allow for the analysis of business processes based on event logs. For example, the audit trails of a workflow management system, the transaction logs of an enterprise resource planning system, and the electronic patient records in a hospital can be used to discover models

  3. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  4. Ground Based Support for Exoplanet Space Missions

    Science.gov (United States)

    Haukka, H.; Hentunen, V.-P.; Salmi, T.; Aartolahti, H.; Juutilainen, J.; Vilokki, H.; Nissinen, M.

    2011-10-01

    Taurus Hill Observatory (THO), observatory code A95, is an amateur observatory located in Varkaus, Finland. The observatory is maintained by the local astronomical association Warkauden Kassiopeia. THO research team has observed and measured various stellar objects and phenomena. Observatory has mainly focused to asteroid [1] and exoplanet light curve measurements, observing the gamma rays burst, supernova discoveries and monitoring [2] and long term monitoring projects [3]. In the early 2011 Europlanet NA1 and NA2 organized "Coordinated Observations of Exoplanets from Ground and Space"-workshop in Graz, Austria. The workshop gathered together proam astronomers who have the equipment to measure the light curves of the exoplanets. Also there were professional scientists working in the exoplanet field who attended to the workshop. The result of the workshop was to organize coordinated observation campaign for follow-up observations of exoplanets (e.g. CoRoT planets). Also coordinated observation campaign to observe stellar CME outbreaks was planned. THO has a lot of experience in field of exoplanet light curve measurements and therefore this campaign is very supported by the research team of the observatory. In next coming observing seasons THO will concentrate its efforts for this kind of campaigns.

  5. A study on the promotion of Japan's Nuclear Security Culture. Based on the Implementing Guide of IAEA and actually-occurred threat cases

    International Nuclear Information System (INIS)

    Inamura, Tomoaki

    2014-01-01

    The ministerial ordinance relating to the Nuclear Reactor Regulation Law, revised in 2012, requires licensees of nuclear facilities to establish a system to foster Nuclear Security Culture. However, such measures are introduced without thorough consideration of essentials of Nuclear Security Culture. This report aims to provide deeper understanding of the concept and raise issues relating to implementation of nuclear security measures by reviewing the Implementing Guide of Nuclear Security Culture published by International Atomic Energy Agency and related documents, as well as analyzing security threats that actually happened recently. The results are summarized as follows: 1) Two beliefs, namely, 'a credible threat exists' and 'nuclear security is important', form the basis of Nuclear Security Culture. Nuclear Security Culture bears a high degree of resemblance to Nuclear Safety Culture because the both assume the same organizational culture model. The differences between the two are derived from whether the malevolence of adversaries should be taken into consideration or not. As the questioning attitude plays an important role to implant the two beliefs, a proper management system of Nuclear Security Culture is necessary to cultivate it. 2) Based on the related documents and an analysis of the cases of actual threats, the following viewpoints should be made clear: (a) the role of the actors of Nuclear Security Culture, (b) flexible sensitivity to share the same understanding about the credible threat, (c) systematic revision of the related regulation about sensitive information management and security clearance of the personnel, and complementary measures such as hotline, (d) measures to encourage the positive action of the personnel, (e) how to construct continuous cycle of improvement of Nuclear Security Culture at state level. (author)

  6. Perceived threat of violence and exposure to physical violence against foreign-born women: a Swedish population-based study.

    Science.gov (United States)

    Fernbrant, Cecilia; Essén, Birgitta; Ostergren, Per-Olof; Cantor-Graae, Elizabeth

    2011-01-01

    Violence against women is an increasing global phenomenon. Little is known about violence against foreign-born women, despite a possible increased concentration of risk factors in this group. This study investigated prevalence of perceived threat of violence and exposure to physical violence and its relation to country of birth among women (18-64 years) residing in southern Sweden, using data obtained from the 2004 Public Health Survey in Scania, Sweden. Foreign-born women reported significantly higher rates of both perceived threat of violence and exposure to physical violence compared with Swedish-born women. Foreign-born women exposed to violence originated primarily from middle/low-income countries (versus high-income countries). The risk of perceived threat of violence remained significantly increased among foreign-born even after further adjustment for potential confounders, such as marital status and disposable income. After similar adjustment, increased exposure to physical violence was no longer significantly related to foreign-born status, but instead was largely attributable to marital status and low levels of disposable income. Foreign-born women, however, had a greater risk of physical violence in the home than Swedish-born women, and violence in the home was the most frequently reported setting for violence exposure among foreign-born women. Migration may confer an increased risk of interpersonal violence against women. Although the underlying causes of this increased risk are unknown, a complex set of factors may be involved, including socioeconomic disadvantage. Copyright © 2011 Jacobs Institute of Women's Health. Published by Elsevier Inc. All rights reserved.

  7. PLM support to architecture based development

    DEFF Research Database (Denmark)

    Bruun, Hans Peter Lomholt

    , organisation, processes, etc. To identify, evaluate, and align aspects of these domains are necessary for developing the optimal layout of product architectures. It is stated in this thesis that architectures describe building principles for products, product families, and product programs, where this project...... and developing architectures can be difficult to manage, update, and maintain during development. The concept of representing product architectures in computer-based product information tools has though been central in this research, and in the creation of results. A standard PLM tool (Windchill PDMLink...... architectures in computer systems. Presented results build on research literature and experiences from industrial partners. Verification of the theory contributions, approaches, models, and tools, have been carried out in industrial projects, with promising results. This thesis describes the means for: (1...

  8. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  9. Addressing the insider threat

    Energy Technology Data Exchange (ETDEWEB)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  10. [Motivations and barriers of chilean children; threats or opportunities for the implementation of 2013 food based dietary guidelines].

    Science.gov (United States)

    Olivares, Sonia; Zacarías, Isabel; González, Carmen Gloria

    2014-08-01

    Implementation of the updated Food Based Dietary Guidelines (FBDG) for the Chilean population requires the design of innovative strategies and effective. To determine motivations and barriers for children and mothers of preschool-age children to follow new FBDG messages, aiming to identify challenges and opportunities for designing effective communication and implementation strategies. A qualitative study based on 12 focus groups of 9 to 13 age children and 6 focus groups of mothers of preschool-age children, living in the north, central and south regions of the country, to analyze their reaction to each one of the 2013 FBDG messages. Answers of children and mothers did not show differences by gender (in the case of the children) or region of the country. Results show the most frequent and representative comments regarding each message. Challenges to reducing the consumption of foods high in energy, fat, sugar and salt include advertisements and plentiful supply and low prices for these types of foods, both in the school environment and on the street. Opportunities identified included the advertisement of fruits, vegetables and dairy products to promote their consumption, as well as the coming implementation of Law 20.606, which is expected to be an effective way to support this initiative. The results of this study show that the design of strategies based on values, desires and needs of different groups will contribute to optimizing the implementation of the 2013 Chilean FBDG. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  11. Base-plate effects on pipe-support stiffness

    International Nuclear Information System (INIS)

    Winkel, B.V.; LaSalle, F.R.

    1981-01-01

    Present nuclear power plant design methods require that pipe support spring rates be considered in the seismic design of piping systems. Base plate flexibility can have a significant effect on the spring rates of these support structures. This paper describes the field inspection, test, and analytical techniques used to identify and correct excessively flexible base plates on the Fast Flux Test Facility pipe support structures

  12. Integrated Case Based and Rule Based Reasoning for Decision Support

    OpenAIRE

    Eshete, Azeb Bekele

    2009-01-01

    This project is a continuation of my specialization project which was focused on studying theoretical concepts related to case based reasoning method, rule based reasoning method and integration of them. The integration of rule-based and case-based reasoning methods has shown a substantial improvement with regards to performance over the individual methods. Verdande Technology As wants to try integrating the rule based reasoning method with an existing case based system. This project focu...

  13. Revenue-based cost assignment: a potent but hidden threat to the survival of the multispecialty medical practice.

    Science.gov (United States)

    Cooper, Robin; Kramer, Theresa R

    2010-03-01

    To demonstrate detrimental effects of revenue-based cost assignment (RBCA) in clinical practice and to compare that system with activity-based costing (ABC). Four cost-allocation methods including RBCA were applied to a comprehensive ophthalmology practice using typical accounting methods. Data were obtained by a survey of practitioners or practices and/or extracted from decision support and practice management systems. Inaccuracies and distortions in reported costs were enumerated. Accounting scenario analysis was used to predict resultant provider and managerial decisions. A sampling survey was used to analyze other specialties. ABC was applied to the practice. RBCA causes procedures with higher profitability to appear less profitable and those with lower profitability to appear more profitable. The distortion in reported costs, in medical settings, is often sufficient to incentivize providers with higher profitability to exit a practice and those with lower profitability to remain in it. The departure of providers causes the residual practice profits to decline. These detrimental effects occur in many subspecialties, which suggests a national effect on health care. ABC allocation can reduce cost distortions and eliminate detrimental effects. RBCA leads to fragmentation of health care and a reduction in the profitability of multispecialty practices. Its use may slow the updating of reimbursement and help eliminate low-profitability specialties.

  14. Development of piping support structure design software based on PDMS

    International Nuclear Information System (INIS)

    Tang Yongtao; Guan Hui; Su Rongfu; Huang Wei; Mao Huihui

    2014-01-01

    In order to enhance the efficiency of nuclear power process system piping support design, the veracity of interface with support, piping and anchor, and decrease the clash between supports and other disciplines, developed piping support structure design software NPHS based on PDMS independently. That achieved the seamless integration of PDMS and NPHS by method of embedded development, reduce the size of program code, improve the running efficiency; That predigested the 3D modeling and information storage for support parts, that increased the support database opening and maintenance using the special mechanism and configuration of database. The support modeling efficiency due to setting of the connection key point of support parts is improved. Practices in several real nuclear power projects proved that NPHS software is provided with such outstanding performances: quick running, strong stability, accurate data, easy to operate and maintain, and output results satisfied the engineering requirements. (authors)

  15. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  16. End the nuclear threat

    International Nuclear Information System (INIS)

    Douglas, Michael

    2005-01-01

    In 1945 the United Nations was founded with one major goal in mind, and I quote, 'to save succeeding generations from the scourge of war.' The founders noted that twice in the 20th Century major wars had brought 'untold sorrow to mankind.' Since its founding, 191 nations have joined the UN. We have no other place where all nations can work together for peace, a place where we can use verbal conflict rather than armed conflict to solve problems. And often, the UN, with US support, has provided armed force to help ensure the peace. The entire planet now faces global challenges including ensuring bio-diversity and ending the destruction of thousands of species; reversing the depletion of fishing stocks; controlling ocean dumping; preventing ozone depletion; halting global warming; controlling and eliminating terrorism and weapons of mass destruction; fighting pandemic diseases; ending the tragedy of crushing poverty and lack of clean drinking water; and addressing crises arising from failed States. No nation or even a small group of nations can succeed in addressing these issues alone. The United Nations is based on political insights that have led to successful governance principles and enhanced the wealth of nations. These values include market freedoms, religious liberty, an independent judiciary, government transparency and accountability, democracy, and a high level of respect for civil liberties and human rights. They have evolved into nearly universal goals and norms. The countries that have adhered to these principles are the most secure and healthy. The United Nations is guided by such countries, and simultaneously provides the only viable forum for the expression of the aspirations of the poor and the weak. The establishment of international norms of conduct is where idealism informs realism. We are called to nothing less than moral leadership. When moral leadership is coupled with power, it galvanizes the world. Moral leadership requires living up to one

  17. Evaluative threat and ambulatory blood pressure: cardiovascular effects of social stress in daily experience.

    Science.gov (United States)

    Smith, Timothy W; Birmingham, Wendy; Uchino, Bert N

    2012-11-01

    Physiological effects of social evaluation are central in models of psychosocial influences on physical health. Experimental manipulations of evaluative threat evoke substantial cardiovascular and neuroendocrine responses in laboratory studies, but only preliminary evidence is available regarding naturally occurring evaluative threats in daily life. In such nonexperimental ambulatory studies, it is essential to distinguish effects of evaluative threat from related constructs known to alter stress, such as ability perceptions and concerns about appearance. 94 married, working couples (mean age 29.2 years) completed a 1-day (8 a.m. to 10 p.m.) ambulatory blood pressure protocol with random interval-contingent measurements using a Suntech monitor and Palm Pilot-based measures of control variables and momentary experiences of social-evaluative threat, concerns about appearance, and perceived ability. In hierarchical analyses for couples and multiple measurement occasions (Proc Mixed; SAS) and controlling individual differences (BMI, age, income) and potential confounds (e.g., posture, activity), higher reports of social-evaluative threat were associated with higher concurrent systolic (estimate = .87, SE = .34) and diastolic blood pressure (estimate = 1.06; SE = .26), both p social-evaluative threat remained significant when perceived ability and appearance concerns were controlled. Naturally occurring social-evaluative threat during daily activity is associated with increased systolic and diastolic blood pressure. Given associations between ambulatory blood pressure and risk of cardiovascular disease, the findings support conceptual models of threats to the social self as a potentially important influence on physical health.

  18. Support vector machines optimization based theory, algorithms, and extensions

    CERN Document Server

    Deng, Naiyang; Zhang, Chunhua

    2013-01-01

    Support Vector Machines: Optimization Based Theory, Algorithms, and Extensions presents an accessible treatment of the two main components of support vector machines (SVMs)-classification problems and regression problems. The book emphasizes the close connection between optimization theory and SVMs since optimization is one of the pillars on which SVMs are built.The authors share insight on many of their research achievements. They give a precise interpretation of statistical leaning theory for C-support vector classification. They also discuss regularized twi

  19. Changes in automatic threat processing precede and predict clinical changes with exposure-based cognitive-behavior therapy for panic disorder.

    Science.gov (United States)

    Reinecke, Andrea; Waldenmaier, Lara; Cooper, Myra J; Harmer, Catherine J

    2013-06-01

    Cognitive behavioral therapy (CBT) is an effective treatment for emotional disorders such as anxiety or depression, but the mechanisms underlying successful intervention are far from understood. Although it has been a long-held view that psychopharmacological approaches work by directly targeting automatic emotional information processing in the brain, it is usually postulated that psychological treatments affect these processes only over time, through changes in more conscious thought cycles. This study explored the role of early changes in emotional information processing in CBT action. Twenty-eight untreated patients with panic disorder were randomized to a single session of exposure-based CBT or waiting group. Emotional information processing was measured on the day after intervention with an attentional visual probe task, and clinical symptoms were assessed on the day after intervention and at 4-week follow-up. Vigilance for threat information was decreased in the treated group, compared with the waiting group, the day after intervention, before reductions in clinical symptoms. The magnitude of this early effect on threat vigilance predicted therapeutic response after 4 weeks. Cognitive behavioral therapy rapidly affects automatic processing, and these early effects are predictive of later therapeutic change. Such results suggest very fast action on automatic processes mediating threat sensitivity, and they provide an early marker of treatment response. Furthermore, these findings challenge the notion that psychological treatments work directly on conscious thought processes before automatic information processing and imply a greater similarity between early effects of pharmacological and psychological treatments for anxiety than previously thought. Copyright © 2013 Society of Biological Psychiatry. Published by Elsevier Inc. All rights reserved.

  20. Knowledge based support for multiagent control and automation

    DEFF Research Database (Denmark)

    Saleem, Arshad; Lind, Morten

    2011-01-01

    This paper presents a mechanism for developing knowledge based support in multiagent based control and diagnosis. In particular it presents a way for autonomous agents to utilize a qualitative means-ends based model for reasoning about control situations. The proposed mechanism have been used...

  1. Comparison of four support-vector based function approximators

    NARCIS (Netherlands)

    de Kruif, B.J.; de Vries, Theodorus J.A.

    2004-01-01

    One of the uses of the support vector machine (SVM), as introduced in V.N. Vapnik (2000), is as a function approximator. The SVM and approximators based on it, approximate a relation in data by applying interpolation between so-called support vectors, being a limited number of samples that have been

  2. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  3. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  4. A decision support system-based procedure for evaluation and ...

    Indian Academy of Sciences (India)

    with an overview of the web-based Decision Support System (DSS) developed to facilitate its wide adop- tion. .... contributes significant catchment management and water supply functions .... experience in engagement and facilitation methods.

  5. Expatriate support and success : A systematic review of organization-based sources of social support

    NARCIS (Netherlands)

    van der Laken, P.A.; van Engen, M.L.; van Veldhoven, M.J.P.M.; Paauwe, J.

    2016-01-01

    Purpose The purpose of this paper is to review empirical research on the relationship between organization-based social support and the success of international assignments (IAs). Design/methodology/approach Four search engines were used to obtain empirical studies relating organization-based social

  6. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  7. Piping support load data base for nuclear plants

    International Nuclear Information System (INIS)

    Childress, G.G.

    1991-01-01

    Nuclear Station Modifications are continuous through the life of a Nuclear Power Plant. The NSM often impacts an existing piping system and its supports. Prior to implementation of the NSM, the modified piping system is qualified and the qualification documented. This manual review process is tedious and an obvious bottleneck to engineering productivity. Collectively, over 100,000 piping supports exist at Duke Power Company's Nuclear Stations. Engineering support must maintain proper documentation of all data for each support. Duke Power Company has designed and developed a mainframe based system that: directly uses Support Load Summary data generated by a piping analysis computer program; streamlines the pipe support evaluation process; easily retrieves As-Built and NSM information for any pipe support from an NSM or AS-BUILT data base; and generated documentation for easy traceability of data to the information source. This paper discusses the design considerations for development of Support Loads Database System (SLDB) and reviews the program functionality through the user menus

  8. Swarm-based adaptation: wayfinding support for lifelong learners

    NARCIS (Netherlands)

    Tattersall, Colin; Van den Berg, Bert; Van Es, René; Janssen, José; Manderveld, Jocelyn; Koper, Rob

    2004-01-01

    Please refer to the orinigal publication in: Tattersall, C. Van den Berg, B., Van Es, R., Janssen, J., Manderveld, J., Koper, R. (2004). Swarm-based adaptation: wayfinding support for lifelong learners. In P. de Bra & W. Nejdl, Adaptive Hypermedia and Adaptive Web-Based Systems (LNCS3137), (pp.

  9. Nuclear power threats, public opposition and green electricity adoption: Effects of threat belief appraisal and fear arousal

    International Nuclear Information System (INIS)

    Hartmann, Patrick; Apaolaza, Vanessa; D'Souza, Clare; Echebarria, Carmen; Barrutia, Jose M.

    2013-01-01

    This study analyses the extent to which willingness to oppose nuclear power and intention to adopt green electricity are related to the cognitive and emotional appraisal of threats deriving from nuclear power. The analysis draws on a theoretical framework which introduces emotional fear arousal as a direct behavioural antecedent of coping behaviour into a model based on cognitive centred Protection Motivation Theory (PMT, Maddux and Rogers, 1983; Rogers, 1983) and the Extended Parallel Processing Model (EPPM, Witte, 1992, 1998). Hypothesized relations are tested in a nationally representative online study conducted in April and May 2012, one year after the Fukushima accident. Results support the hypothesized influences of perceived threat, fear arousal and perceived coping efficacy. Support for the proposed effects of fear control is rather limited. Findings contribute to extending previous knowledge on the role of cognitive and emotional appraisal processes induced by awareness of threats from nuclear power as behavioural antecedents of both opposing nuclear power and adopting green electricity. Findings of the study have implications for nuclear power policy and activism, as well as for institutional and commercial promoters of voluntary residential green electricity adoption. - Highlights: • Nationally representative online survey on nuclear power conducted in Spain in April and May 2012. • Opposition to nuclear power and green electricity adoption are related to threat beliefs. • Emotional fear arousal motivates nuclear opposition and green electricity uptake. • Significant behavioural effects of coping efficacy are confirmed. • Influences of fear control on behaviour intentions are rather weak

  10. Integration of a satellite ground support system based on analysis of the satellite ground support domain

    Science.gov (United States)

    Pendley, R. D.; Scheidker, E. J.; Levitt, D. S.; Myers, C. R.; Werking, R. D.

    1994-11-01

    This analysis defines a complete set of ground support functions based on those practiced in real space flight operations during the on-orbit phase of a mission. These functions are mapped against ground support functions currently in use by NASA and DOD. Software components to provide these functions can be hosted on RISC-based work stations and integrated to provide a modular, integrated ground support system. Such modular systems can be configured to provide as much ground support functionality as desired. This approach to ground systems has been widely proposed and prototyped both by government institutions and commercial vendors. The combined set of ground support functions we describe can be used as a standard to evaluate candidate ground systems. This approach has also been used to develop a prototype of a modular, loosely-integrated ground support system, which is discussed briefly. A crucial benefit to a potential user is that all the components are flight-qualified, thus giving high confidence in their accuracy and reliability.

  11. Redox flow batteries based on supporting solutions containing chloride

    Science.gov (United States)

    Li, Liyu; Kim, Soowhan; Yang, Zhenguo; Wang, Wei; Zhang, Jianlu; Chen, Baowei; Nie, Zimin; Xia, Guanguang

    2014-01-14

    Redox flow battery systems having a supporting solution that contains Cl.sup.- ions can exhibit improved performance and characteristics. Furthermore, a supporting solution having mixed SO.sub.4.sup.2- and Cl.sup.- ions can provide increased energy density and improved stability and solubility of one or more of the ionic species in the catholyte and/or anolyte. According to one example, a vanadium-based redox flow battery system is characterized by an anolyte having V.sup.2+ and V.sup.3+ in a supporting solution and a catholyte having V.sup.4+ and V.sup.5+ in a supporting solution. The supporting solution can contain Cl.sup.- ions or a mixture of SO.sub.4.sup.2- and Cl.sup.- ions.

  12. Redox flow batteries based on supporting solutions containing chloride

    Energy Technology Data Exchange (ETDEWEB)

    Li, Liyu; Kim, Soowhan; Yang, Zhenguo; Wang, Wei; Nie, Zimin; Chen, Baowei; Zhang, Jianlu; Xia, Guanguang

    2017-11-14

    Redox flow battery systems having a supporting solution that contains Cl.sup.- ions can exhibit improved performance and characteristics. Furthermore, a supporting solution having mixed SO.sub.4.sup.2- and Cl.sup.- ions can provide increased energy density and improved stability and solubility of one or more of the ionic species in the catholyte and/or anolyte. According to one example, a vanadium-based redox flow battery system is characterized by an anolyte having V.sup.2+ and V.sup.3+ in a supporting solution and a catholyte having V.sup.4+ and V.sup.5+ in a supporting solution. The supporting solution can contain Cl.sup.- ions or a mixture of SO.sub.4.sup.2- and Cl.sup.- ions.

  13. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  14. Chronic illness in the workplace: stigma, identity threat and strain.

    Science.gov (United States)

    McGonagle, Alyssa K; Barnes-Farrell, Janet L

    2014-10-01

    Chronic illness affects a large and growing number of workers in the United States and globally. Stigmatization (devaluation) at work based on chronic illness may be stressful for individuals and therefore may lead to negative psychological consequences (i.e. strains). In order to better understand stressful experiences of stigma for workers with chronic illnesses, a model of stigma-related identity threat (perceptions that one is at risk of being treated negatively at work because of chronic illness) was tested on a sample of 203 working adults with chronic illnesses. The following variables related to workers' perceptions of chronic illness-related identity threat: workers' boundary flexibility (flexibility in managing their work and life), their meta-perceptions of devaluation (perceptions of others' devaluation of them based on illness) and their job self-efficacy (feelings of confidence related to performing their job). In turn, perceptions of identity threat related to both feelings of psychological strain and (lower levels of) perceived work ability. Surprisingly, neither stigma centrality (how fundamental illness is to one's identity) nor supervisor support related to workers' identity threat perceptions. Copyright © 2013 John Wiley & Sons, Ltd.

  15. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  16. Data base development and research and editorial support

    Science.gov (United States)

    1988-01-01

    The Life Sciences Bibliographic Data Base was created in 1981 and subsequently expanded. A systematic, professional system was developed to collect, organize, and disseminate information about scientific publications resulting from research. The data base consists of bibliographic information and hard copies of all research papers published by Life Sciences-supported investigators. Technical improvements were instituted in the database. To minimize costs, take advantage of advances in personal computer technology, and achieve maximum flexibility and control, the data base was transferred from the JSC computer to personal computers at George Washington University (GWU). GWU also performed a range of related activities such as conducting in-depth searches on a variety of subjects, retrieving scientific literature, preparing presentations, summarizing research progress, answering correspondence requiring reference support, and providing writing and editorial support.

  17. Adherence to internet-based mobile-supported stress management

    DEFF Research Database (Denmark)

    Zarski, A C; Lehr, D.; Berking, M.

    2016-01-01

    of this study was to investigate the influence of different guidance formats (content-focused guidance, adherence-focused guidance, and administrative guidance) on adherence and to identify predictors of nonadherence in an Internet-based mobile-supported stress management intervention (ie, GET.ON Stress......) for employees. Methods: The data from the groups who received the intervention were pooled from three randomized controlled trials (RCTs) that evaluated the efficacy of the same Internet-based mobile-supported stress management intervention (N=395). The RCTs only differed in terms of the guidance format...... of the predictors significantly predicted nonadherence. Conclusions: Guidance has been shown to be an influential factor in promoting adherence to an Internet-based mobile-supported stress management intervention. Adherence-focused guidance, which included email reminders and feedback on demand, was equivalent...

  18. Nature-based supportive care opportunities: a conceptual framework.

    Science.gov (United States)

    Blaschke, Sarah; O'Callaghan, Clare C; Schofield, Penelope

    2018-03-22

    Given preliminary evidence for positive health outcomes related to contact with nature for cancer populations, research is warranted to ascertain possible strategies for incorporating nature-based care opportunities into oncology contexts as additional strategies for addressing multidimensional aspects of cancer patients' health and recovery needs. The objective of this study was to consolidate existing research related to nature-based supportive care opportunities and generate a conceptual framework for discerning relevant applications in the supportive care setting. Drawing on research investigating nature-based engagement in oncology contexts, a two-step analytic process was used to construct a conceptual framework for guiding nature-based supportive care design and future research. Concept analysis methodology generated new representations of understanding by extracting and synthesising salient concepts. Newly formulated concepts were transposed to findings from related research about patient-reported and healthcare expert-developed recommendations for nature-based supportive care in oncology. Five theoretical concepts (themes) were formulated describing patients' reasons for engaging with nature and the underlying needs these interactions address. These included: connecting with what is genuinely valued, distancing from the cancer experience, meaning-making and reframing the cancer experience, finding comfort and safety, and vital nurturance. Eight shared patient and expert recommendations were compiled, which address the identified needs through nature-based initiatives. Eleven additional patient-reported recommendations attend to beneficial and adverse experiential qualities of patients' nature-based engagement and complete the framework. The framework outlines salient findings about helpful nature-based supportive care opportunities for ready access by healthcare practitioners, designers, researchers and patients themselves. © Article author(s) (or their

  19. The impact of Stereotype Threat on the simulated driving performance of older drivers.

    Science.gov (United States)

    Joanisse, Mélanie; Gagnon, Sylvain; Voloaca, Mihnea

    2013-01-01

    Older drivers are perceived as being dangerous and overly cautious by other drivers. We tested the hypothesis that this negative stereotype has a direct influence on the performance of older drivers. Based on the Stereotype Threat literature, we predicted that older driving performance would be altered after exposure to a Stereotype Threat. Sixty-one older drivers aged 65 and above completed a simulated driving assessment course. Prior to testing, half of the participants were told that the objective of the study was to investigate why older adults aged 65 and above were more implicated in on-road accidents (Stereotype Threat condition) and half were showed a neutral statement. Results confirmed that exposure to the threat significantly altered driving performance. Older adults in the Stereotype Threat condition made more driving mistakes than those in the control group. Interestingly, under a Stereotype Threat condition, older adults tended to commit more speeding infractions. We also observed that domain identification (whether driving is deemed important or not) moderated the impact of the threat. Taken together, these results support recent older drivers' performance models suggesting that the interaction between individual and social factors need to be considered when examining older drivers' performance. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. A framework for AI-based nuclear design support system

    International Nuclear Information System (INIS)

    Furuta, Kazuo; Kondo, Shunsuke

    1991-01-01

    Nowadays many computer programs are being developed and used for the analytic tasks in nuclear reactor design, but experienced designers are still responsible for most of the synthetic tasks which are not amenable to algorithmic computer processes. Artificial intelligence (AI) is a promising technology to deal with these intractable tasks in design. In development of AI-based design support systems, it is desirable to choose a comprehensive framework based on the scientific theory of design. In this work a framework for AI-based design support systems for nuclear reactor design will be proposed based on an exploration model of design. The fundamental architectures of this framework will be described especially on knowledge representation, context management and design planning. (author)

  1. Framework for AI-based nuclear reactor design support system

    International Nuclear Information System (INIS)

    Furuta, Kazuo; Kondo, Shunsuke

    1992-01-01

    Nowadays many computer programs are being developed and used for the analytic tasks in nuclear reactor design, but experienced designers are still responsible for most of the synthetic tasks which are not amenable to algorithmic computer processes. Artificial intelligence (AI) is a promising technology to deal with these intractable tasks in design. In development of AI-based design support systems, it is desirable to choose a comprehensive framework based on the scientific theory of design. In this work a framework for AI-based design support systems for nuclear reactor design will be proposed based on an explorative abduction model of design. The fundamental architectures of this framework will be described especially on knowledge representation, context management and design planning. (author)

  2. A Framework for Agent-based Human Interaction Support

    Directory of Open Access Journals (Sweden)

    Axel Bürkle

    2008-10-01

    Full Text Available In this paper we describe an agent-based infrastructure for multimodal perceptual systems which aims at developing and realizing computer services that are delivered to humans in an implicit and unobtrusive way. The framework presented here supports the implementation of human-centric context-aware applications providing non-obtrusive assistance to participants in events such as meetings, lectures, conferences and presentations taking place in indoor "smart spaces". We emphasize on the design and implementation of an agent-based framework that supports "pluggable" service logic in the sense that the service developer can concentrate on coding the service logic independently of the underlying middleware. Furthermore, we give an example of the architecture's ability to support the cooperation of multiple services in a meeting scenario using an intelligent connector service and a semantic web oriented travel service.

  3. A dual-adaptive support-based stereo matching algorithm

    Science.gov (United States)

    Zhang, Yin; Zhang, Yun

    2017-07-01

    Many stereo matching algorithms use fixed color thresholds and a rigid cross skeleton to segment supports (viz., Cross method), which, however, does not work well for different images. To address this issue, this paper proposes a novel dual adaptive support (viz., DAS)-based stereo matching method, which uses both appearance and shape information of a local region to segment supports automatically, and, then, integrates the DAS-based cost aggregation with the absolute difference plus census transform cost, scanline optimization and disparity refinement to develop a stereo matching system. The performance of the DAS method is also evaluated in the Middlebury benchmark and by comparing with the Cross method. The results show that the average error for the DAS method 25.06% lower than that for the Cross method, indicating that the proposed method is more accurate, with fewer parameters and suitable for parallel computing.

  4. Competence Based Educational Metadata for Supporting Lifelong Competence Development Programmes

    NARCIS (Netherlands)

    Sampson, Demetrios; Fytros, Demetrios

    2008-01-01

    Sampson, D., & Fytros, D. (2008). Competence Based Educational Metadata for Supporting Lifelong Competence Development Programmes. In P. Diaz, Kinshuk, I. Aedo & E. Mora (Eds.), Proceedings of the 8th IEEE International Conference on Advanced Learning Technologies (ICALT 2008), pp. 288-292. July,

  5. Swarm-based wayfinding support in open and distance learning

    NARCIS (Netherlands)

    Tattersall, Colin; Manderveld, Jocelyn; Van den Berg, Bert; Van Es, René; Janssen, José; Koper, Rob

    2005-01-01

    Please refer to the original source: Tattersall, C. Manderveld, J., Van den Berg, B., Van Es, R., Janssen, J., & Koper, R. (2005). Swarm-based wayfinding support in open and distance learning. In Alkhalifa, E.M. (Ed). Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information

  6. Web-Based Administrative Supports for University Students.

    Science.gov (United States)

    McClelland, Robert J.

    2001-01-01

    Evaluates development and effectiveness of a Web-based administration support for business students at Liverpool John Moores University. Considers whether the strategic planning and individual school developments have influenced the development and usefulness of the campus-wide information system. Discusses action research findings on student…

  7. Supporting Inquiry-based Learning with Google Glass (GPIM)

    NARCIS (Netherlands)

    Suarez, Angel; Ternier, Stefaan; Kalz, Marco; Specht, Marcus

    2015-01-01

    Wearable technology is a new genre of technology that is appearing to enhance learning in context. This manuscript introduces a Google Glass application to support Inquiry-based Learning (IBL). Applying Google Glass to IBL, we aim to transform the learning process into a more seamless, personal and

  8. Supporting Early Childhood Practitioners through Relationship-Based, Reflective Supervision

    Science.gov (United States)

    Bernstein, Victor J.; Edwards, Renee C.

    2012-01-01

    Reflective supervision is a relationship-based practice that supports the professional development of early childhood practitioners. Reflective supervision helps practitioners cope with the intense feelings and stress that are generated when working with at-risk children and families. It allows them to focus on the purpose and goals of the program…

  9. ADDIS: A decision support system for evidence-based medicine

    NARCIS (Netherlands)

    G. van Valkenhoef (Gert); T. Tervonen (Tommi); T. Zwinkels (Tijs); B. de Brock (Bert); H.L. Hillege (Hans)

    2013-01-01

    textabstractClinical trials are the main source of information for the efficacy and safety evaluation of medical treatments. Although they are of pivotal importance in evidence-based medicine, there is a lack of usable information systems providing data-analysis and decision support capabilities for

  10. Model based decision support for planning of road maintenance

    NARCIS (Netherlands)

    van Harten, Aart; Worm, J.M.; Worm, J.M.

    1996-01-01

    In this article we describe a Decision Support Model, based on Operational Research methods, for the multi-period planning of maintenance of bituminous pavements. This model is a tool for the road manager to assist in generating an optimal maintenance plan for a road. Optimal means: minimising the

  11. Organisational support for evidence-based practice: occupational therapists perceptions.

    Science.gov (United States)

    Bennett, Sally; Allen, Shelley; Caldwell, Elizabeth; Whitehead, Mary; Turpin, Merrill; Fleming, Jennifer; Cox, Ruth

    2016-02-01

    Barriers to the use of evidence-based practice extend beyond the individual clinician and often include organisational barriers. Adoption of systematic organisational support for evidence-based practice in health care is integral to its use. This study aimed to explore the perceptions of occupational therapy staff regarding the influence of organisational initiatives to support evidence-based practice on workplace culture and clinical practice. This study used semi-structured interviews with 30 occupational therapists working in a major metropolitan hospital in Brisbane, Australia regarding their perceptions of organisational initiatives designed to support evidence-based practice. Four themes emerged from the data: (i) firmly embedding a culture valuing research and EBP, (ii) aligning professional identity with the Research and Evidence in Practice model, (iii) experiences of change: pride, confidence and pressure and (iv) making evidence-based changes to clinical practices. Organisational initiatives for evidence-based practice were perceived as influencing the culture of the workplace, therapists' sense of identity as clinicians, and as contributing to changes in clinical practice. It is therefore important to consider organisational factors when attempting to increase the use of evidence in practice. © 2016 Occupational Therapy Australia.

  12. Terrorism and global security: The nuclear threat

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    In the seven years since this book was first published, the threat of nuclear terrorism has increased dramatically. The enormous destructive potential of nuclear technology inevitably raises the specter of the use of nuclear explosives or radioactivity by insurgent groups. The author explores the political bases of terrorism by considering the factors that might foster nuclear terrorism, the forms it could take, and the probable consequences of such acts. New to this edition is the author's examination of the essential distinctions between lawful insurgencies and terrorism, as well as his analysis of the impact of recent U.S. foreign policy. The author explores the United State's all-consuming rivalry with the Soviet Union, arguing that it has created an atmosphere ripe for anti-U.S. terrorism and that the only viable option for the super-powers is cooperation in an effort to control terrorist activities. He also discusses the ''Reagan doctrine,'' which he believes has increased the long-term threat of nuclear terrorism against the U.S. by its continuing support of authoritarian regimes and by its active opposition to Marxist regimes such as those in Nicaragua and Angola. The book concludes by presenting the first coherent strategy for countering nuclear terrorism-embracing both technological and behavioral measures. The proposal includes policies for deterrence and situation management on national and international scales and emphasizes the logic of a major reshaping of world order

  13. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  14. 49 CFR 1515.5 - Appeal of Initial Determination of Threat Assessment based on criminal conviction, immigration...

    Science.gov (United States)

    2010-10-01

    ... Assessment based on criminal conviction, immigration status, or mental capacity. 1515.5 Section 1515.5... criminal conviction, immigration status, or mental capacity. (a) Scope. This section applies to applicants... the immigration status requirements as described in 49 CFR 1572.105. (3) TSA has determined that an...

  15. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  16. A Survey of Technologies Supporting Virtual Project Based Learning

    DEFF Research Database (Denmark)

    Dirckinck-Holmfeld, Lone

    2002-01-01

    This paper describes a survey of technologies and to what extent they support virtual project based learning. The paper argues that a survey of learning technologies should be related to concrete learning tasks and processes. Problem oriented project pedagogy (POPP) is discussed, and a framework...... for evaluation is proposed where negotiation of meaning, coordination and resource management are identified as the key concepts in virtual project based learning. Three e-learning systems are selected for the survey, Virtual-U, Lotus Learningspace and Lotus Quickplace, as each system offers different strategies...... for e-learning. The paper concludes that virtual project based learning may benefit from facilities of all these systems....

  17. Prediction of Banking Systemic Risk Based on Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Shouwei Li

    2013-01-01

    Full Text Available Banking systemic risk is a complex nonlinear phenomenon and has shed light on the importance of safeguarding financial stability by recent financial crisis. According to the complex nonlinear characteristics of banking systemic risk, in this paper we apply support vector machine (SVM to the prediction of banking systemic risk in an attempt to suggest a new model with better explanatory power and stability. We conduct a case study of an SVM-based prediction model for Chinese banking systemic risk and find the experiment results showing that support vector machine is an efficient method in such case.

  18. Knowledge-based support system for requirement elaboration in design

    International Nuclear Information System (INIS)

    Furuta, Kazuo; Kondo, Shunsuke

    1994-01-01

    Design requirements are the seeds of every design activity, but elicitation and formalization of them are not easy tasks. This paper proposes a method to support designers in such requirement elaboration process with a computer. In this method the cognitive work space of designers is modeled by abstraction and structural hierarchies, and supporting functions of knowledge-based requirement elaboration, requirement classification and assessment of contentment status of requirements are provided on this framework. A prototype system was developed and tested using fast breeder reactor design. (author)

  19. Supporting ontology-based keyword search over medical databases.

    Science.gov (United States)

    Kementsietsidis, Anastasios; Lim, Lipyeow; Wang, Min

    2008-11-06

    The proliferation of medical terms poses a number of challenges in the sharing of medical information among different stakeholders. Ontologies are commonly used to establish relationships between different terms, yet their role in querying has not been investigated in detail. In this paper, we study the problem of supporting ontology-based keyword search queries on a database of electronic medical records. We present several approaches to support this type of queries, study the advantages and limitations of each approach, and summarize the lessons learned as best practices.

  20. Characterizing hospital workers' willingness to report to duty in an influenza pandemic through threat- and efficacy-based assessment

    Directory of Open Access Journals (Sweden)

    Catlett Christina L

    2010-07-01

    Full Text Available Abstract Background Hospital-based providers' willingness to report to work during an influenza pandemic is a critical yet under-studied phenomenon. Witte's Extended Parallel Process Model (EPPM has been shown to be useful for understanding adaptive behavior of public health workers to an unknown risk, and thus offers a framework for examining scenario-specific willingness to respond among hospital staff. Methods We administered an anonymous online EPPM-based survey about attitudes/beliefs toward emergency response, to all 18,612 employees of the Johns Hopkins Hospital from January to March 2009. Surveys were completed by 3426 employees (18.4%, approximately one third of whom were health professionals. Results Demographic and professional distribution of respondents was similar to all hospital staff. Overall, more than one-in-four (28% hospital workers indicated they were not willing to respond to an influenza pandemic scenario if asked but not required to do so. Only an additional 10% were willing if required. One-third (32% of participants reported they would be unwilling to respond in the event of a more severe pandemic influenza scenario. These response rates were consistent across different departments, and were one-third lower among nurses as compared with physicians. Respondents who were hesitant to agree to work additional hours when required were 17 times less likely to respond during a pandemic if asked. Sixty percent of the workers perceived their peers as likely to report to work in such an emergency, and were ten times more likely than others to do so themselves. Hospital employees with a perception of high efficacy had 5.8 times higher declared rates of willingness to respond to an influenza pandemic. Conclusions Significant gaps exist in hospital workers' willingness to respond, and the EPPM is a useful framework to assess these gaps. Several attitudinal indicators can help to identify hospital employees unlikely to respond. The

  1. Mobbing, threats to employees

    Directory of Open Access Journals (Sweden)

    Tatjana Vene

    2012-02-01

    Full Text Available RQ: Is there a connection among perception of hostile and unethical communication, timely removal of causes and employee satisfaction?Purpose: Perceived mobbing in the organization, analysing causes and timely removal of them without any effect; achieve an environment of satisfied employees. The purpose is to study the relationship amongthe categories: perceiving mobbing, removing the effects, employee satisfaction.Methods: Qualitative research approach, method of interview by using the seven steps principles.Results: The findings clearly state that being aware of the negative factors and psychological abuse in organizations was present. The interview participants perceived different negative behaviours especially by the female population and from the side of superiors. In some organizations perceived negative factors are insults,insinuations, low wages, inadequate working day, competition, lobbying, and verbal threats. All negative factors lead to serious implications for employees, in which the organization can lose its reputation, productivity is reduced, costs of employment can increase with more sick leaves and in extreme cases, the results can be soserious that the organization can end in bankruptcy or liquidation.Organization: The result of the study warns management to acceptcertain actions and remediate the situation in organizations. The employer and managers must do everything to protect their subordinates from violence and potential offenders.Society: The research study warns on the seriousness of mobbing among employees, the aim is to bring the issue to individuals and society. The victim usually needs help (health costs, losses in the pension system, increased unemployment, and lower productivity of the whole society.Originality: In view of the sensitivity of the issues, the author concludes that the existing research studies are based especially on closed questions (questionnaires; however, interviews create mutual trust between

  2. A Web-Based Learning Support System for Inquiry-Based Learning

    Science.gov (United States)

    Kim, Dong Won; Yao, Jingtao

    The emergence of the Internet and Web technology makes it possible to implement the ideals of inquiry-based learning, in which students seek truth, information, or knowledge by questioning. Web-based learning support systems can provide a good framework for inquiry-based learning. This article presents a study on a Web-based learning support system called Online Treasure Hunt. The Web-based learning support system mainly consists of a teaching support subsystem, a learning support subsystem, and a treasure hunt game. The teaching support subsystem allows instructors to design their own inquiry-based learning environments. The learning support subsystem supports students' inquiry activities. The treasure hunt game enables students to investigate new knowledge, develop ideas, and review their findings. Online Treasure Hunt complies with a treasure hunt model. The treasure hunt model formalizes a general treasure hunt game to contain the learning strategies of inquiry-based learning. This Web-based learning support system empowered with the online-learning game and founded on the sound learning strategies furnishes students with the interactive and collaborative student-centered learning environment.

  3. Supporting plant operation through computer-based procedures

    International Nuclear Information System (INIS)

    Martinez, Victor; Medrano, Javier; Mendez, Julio

    2014-01-01

    Digital Systems are becoming more important in controlling and monitoring nuclear power plant operations. The capabilities of these systems provide additional functions as well as support operators in making decisions and avoiding errors. Regarding Operation Support Systems, an important way of taking advantage of these features is using computer-based procedures (CBPs) tools that enhance the plant operation. Integrating digital systems in analogue controls at nuclear power plants in operation becomes an extra challenge, in contrast to the integration of Digital Control Systems in new nuclear power plants. Considering the potential advantages of using this technology, Tecnatom has designed and developed a CBP platform taking currently operating nuclear power plants as its design basis. The result is a powerful tool which combines the advantages of CBPs and the conventional analogue control systems minimizing negative effects during plant operation and integrating operation aid-systems to support operators. (authors)

  4. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  5. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  6. Simulation-based decision support for evaluating operational plans

    Directory of Open Access Journals (Sweden)

    Johan Schubert

    2015-12-01

    Full Text Available In this article, we describe simulation-based decision support techniques for evaluation of operational plans within effects-based planning. Using a decision support tool, developers of operational plans are able to evaluate thousands of alternative plans against possible courses of events and decide which of these plans are capable of achieving a desired end state. The objective of this study is to examine the potential of a decision support system that helps operational analysts understand the consequences of numerous alternative plans through simulation and evaluation. Operational plans are described in the effects-based approach to operations concept as a set of actions and effects. For each action, we examine several different alternative ways to perform the action. We use a representation where a plan consists of several actions that should be performed. Each action may be performed in one of several different alternative ways. Together these action alternatives make up all possible plan instances, which are represented as a tree of action alternatives that may be searched for the most effective sequence of alternative actions. As a test case, we use an expeditionary operation with a plan of 43 actions and several alternatives for these actions, as well as a scenario of 40 group actors. Decision support for planners is provided by several methods that analyze the impact of a plan on the 40 actors, e.g., by visualizing time series of plan performance. Detailed decision support for finding the most influential actions of a plan is presented by using sensitivity analysis and regression tree analysis. Finally, a decision maker may use the tool to determine the boundaries of an operation that it must not move beyond without risk of drastic failure. The significant contribution of this study is the presentation of an integrated approach for evaluation of operational plans.

  7. Coal demand prediction based on a support vector machine model

    Energy Technology Data Exchange (ETDEWEB)

    Jia, Cun-liang; Wu, Hai-shan; Gong, Dun-wei [China University of Mining & Technology, Xuzhou (China). School of Information and Electronic Engineering

    2007-01-15

    A forecasting model for coal demand of China using a support vector regression was constructed. With the selected embedding dimension, the output vectors and input vectors were constructed based on the coal demand of China from 1980 to 2002. After compared with lineal kernel and Sigmoid kernel, a radial basis function(RBF) was adopted as the kernel function. By analyzing the relationship between the error margin of prediction and the model parameters, the proper parameters were chosen. The support vector machines (SVM) model with multi-input and single output was proposed. Compared the predictor based on RBF neural networks with test datasets, the results show that the SVM predictor has higher precision and greater generalization ability. In the end, the coal demand from 2003 to 2006 is accurately forecasted. l0 refs., 2 figs., 4 tabs.

  8. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)

  9. Angra II pipelines and supports data base sources (GPT)

    International Nuclear Information System (INIS)

    Abud, Paulo Roberto; Grand Court, Eduardo Souza de

    1995-01-01

    The analysis of the needs related to the management of assembly of pipelines and support system in a nuclear power plant presents a great deal of data. Such situation leaded to the development of a data base named Erection Management System, EMS, which enables not only the assembly of the equipment, but also the management of the project in addition to monitoring all the activities related to assembly. This work discusses the above mentioned issues

  10. The effects of a concept map-based support tool on simulation-based inquiry learning

    NARCIS (Netherlands)

    Hagemans, M.G.; van der Meij, Hans; de Jong, Anthonius J.M.

    2013-01-01

    Students often need support to optimize their learning in inquiry learning environments. In 2 studies, we investigated the effects of adding concept-map-based support to a simulation-based inquiry environment on kinematics. The concept map displayed the main domain concepts and their relations,

  11. The Effects of a Concept Map-Based Support Tool on Simulation-Based Inquiry Learning

    Science.gov (United States)

    Hagemans, Mieke G.; van der Meij, Hans; de Jong, Ton

    2013-01-01

    Students often need support to optimize their learning in inquiry learning environments. In 2 studies, we investigated the effects of adding concept-map-based support to a simulation-based inquiry environment on kinematics. The concept map displayed the main domain concepts and their relations, while dynamic color coding of the concepts displayed…

  12. Modelling and simulation-based acquisition decision support: present & future

    CSIR Research Space (South Africa)

    Naidoo, S

    2009-10-01

    Full Text Available stream_source_info Naidoo1_2009.pdf.txt stream_content_type text/plain stream_size 24551 Content-Encoding UTF-8 stream_name Naidoo1_2009.pdf.txt Content-Type text/plain; charset=UTF-8 1 Modelling & Simulation...-Based Acquisition Decision Support: Present & Future Shahen Naidoo Abstract The Ground Based Air Defence System (GBADS) Programme, of the South African Army has been applying modelling and simulation (M&S) to provide acquisition decision and doctrine...

  13. Bioregenerative life support system for a lunar base

    Science.gov (United States)

    Liu, H.; Wang, J.; Manukovsky, N. S.; Kovalev, V. S.; Gurevich, Yu. L.

    We have studied a modular approach to construction of bioregenerative life support system BLSS for a lunar base using soil-like substrate SLS for plant cultivation Calculations of massflow rates in BLSS were based mostly on a vegetarian diet and biological conversion of plant residues in SLS Plant candidate list for lunar BLSS includes the following basic species rice Oryza sativa soy Glycine max sweet potato Ipomoea batatas and wheat Triticum aestivum To reduce the time necessary for transition of the system to steady state we suggest that the first seeding and sprouting could be made on Earth

  14. Rainwater Harvesting-based Safe Water Access in Diarrhea-endemic Coastal Communities of Bangladesh under Threats of Climate Change

    Science.gov (United States)

    Akanda, A. S.; Redwan, A. M.; Ali, M. A.; Alam, M.; Jutla, A.; Colwell, R. R.

    2014-12-01

    feasibility and optimum scales and designs of rainwater-harvesting schemes in areas under changing precipitation patterns and coastal sea-level rise. We present preliminary results based on changing rainfall patterns, water budget analysis, and rainwater harvesting potential.

  15. Creep behaviour of a polymer-based underground support liner

    Science.gov (United States)

    Guner, Dogukan; Ozturk, Hasan

    2017-09-01

    All underground excavations (tunnels, mines, caverns, etc.) need a form of support to ensure that excavations remain safe and stable for the designed service lifetime. In the last decade, a new support material, thin spray-on liner (TSL) has started to take place of traditional underground surface supports of bolts and shotcrete. TSLs are generally cement, latex, polymer-based and also reactive or non-reactive, multi-component materials applied to the rock surface with a layer of few millimeter thickness. They have the advantages of low volume, logistics, rapid application and low operating cost. The majority of current TSLs are two-part products that are mixed on site before spraying onto excavation rock surfaces. Contrary to the traditional brittle supports, the high plastic behaviour of TSLs make them to distribute the loads on larger lining area. In literature, there is a very limited information exist on the creep behavior of TSLs. In this study, the creep behavior of a polymer-based TSL was investigated. For this purpose, 7-day cured dogbone TSL specimens were tested under room temperature and humidity conditions according to ASTM-D2990 creep testing standard. A range of dead weights (80, 60, 40, and 20 % of the tensile strength) were applied up to 1500 hours. As a result of this study, the time-dependent strain behavior of a TSL was presented for different constant load conditions. Moreover, a new equation was derived to estimate tensile failure time of the TSL for a given loading condition. If the tensile stress acting on the TSL is known, the effective permanent support time of the TSL can be estimated by the proposed relationship.

  16. A dashboard-based system for supporting diabetes care.

    Science.gov (United States)

    Dagliati, Arianna; Sacchi, Lucia; Tibollo, Valentina; Cogni, Giulia; Teliti, Marsida; Martinez-Millana, Antonio; Traver, Vicente; Segagni, Daniele; Posada, Jorge; Ottaviano, Manuel; Fico, Giuseppe; Arredondo, Maria Teresa; De Cata, Pasquale; Chiovato, Luca; Bellazzi, Riccardo

    2018-05-01

    To describe the development, as part of the European Union MOSAIC (Models and Simulation Techniques for Discovering Diabetes Influence Factors) project, of a dashboard-based system for the management of type 2 diabetes and assess its impact on clinical practice. The MOSAIC dashboard system is based on predictive modeling, longitudinal data analytics, and the reuse and integration of data from hospitals and public health repositories. Data are merged into an i2b2 data warehouse, which feeds a set of advanced temporal analytic models, including temporal abstractions, care-flow mining, drug exposure pattern detection, and risk-prediction models for type 2 diabetes complications. The dashboard has 2 components, designed for (1) clinical decision support during follow-up consultations and (2) outcome assessment on populations of interest. To assess the impact of the clinical decision support component, a pre-post study was conducted considering visit duration, number of screening examinations, and lifestyle interventions. A pilot sample of 700 Italian patients was investigated. Judgments on the outcome assessment component were obtained via focus groups with clinicians and health care managers. The use of the decision support component in clinical activities produced a reduction in visit duration (P ≪ .01) and an increase in the number of screening exams for complications (P < .01). We also observed a relevant, although nonstatistically significant, increase in the proportion of patients receiving lifestyle interventions (from 69% to 77%). Regarding the outcome assessment component, focus groups highlighted the system's capability of identifying and understanding the characteristics of patient subgroups treated at the center. Our study demonstrates that decision support tools based on the integration of multiple-source data and visual and predictive analytics do improve the management of a chronic disease such as type 2 diabetes by enacting a successful

  17. Analyzing Cyber-Physical Threats on Robotic Platforms.

    Science.gov (United States)

    Ahmad Yousef, Khalil M; AlMajali, Anas; Ghalyon, Salah Abu; Dweik, Waleed; Mohd, Bassam J

    2018-05-21

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBot TM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  18. Analyzing Cyber-Physical Threats on Robotic Platforms †

    Science.gov (United States)

    2018-01-01

    Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream) and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT) was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS) and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications. PMID:29883403

  19. Analyzing Cyber-Physical Threats on Robotic Platforms

    Directory of Open Access Journals (Sweden)

    Khalil M. Ahmad Yousef

    2018-05-01

    Full Text Available Robots are increasingly involved in our daily lives. Fundamental to robots are the communication link (or stream and the applications that connect the robots to their clients or users. Such communication link and applications are usually supported through client/server network connection. This networking system is amenable of being attacked and vulnerable to the security threats. Ensuring security and privacy for robotic platforms is thus critical, as failures and attacks could have devastating consequences. In this paper, we examine several cyber-physical security threats that are unique to the robotic platforms; specifically the communication link and the applications. Threats target integrity, availability and confidential security requirements of the robotic platforms, which use MobileEyes/arnlServer client/server applications. A robot attack tool (RAT was developed to perform specific security attacks. An impact-oriented approach was adopted to analyze the assessment results of the attacks. Tests and experiments of attacks were conducted in simulation environment and physically on the robot. The simulation environment was based on MobileSim; a software tool for simulating, debugging and experimenting on MobileRobots/ActivMedia platforms and their environments. The robot platform PeopleBotTM was used for physical experiments. The analysis and testing results show that certain attacks were successful at breaching the robot security. Integrity attacks modified commands and manipulated the robot behavior. Availability attacks were able to cause Denial-of-Service (DoS and the robot was not responsive to MobileEyes commands. Integrity and availability attacks caused sensitive information on the robot to be hijacked. To mitigate security threats, we provide possible mitigation techniques and suggestions to raise awareness of threats on the robotic platforms, especially when the robots are involved in critical missions or applications.

  20. Case-based reasoning support for engineering design

    Science.gov (United States)

    Lees, Brian; Hamza, Meer; Irgens, Chris

    2000-10-01

    The potential application of case-based reasoning (CBR) in design support is illustrated through examples drawn from research at the University of Paisley, demonstrating the suitability of CBR for different aspects of design, different problem areas, and different design goals. A quality advisory system has been developed for the early stages of mechanical engineering design, the aim of which is to provide quality advice in a variant design situation. In the domain of software engineering CBR has been applied to advise on which metrics are appropriate fora assessing the quality of the software currently under design. The system integrates CBR with concepts from quality function deployment (QFD) and incorporates a case library holding past software quality histories. CBR has been applied in support of conceptual design: to capture detailed design histories by monitoring designer actions, and thereby support design reuse through the evaluation of designs, through the provision of query, browsing and replay facilities. The resulting system is aimed to support the design of safety critical systems, by assisting in the construction of safety arguments, and cooperative design.

  1. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  2. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  3. Therapy Decision Support Based on Recommender System Methods.

    Science.gov (United States)

    Gräßer, Felix; Beckert, Stefanie; Küster, Denise; Schmitt, Jochen; Abraham, Susanne; Malberg, Hagen; Zaunseder, Sebastian

    2017-01-01

    We present a system for data-driven therapy decision support based on techniques from the field of recommender systems. Two methods for therapy recommendation, namely, Collaborative Recommender and Demographic-based Recommender , are proposed. Both algorithms aim to predict the individual response to different therapy options using diverse patient data and recommend the therapy which is assumed to provide the best outcome for a specific patient and time, that is, consultation. The proposed methods are evaluated using a clinical database incorporating patients suffering from the autoimmune skin disease psoriasis. The Collaborative Recommender proves to generate both better outcome predictions and recommendation quality. However, due to sparsity in the data, this approach cannot provide recommendations for the entire database. In contrast, the Demographic-based Recommender performs worse on average but covers more consultations. Consequently, both methods profit from a combination into an overall recommender system.

  4. Therapy Decision Support Based on Recommender System Methods

    Directory of Open Access Journals (Sweden)

    Felix Gräßer

    2017-01-01

    Full Text Available We present a system for data-driven therapy decision support based on techniques from the field of recommender systems. Two methods for therapy recommendation, namely, Collaborative Recommender and Demographic-based Recommender, are proposed. Both algorithms aim to predict the individual response to different therapy options using diverse patient data and recommend the therapy which is assumed to provide the best outcome for a specific patient and time, that is, consultation. The proposed methods are evaluated using a clinical database incorporating patients suffering from the autoimmune skin disease psoriasis. The Collaborative Recommender proves to generate both better outcome predictions and recommendation quality. However, due to sparsity in the data, this approach cannot provide recommendations for the entire database. In contrast, the Demographic-based Recommender performs worse on average but covers more consultations. Consequently, both methods profit from a combination into an overall recommender system.

  5. Chaos characteristics and least squares support vector machines based online pipeline small leakages detection

    International Nuclear Information System (INIS)

    Liu, Jinhai; Su, Hanguang; Ma, Yanjuan; Wang, Gang; Wang, Yuan; Zhang, Kun

    2016-01-01

    Small leakages are severe threats to the long distance pipeline transportation. An online small leakage detection method based on chaos characteristics and Least Squares Support Vector Machines (LS-SVMs) is proposed in this paper. For the first time, the relationship between the chaos characteristics of pipeline inner pressures and the small leakages is investigated and applied in the pipeline detection method. Firstly, chaos in the pipeline inner pressure is found. Relevant chaos characteristics are estimated by the nonlinear time series analysis package (TISEAN). Then LS-SVM with a hybrid kernel is built and named as hybrid kernel LS-SVM (HKLS-SVM). It is applied to analyze the chaos characteristics and distinguish the negative pressure waves (NPWs) caused by small leaks. A new leak location method is also expounded. Finally, data of the chaotic Logistic-Map system is used in the simulation. A comparison between HKLS-SVM and other methods, in terms of the identification accuracy and computing efficiency, is made. The simulation result shows that HKLS-SVM gets the best performance and is effective in error analysis of chaotic systems. When real pipeline data is used in the test, the ultimate identification accuracy of HKLS-SVM reaches 97.38% and the position accuracy is 99.28%, indicating that the method proposed in this paper has good performance in detecting and locating small pipeline leaks.

  6. SAM: Support Vector Machine Based Active Queue Management

    International Nuclear Information System (INIS)

    Shah, M.S.

    2014-01-01

    Recent years have seen an increasing interest in the design of AQM (Active Queue Management) controllers. The purpose of these controllers is to manage the network congestion under varying loads, link delays and bandwidth. In this paper, a new AQM controller is proposed which is trained by using the SVM (Support Vector Machine) with the RBF (Radial Basis Function) kernal. The proposed controller is called the support vector based AQM (SAM) controller. The performance of the proposed controller has been compared with three conventional AQM controllers, namely the Random Early Detection, Blue and Proportional Plus Integral Controller. The preliminary simulation studies show that the performance of the proposed controller is comparable to the conventional controllers. However, the proposed controller is more efficient in controlling the queue size than the conventional controllers. (author)

  7. Evaluation of Web-Based Ostomy Patient Support Resources.

    Science.gov (United States)

    Pittman, Joyce; Nichols, Thom; Rawl, Susan M

    To evaluate currently available, no-cost, Web-based patient support resources designed for those who have recently undergone ostomy surgery. Descriptive, correlational study using telephone survey. The sample comprised 202 adults who had ostomy surgery within the previous 24 months in 1 of 5 hospitals within a large healthcare organization in the Midwestern United States. Two of the hospitals were academic teaching hospitals, and 3 were community hospitals. The study was divided into 2 phases: (1) gap analysis of 4 Web sites (labeled A-D) based on specific criteria; and (2) telephone survey of individuals with an ostomy. In phase 1, a comprehensive checklist based on best practice standards was developed to conduct the gap analysis. In phase 2, data were collected from 202 participants by trained interviewers via 1-time structured telephone interviews that required approximately 30 minutes to complete. Descriptive analyses were performed, along with correlational analysis of relationships among Web site usage, acceptability and satisfaction, demographic characteristics, and medical history. Gap analysis revealed that Web site D, managed by a patient advocacy group, received the highest total content score of 155/176 (88%) and the highest usability score of 31.7/35 (91%). Two hundred two participants completed the telephone interview, with 96 (48%) reporting that they used the Internet as a source of information. Sixty participants (30%) reported that friends or family member had searched the Internet for ostomy information on their behalf, and 148 (75%) indicated they were confident they could get information about ostomies on the Internet. Of the 90 participants (45%) who reported using the Internet to locate ostomy information, 73 (82%) found the information on the Web easy to understand, 28 (31%) reported being frustrated during their search for information, 24 (27%) indicated it took a lot of effort to get the information they needed, and 39 (43%) were

  8. Bootstrap-based Support of HGT Inferred by Maximum Parsimony

    Directory of Open Access Journals (Sweden)

    Nakhleh Luay

    2010-05-01

    Full Text Available Abstract Background Maximum parsimony is one of the most commonly used criteria for reconstructing phylogenetic trees. Recently, Nakhleh and co-workers extended this criterion to enable reconstruction of phylogenetic networks, and demonstrated its application to detecting reticulate evolutionary relationships. However, one of the major problems with this extension has been that it favors more complex evolutionary relationships over simpler ones, thus having the potential for overestimating the amount of reticulation in the data. An ad hoc solution to this problem that has been used entails inspecting the improvement in the parsimony length as more reticulation events are added to the model, and stopping when the improvement is below a certain threshold. Results In this paper, we address this problem in a more systematic way, by proposing a nonparametric bootstrap-based measure of support of inferred reticulation events, and using it to determine the number of those events, as well as their placements. A number of samples is generated from the given sequence alignment, and reticulation events are inferred based on each sample. Finally, the support of each reticulation event is quantified based on the inferences made over all samples. Conclusions We have implemented our method in the NEPAL software tool (available publicly at http://bioinfo.cs.rice.edu/, and studied its performance on both biological and simulated data sets. While our studies show very promising results, they also highlight issues that are inherently challenging when applying the maximum parsimony criterion to detect reticulate evolution.

  9. Bootstrap-based support of HGT inferred by maximum parsimony.

    Science.gov (United States)

    Park, Hyun Jung; Jin, Guohua; Nakhleh, Luay

    2010-05-05

    Maximum parsimony is one of the most commonly used criteria for reconstructing phylogenetic trees. Recently, Nakhleh and co-workers extended this criterion to enable reconstruction of phylogenetic networks, and demonstrated its application to detecting reticulate evolutionary relationships. However, one of the major problems with this extension has been that it favors more complex evolutionary relationships over simpler ones, thus having the potential for overestimating the amount of reticulation in the data. An ad hoc solution to this problem that has been used entails inspecting the improvement in the parsimony length as more reticulation events are added to the model, and stopping when the improvement is below a certain threshold. In this paper, we address this problem in a more systematic way, by proposing a nonparametric bootstrap-based measure of support of inferred reticulation events, and using it to determine the number of those events, as well as their placements. A number of samples is generated from the given sequence alignment, and reticulation events are inferred based on each sample. Finally, the support of each reticulation event is quantified based on the inferences made over all samples. We have implemented our method in the NEPAL software tool (available publicly at http://bioinfo.cs.rice.edu/), and studied its performance on both biological and simulated data sets. While our studies show very promising results, they also highlight issues that are inherently challenging when applying the maximum parsimony criterion to detect reticulate evolution.

  10. Proprietary, standard, and government-supported nuclear data bases

    International Nuclear Information System (INIS)

    Poncelet, C.G.; Ozer, O.; Harris, D.R.

    1975-07-01

    This study presents an assessment of the complex situation surrounding nuclear data bases for nuclear power technology. Requirements for nuclear data bases are identified as regards engineering functions and system applications for the many and various user groups that rely on nuclear data bases. Current practices in the development and generation of nuclear data sets are described, and the competitive aspect of design nuclear data set development is noted. The past and current role of the federal government in nuclear data base development is reviewed, and the relative merits of continued government involvement are explored. National policies of the United States and other industrial countries regarding the availability of nationally supported nuclear data information are reviewed. Current proprietary policies of reactor vendors regarding design library data sets are discussed along with the basis for such proprietary policies. The legal aspects of protective policies are explored as are their impacts on the nuclear power industry as a whole. The effect of the regulatory process on the availability and documentation of nuclear data bases is examined. Current nuclear data standard developments are reviewed, including a discussion of the standard preparation process. Standards currently proposed or in preparation that directly relate to nuclear data bases are discussed in some detail. (auth)

  11. JOYO operation support system 'JOYCAT' based on intelligent alarm handling

    International Nuclear Information System (INIS)

    Tamaoki, Tetsuo; Yamamoto, Hiroki; Sato, Masuo; Yoshida, Megumu; Kaneko, Tomoko; Terunuma, Seiichi; Takatsuto, Hiroshi; Morimoto, Makoto.

    1992-01-01

    An operation support system for the experimental fast reactor 'JOYO' was developed based on an intelligent alarm-handling. A specific feature of this system, called JOYCAT (JOYO Consulting and Analyzing Tool), is in its sequential processing structure that a uniform treatment by using design knowledge base is firstly applied for all activated alarms, and an exceptional treatment by using heuristic knowledge base is then applied only for the former results. This enables us to achieve real-time and flexible alarm-handling. The first alarm-handling determines the candidates of causal alarms, important alarms with which the operator should firstly cope, through identifying the cause-consequence relations among alarms based on the design knowledge base in which importance and activating conditions are described for each of 640 alarms in a frame format. The second alarm-handling makes the final judgement with the candidates by using the heuristic knowledge base described as production rules. Then, operation manuals concerning the most important alarms are displayed to operators. JOYCAT has been in commission since September of 1990, after a wide scope of validation tests by using an on-site full-scope training simulator. (author)

  12. Insider threats to cybersecurity

    CSIR Research Space (South Africa)

    Lakha, D

    2017-10-01

    Full Text Available ? Acting on opportunity Taking revenge for perceived injustice Making a statement Doing competitor s bidding Seeing themselves as a future competition INSIDER THREATS | Combating it! Darshan Lakha 7 5 January 2017 General Investigations...! Darshan Lakha 11 5 January 2017 Monitor user actions Use auditing to monitor access to files Examine cached Web files Monitor Web access at the firewall Monitor incoming and outgoing e-mail messages Control what software employees can install...

  13. Flexible training under threat.

    Science.gov (United States)

    Houghton, Anita; Eaton, Jennifer

    2002-10-01

    As the number of women in medicine and the general demand for a better work-life balance rises, flexible training is an increasingly important mechanism for maintaining the medical workforce. The new pay deal, together with entrenched cultural attitudes, are potential threats. Ways forward include more substantive part-time posts, more part-time opportunities at consultant level, and using positive experiences as a way of tackling attitudes in the less accepting specialties.

  14. Counter-regulating on the Internet: Threat elicits preferential processing of positive information.

    Science.gov (United States)

    Greving, Hannah; Sassenberg, Kai; Fetterman, Adam

    2015-09-01

    The Internet is a central source of information. It is increasingly used for information search in self-relevant domains (e.g., health). Self-relevant topics are also associated with specific emotions and motivational states. For example, individuals may fear serious illness and feel threatened. Thus far, the impact of threat has received little attention in Internet-based research. The current studies investigated how threat influences Internet search. Threat is known to elicit the preferential processing of positive information. The self-directed nature of Internet search should particularly provide opportunities for such processing behavior. We predicted that during Internet search, more positive information would be processed (i.e., allocated more attention to) and more positive knowledge would be acquired under threat than in a control condition. Three experiments supported this prediction: Under threat, attention is directed more to positive web pages (Study 1) and positive links (Study 2), and more positive information is acquired (Studies 1 and 3) than in a control condition. Notably, the effect on knowledge acquisition was mediated by the effect on attention allocation during an actual Internet search (Study 1). Thus, Internet search under threat leads to selective processing of positive information and dampens threatened individuals' negative affect. (c) 2015 APA, all rights reserved).

  15. Slope Deformation Prediction Based on Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Lei JIA

    2013-07-01

    Full Text Available This paper principally studies the prediction of slope deformation based on Support Vector Machine (SVM. In the prediction process,explore how to reconstruct the phase space. The geological body’s displacement data obtained from chaotic time series are used as SVM’s training samples. Slope displacement caused by multivariable coupling is predicted by means of single variable. Results show that this model is of high fitting accuracy and generalization, and provides reference for deformation prediction in slope engineering.

  16. Knowledge-based dialogue in Intelligent Decision Support Systems

    International Nuclear Information System (INIS)

    Hollnagel, E.

    1987-01-01

    The overall goal for the design of Intelligent Decision Support Systems (IDSS) is to enhance understanding of the process under all operating conditions. For an IDSS to be effective, it must: select or generate the right information; produce reliable and consistent information; allow flexible and effective operator interaction; relate information presentation to current plant status and problems; and make the presentation at the right time. Several ongoing R and D programs try to design and build IDSSs. A particular example is the ESPRIT project Graphics and Knowledge Based Diaglogue for Dynamic Systems (GRADIENT). This project, the problems it addresses, and its uses, are discussed here

  17. [Partnership-based research as a space to support innovation].

    Science.gov (United States)

    Bernier, Jocelyne

    2014-03-01

    The process of joint evaluation involving several actors is criss-crossed by a process of negotiation and adjustment between different concerns, responsibilities and interests. How can we encourage a dialogue between knowledge from expertise and knowledge from experience, in order to produce knowledge that is scientifically based and useful for those who are involved in the programs? Far from being a mechanical process, this involves the delicate task of striking a balance, which relies on a negotiated partnership framework. The implementation of an advisory committee, organized by an interface function between the stakeholders of the intervention under study, has increasingly become recognized as a necessary condition for success in partnership-based research. These conditions enable the deployment of a reflexive system that can support social innovation--when the formulation of the problem and its resulting actions become enriched, as knowledge about the intervention develops.

  18. Language-based support for service oriented architectures

    DEFF Research Database (Denmark)

    Giambiagi, Pablo; Owe, Olaf; Ravn, Anders Peter

    2006-01-01

    The fast evolution of the Internet has popularized service-oriented architectures (SOA) with their promise of dynamic IT-supported inter-business collaborations. Yet this popularity does not reflect on the number of actual applications using the architecture. Programming models in use today make...... a poor match for the distributed, loosely-coupled, document-based nature of SOA. The gap is actually increasing. For example, interoperability between different organizations, requires contracts to reduce risks. Thus, high-level models of contracts are making their way into service-oriented architectures......, but application developers are still left to their own devices when it comes to writing code that will comply with a contract. This paper surveys existing and future directions regarding language-based solutions to the above problem....

  19. Gradient Evolution-based Support Vector Machine Algorithm for Classification

    Science.gov (United States)

    Zulvia, Ferani E.; Kuo, R. J.

    2018-03-01

    This paper proposes a classification algorithm based on a support vector machine (SVM) and gradient evolution (GE) algorithms. SVM algorithm has been widely used in classification. However, its result is significantly influenced by the parameters. Therefore, this paper aims to propose an improvement of SVM algorithm which can find the best SVMs’ parameters automatically. The proposed algorithm employs a GE algorithm to automatically determine the SVMs’ parameters. The GE algorithm takes a role as a global optimizer in finding the best parameter which will be used by SVM algorithm. The proposed GE-SVM algorithm is verified using some benchmark datasets and compared with other metaheuristic-based SVM algorithms. The experimental results show that the proposed GE-SVM algorithm obtains better results than other algorithms tested in this paper.

  20. Supporting Case-Based Learning in Information Security with Web-Based Technology

    Science.gov (United States)

    He, Wu; Yuan, Xiaohong; Yang, Li

    2013-01-01

    Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…

  1. Criteria Based Case Review: The Parent Child Psychological Support Program

    Directory of Open Access Journals (Sweden)

    Pilar Bujia-Couso

    2010-01-01

    Full Text Available The Parent Child Psychological Support Program (PCPS was established in an area of South West Dublin in 2001. Since then until May 2008 it has offered its services to over 700 children and their parents. This preventative, parenting support service is available to all parents of children aged 3 to 18 months within its catchment area. During periodical visits, the infant’s development and growth are measured and parents receive specific information about their child’s progress. Parents are empowered in their parenting practices, thus promoting consistency and synchrony in parent-child interaction. Between 2001 and 2006, 538 parents and their infants participated in the Program. Out of these cases, 130 (24.16% were considered to require additional support and were included in the Monthly Meeting Case Review (MM based on initial concerns The aims of this study were: 1. to review the first five years of MM cases and to explore the socio-demographic profile of the MM cases in comparison to those not in need of additional support (non-MM and 2. To illustrate an approach to refining the case review process which will inform practice and provides the service providers with better understanding of the early detection of parent-child relation difficulties. In pursuing this goal the cases screened over five years of practice were analyzed to explore the structure of the different factors by using statistical techniques of data reduction, i.e. factor analysis. The results showed that the MM group differed on several socio-demographic dimensions from the non-MM group and there was a four factor structure underlying the case review decision process. Implications of this research are discussed.

  2. Data warehouse based decision support system in nuclear power plants

    International Nuclear Information System (INIS)

    Nadinic, B.

    2004-01-01

    Safety is an important element in business decision making processes in nuclear power plants. Information about component reliability, structures and systems, data recorded during the nuclear power plant's operation and outage periods, as well as experiences from other power plants are located in different database systems throughout the power plant. It would be possible to create a decision support system which would collect data, transform it into a standardized form and store it in a single location in a format more suitable for analyses and knowledge discovery. This single location where the data would be stored would be a data warehouse. Such data warehouse based decision support system could help make decision making processes more efficient by providing more information about business processes and predicting possible consequences of different decisions. Two main functionalities in this decision support system would be an OLAP (On Line Analytical Processing) and a data mining system. An OLAP system would enable the users to perform fast, simple and efficient multidimensional analysis of existing data and identify trends. Data mining techniques and algorithms would help discover new, previously unknown information from the data as well as hidden dependencies between various parameters. Data mining would also enable analysts to create relevant prediction models that could predict behaviour of different systems during operation and inspection results during outages. The basic characteristics and theoretical foundations of such decision support system are described and the reasons for choosing a data warehouse as the underlying structure are explained. The article analyzes obvious business benefits of such system as well as potential uses of OLAP and data mining technologies. Possible implementation methodologies and problems that may arise, especially in the field of data integration, are discussed and analyzed.(author)

  3. Computational Model-Based Design of Leadership Support Based on Situational Leadership Theory

    NARCIS (Netherlands)

    Bosse, T.; Duell, R.; Memon, Z.A.; Treur, J.; van der Wal, C.N.

    2017-01-01

    This paper introduces the design of an agent-based leadership support system exploiting a computational model for development of individuals or groups. It is to be used, for example, as a basis for systems to support a group leader in the development of individual group members or a group as a

  4. Artificial intelligence based decision support for trumpeter swan management

    Science.gov (United States)

    Sojda, Richard S.

    2002-01-01

    The number of trumpeter swans (Cygnus buccinator) breeding in the Tri-State area where Montana, Idaho, and Wyoming come together has declined to just a few hundred pairs. However, these birds are part of the Rocky Mountain Population which additionally has over 3,500 birds breeding in Alberta, British Columbia, Northwest Territories, and Yukon Territory. To a large degree, these birds seem to have abandoned traditional migratory pathways in the flyway. Waterfowl managers have been interested in decision support tools that would help them explore simulated management scenarios in their quest towards reaching population recovery and the reestablishment of traditional migratory pathways. I have developed a decision support system to assist biologists with such management, especially related to wetland ecology. Decision support systems use a combination of models, analytical techniques, and information retrieval to help develop and evaluate appropriate alternatives. Swan management is a domain that is ecologically complex, and this complexity is compounded by spatial and temporal issues. As such, swan management is an inherently distributed problem. Therefore, the ecological context for modeling swan movements in response to management actions was built as a multiagent system of interacting intelligent agents that implements a queuing model representing swan migration. These agents accessed ecological knowledge about swans, their habitats, and flyway management principles from three independent expert systems. The agents were autonomous, had some sensory capability, and could respond to changing conditions. A key problem when developing ecological decision support systems is empirically determining that the recommendations provided are valid. Because Rocky Mountain trumpeter swans have been surveyed for a long period of time, I was able to compare simulated distributions provided by the system with actual field observations across 20 areas for the period 1988

  5. Experiential Knowledge Complements an LCA-Based Decision Support Framework

    Directory of Open Access Journals (Sweden)

    Heng Yi Teah

    2015-09-01

    Full Text Available A shrimp farmer in Taiwan practices innovation through trial-and-error for better income and a better environment, but such farmer-based innovation sometimes fails because the biological mechanism is unclear. Systematic field experimentation and laboratory research are often too costly, and simulating ground conditions is often too challenging. To solve this dilemma, we propose a decision support framework that explicitly utilizes farmer experiential knowledge through a participatory approach to alternatively estimate prospective change in shrimp farming productivity, and to co-design options for improvement. Data obtained from the farmer enable us to quantitatively analyze the production cost and greenhouse gas (GHG emission with a life cycle assessment (LCA methodology. We used semi-quantitative graphical representations of indifference curves and mixing triangles to compare and show better options for the farmer. Our results empower the farmer to make decisions more systematically and reliably based on the frequency of heterotrophic bacteria application and the revision of feed input. We argue that experiential knowledge may be less accurate due to its dependence on varying levels of farmer experience, but this knowledge is a reasonable alternative for immediate decision-making. More importantly, our developed framework advances the scope of LCA application to support practically important yet scientifically uncertain cases.

  6. Computer based aids for operator support in nuclear power plants

    International Nuclear Information System (INIS)

    1990-04-01

    In the framework of the Agency's programme on nuclear safety a survey was carried out based on a questionnaire to collect information on computer based aids for operator support in nuclear power plants in Member States. The intention was to put together a state-of-the-art report where different systems under development or already implemented would be described. This activity was also supported by an INSAG (International Nuclear Safety Advisory Group) recommendation. Two consultant's meetings were convened and their work is reflected in the two sections of the technical document. The first section, produced during the first meeting, is devoted to provide some general background material on the overall usability of Computerized Operator Decision Aids (CODAs), their advantages and shortcomings. During this first meeting, the first draft of the questionnaire was also produced. The second section presents the evaluation of the 40 questionnaires received from 11 Member States and comprises a short description of each system and some statistical and comparative observations. The ultimate goal of this activity was to inform Member States, particularly those who are considering implementation of a CODA, on the status of related developments elsewhere. 8 refs, 10 figs, 4 tabs

  7. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  8. Classification of Device Behaviour in Internet of Things Infrastructures: Towards Distinguishing the Abnormal From Security Threats

    OpenAIRE

    Ferrando, Roman; Stacey, Paul

    2017-01-01

    Increasingly, Internet of Things (IoT) devices are being woven into the fabric of our physical world. With this rapidly expanding pervasive deployment of IoT devices, and supporting infrastructure, we are fast approaching the point where the problem of IoT based cyber-security attacks is a serious threat to industrial operations, business activity and social interactions that leverage IoT technologies. The number of threats and successful attacks against connected systems using IoT devices an...

  9. Knowledge representation to support reasoning based on multiple models

    Science.gov (United States)

    Gillam, April; Seidel, Jorge P.; Parker, Alice C.

    1990-01-01

    Model Based Reasoning is a powerful tool used to design and analyze systems, which are often composed of numerous interactive, interrelated subsystems. Models of the subsystems are written independently and may be used together while they are still under development. Thus the models are not static. They evolve as information becomes obsolete, as improved artifact descriptions are developed, and as system capabilities change. Researchers are using three methods to support knowledge/data base growth, to track the model evolution, and to handle knowledge from diverse domains. First, the representation methodology is based on having pools, or types, of knowledge from which each model is constructed. In addition information is explicit. This includes the interactions between components, the description of the artifact structure, and the constraints and limitations of the models. The third principle we have followed is the separation of the data and knowledge from the inferencing and equation solving mechanisms. This methodology is used in two distinct knowledge-based systems: one for the design of space systems and another for the synthesis of VLSI circuits. It has facilitated the growth and evolution of our models, made accountability of results explicit, and provided credibility for the user community. These capabilities have been implemented and are being used in actual design projects.

  10. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  11. Decision Support System for Fighter Pilots

    DEFF Research Database (Denmark)

    Randleff, Lars Rosenberg

    2007-01-01

    During a mission over enemy territory a fighter aircraft may be engaged by ground based threats. The pilot can use different measures to avoid the aircraft from being detected by e.g. enemy radar systems. If the enemy detects the aircraft a missile may be fired to seek and destroy the aircraft...... and countermeasures that can be applied to mitigate threats. This work is concerned with finding proper evasive actions when a fighter aircraft is engaged by ground based threats. To help the pilot in deciding on these actions a decision support system may be implemented. The environment in which such a system must....... When new threats occur the decision support system must be able to provide suggestions within a fraction of a second. Since the time it takes to find an optimal solution to the mathematical model can not comply with this requirement solutions are sought using a metaheuristic....

  12. Information Warfare, Threats and Information Security

    Directory of Open Access Journals (Sweden)

    Dmitriy Nikolaevich Bespalov

    2014-01-01

    Full Text Available The article presents the opposite, but dependent on each other's reality - Revolutionary War information,information security goals and objectives of their study within the scheme "challenge-response", methodological and analytical support, the role of elites and the information society in promoting information security. One of the features of contemporaneityis the global spread of ICT, combined with poor governance and other difficulties in the construction of innovation infrastructures that are based on them in some countries. This leads to the reproduction of threats, primarily related to the ability to use ICT for purposes that are inconsistent with the objectives of maintaining international peace and security, compliance with the principles of non-use of force, non-interference in the internal affairs of states, etc. In this regard, include such terms as "a threat of information warfare", "information terrorism" and so forth. Information warfare, which stay in the policy declared the struggle for existence, and relationships are defined in terms of "friend-enemy", "ours-foreign". Superiority over the opponent or "capture of its territory" is the aim of political activity. And information security, serving activities similar process of political control, including a set of components, is a technology until their humanitarian. From the context and the decision itself is the ratio of the achieved results of information and political influence to the target - a positive image of Russia. Bringing its policy in line with the demands of a healthy public opinion provides conductivity of theauthorities initiatives in the country and increases the legitimacy of the Russian Federation actions in the world.

  13. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  14. Threats to international science

    Science.gov (United States)

    Kisslinger, Carl

    The role of nongovernmental organizations (NGOs) as effective agents for promoting world science is seriously threatened. It is ironic that the threat comes from Norway and Denmark, two countries that have demonstrated a deep commitment to individual freedom and human rights. Motivated by a sincere desire to express their strongest disapproval of the “apartheid” policies of the government of the Republic of South Africa, these countries have passed laws that have the effect of rejecting the International Council of Scientific Unions (ICSU) principles of nondiscrimination and free circulation of scientists.

  15. Concept of operator support system based on cognitive simulation

    International Nuclear Information System (INIS)

    Sasou, Kunihide; Takano, Kenichi

    1999-01-01

    Hazardous technologies such chemical plants, nuclear power plants, etc. have introduced multi-layered defenses to prevent accidents. One of those defenses is experienced operators in control rooms. Once an abnormal condition occurs, they are the front line people to cope with it. Therefore, operators' quick recognition of the plant conditions and fast decision making on responses are quite important for trouble shooting. In order to help operators to deal with abnormalities in process plants, lots of efforts had been done to develop operator support systems since early 1980s (IAEA, 1993). However, the boom in developing operator support systems has slumped due to the limitations of knowledge engineering, artificial knowledge, etc (Yamamoto, 1998). The limitations had also biased the focus of the system development to abnormality detection, root cause diagnosis, etc (Hajek, Hashemi, Sharma and Chandrasekaran, 1986). Information or guidance about future plant behavior and strategies/tactics to deal with abnormal events are important and helpful for operators but researches and development of those systems made a belated start. Before developing these kinds of system, it is essential to understand how operators deal with abnormalities. CRIEPI has been conducting a project to develop a computer system that simulates behavior of operators dealing with abnormal operating conditions in a nuclear power plant. This project had two stages. In the first stage, the authors developed a prototype system that simulates behavior of a team facing abnormal events in a very simplified power plant (Sasou, Takano and Yoshimura, 1995). In the second stage, the authors applied the simulation technique developed in the first stage to construct a system to simulate a team's behavior in a nuclear power plant. This paper briefly summarizes the simulation system developed in the second stage, main mechanism for the simulation and the concept of an operator support system based on this

  16. Product Quality Modelling Based on Incremental Support Vector Machine

    International Nuclear Information System (INIS)

    Wang, J; Zhang, W; Qin, B; Shi, W

    2012-01-01

    Incremental Support vector machine (ISVM) is a new learning method developed in recent years based on the foundations of statistical learning theory. It is suitable for the problem of sequentially arriving field data and has been widely used for product quality prediction and production process optimization. However, the traditional ISVM learning does not consider the quality of the incremental data which may contain noise and redundant data; it will affect the learning speed and accuracy to a great extent. In order to improve SVM training speed and accuracy, a modified incremental support vector machine (MISVM) is proposed in this paper. Firstly, the margin vectors are extracted according to the Karush-Kuhn-Tucker (KKT) condition; then the distance from the margin vectors to the final decision hyperplane is calculated to evaluate the importance of margin vectors, where the margin vectors are removed while their distance exceed the specified value; finally, the original SVs and remaining margin vectors are used to update the SVM. The proposed MISVM can not only eliminate the unimportant samples such as noise samples, but also can preserve the important samples. The MISVM has been experimented on two public data and one field data of zinc coating weight in strip hot-dip galvanizing, and the results shows that the proposed method can improve the prediction accuracy and the training speed effectively. Furthermore, it can provide the necessary decision supports and analysis tools for auto control of product quality, and also can extend to other process industries, such as chemical process and manufacturing process.

  17. CLIPS based decision support system for water distribution networks

    Directory of Open Access Journals (Sweden)

    K. Sandeep

    2011-10-01

    Full Text Available The difficulty in knowledge representation of a water distribution network (WDN problem has contributed to the limited use of artificial intelligence (AI based expert systems (ES in the management of these networks. This paper presents a design of a Decision Support System (DSS that facilitates "on-demand'' knowledge generation by utilizing results of simulation runs of a suitably calibrated and validated hydraulic model of an existing aged WDN corresponding to emergent or even hypothetical but likely scenarios. The DSS augments the capability of a conventional expert system by integrating together the hydraulic modelling features with heuristics based knowledge of experts under a common, rules based, expert shell named CLIPS (C Language Integrated Production System. In contrast to previous ES, the knowledge base of the DSS has been designed to be dynamic by superimposing CLIPS on Structured Query Language (SQL. The proposed ES has an inbuilt calibration module that enables calibration of an existing (aged WDN for the unknown, and unobservable, Hazen-Williams C-values. In addition, the daily run and simulation modules of the proposed ES further enable the CLIPS inference engine to evaluate the network performance for any emergent or suggested test scenarios. An additional feature of the proposed design is that the DSS integrates computational platforms such as MATLAB, open source Geographical Information System (GIS, and a relational database management system (RDBMS working under the umbrella of the Microsoft Visual Studio based common user interface. The paper also discusses implementation of the proposed framework on a case study and clearly demonstrates the utility of the application as an able aide for effective management of the study network.

  18. A supportive architecture for CFD-based design optimisation

    Science.gov (United States)

    Li, Ni; Su, Zeya; Bi, Zhuming; Tian, Chao; Ren, Zhiming; Gong, Guanghong

    2014-03-01

    Multi-disciplinary design optimisation (MDO) is one of critical methodologies to the implementation of enterprise systems (ES). MDO requiring the analysis of fluid dynamics raises a special challenge due to its extremely intensive computation. The rapid development of computational fluid dynamic (CFD) technique has caused a rise of its applications in various fields. Especially for the exterior designs of vehicles, CFD has become one of the three main design tools comparable to analytical approaches and wind tunnel experiments. CFD-based design optimisation is an effective way to achieve the desired performance under the given constraints. However, due to the complexity of CFD, integrating with CFD analysis in an intelligent optimisation algorithm is not straightforward. It is a challenge to solve a CFD-based design problem, which is usually with high dimensions, and multiple objectives and constraints. It is desirable to have an integrated architecture for CFD-based design optimisation. However, our review on existing works has found that very few researchers have studied on the assistive tools to facilitate CFD-based design optimisation. In the paper, a multi-layer architecture and a general procedure are proposed to integrate different CFD toolsets with intelligent optimisation algorithms, parallel computing technique and other techniques for efficient computation. In the proposed architecture, the integration is performed either at the code level or data level to fully utilise the capabilities of different assistive tools. Two intelligent algorithms are developed and embedded with parallel computing. These algorithms, together with the supportive architecture, lay a solid foundation for various applications of CFD-based design optimisation. To illustrate the effectiveness of the proposed architecture and algorithms, the case studies on aerodynamic shape design of a hypersonic cruising vehicle are provided, and the result has shown that the proposed architecture

  19. Development and verification of symptom based emergency procedure support system

    International Nuclear Information System (INIS)

    Saijou, Nobuyuki; Sakuma, Akira; Takizawa, Yoji; Tamagawa, Naoko; Kubota, Ryuji; Satou, Hiroyuki; Ikeda, Koji; Taminami, Tatsuya

    1998-01-01

    A Computerized Emergency Procedure Guideline (EPG) Support System has been developed for BWR and evaluated using training simulator. It aims to enhance the effective utilization of EPG. The system identifies suitable symptom-based operating procedures for present plant status automatically. It has two functions : one is plant status identification function, and the other is man-machine interface function. For the realization of the former function, a method which identifies and prioritize suitable symptom-based operational procedures against present plant status has been developed. As man-machine interface, operation flow chart display has been developed. It express the flow of the identified operating procedures graphically. For easy understanding of the display, important information such as plant status change, priority of operating procedures and completion/uncompletion of the operation is displayed on the operation flow display by different colors. As evaluation test, the response of the system to the design based accidents was evaluated by actual plant operators, using training simulator at BWR Training Center. Through the analysis of interviews and questionnaires to operators, it was shown that the system is effective and can be utilized for a real plant. (author)

  20. System of marketing deciding support based on game theory

    Directory of Open Access Journals (Sweden)

    Gordana Dukić

    2008-12-01

    Full Text Available Quantitative methods and models can be applied in numerous spheres of marketing deciding. The choice of optimal strategy in product advertising is one of the problems that the marketing-management often meets. The use of models developed within the framework of game theory makes significantly easier to find out the solutions of conflict situations that appear herewith. The system of deciding support presented in this work is based on the supposition that two opposed sides take part in the game. With the aim of deciding process promotion, the starting model incorporates computer simulation of percentile changes in the market share that represent elements of payment matrix. The supposition is that the random variables that represent them follow the normal division. It is necessary to carry out the evaluation of their parameters because of relevant data. Information techniques, computer and the adequate program applications take the special position in solving and analysis of the suggested model. This kind of their application represents the basic characteristic of the deciding support system.

  1. Attrition Resistant Fischer-Tropsch Catalysts Based on FCC Supports

    Energy Technology Data Exchange (ETDEWEB)

    Adeyiga, Adeyinka

    2010-02-05

    Commercial spent fluid catalytic cracking (FCC) catalysts provided by Engelhard and Albemarle were used as supports for Fe-based catalysts with the goal of improving the attrition resistance of typical F-T catalysts. Catalysts with the Ruhrchemie composition (100 Fe/5 Cu/4.2 K/25 spent FCC on mass basis) were prepared by wet impregnation. XRD and XANES analysis showed the presence of Fe{sub 2}O{sub 3} in calcined catalysts. FeC{sub x} and Fe{sub 3}O{sub 4} were present in the activated catalysts. The metal composition of the catalysts was analyzed by ICP-MS. F-T activity of the catalysts activated in situ in CO at the same conditions as used prior to the attrition tests was measured using a fixed bed reactor at T = 573 K, P = 1.38 MPa and H{sub 2}:CO ratio of 0.67. Cu and K promoted Fe supported over Engelhard provided spent FCC catalyst shows relatively good attrition resistance (8.2 wt% fines lost), high CO conversion (81%) and C{sub 5}+ hydrocarbons selectivity (18.3%).

  2. Image Jacobian Matrix Estimation Based on Online Support Vector Regression

    Directory of Open Access Journals (Sweden)

    Shangqin Mao

    2012-10-01

    Full Text Available Research into robotics visual servoing is an important area in the field of robotics. It has proven difficult to achieve successful results for machine vision and robotics in unstructured environments without using any a priori camera or kinematic models. In uncalibrated visual servoing, image Jacobian matrix estimation methods can be divided into two groups: the online method and the offline method. The offline method is not appropriate for most natural environments. The online method is robust but rough. Moreover, if the images feature configuration changes, it needs to restart the approximating procedure. A novel approach based on an online support vector regression (OL-SVR algorithm is proposed which overcomes the drawbacks and combines the virtues just mentioned.

  3. BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

    Directory of Open Access Journals (Sweden)

    V. Dheepa

    2012-07-01

    Full Text Available Along with the great increase of internet and e-commerce, the use of credit card is an unavoidable one. Due to the increase of credit card usage, the frauds associated with this have also increased. There are a lot of approaches used to detect the frauds. In this paper, behavior based classification approach using Support Vector Machines are employed and efficient feature extraction method also adopted. If any discrepancies occur in the behaviors transaction pattern then it is predicted as suspicious and taken for further consideration to find the frauds. Generally credit card fraud detection problem suffers from a large amount of data, which is rectified by the proposed method. Achieving finest accuracy, high fraud catching rate and low false alarms are the main tasks of this approach.

  4. Do Performance-Based Codes Support Universal Design in Architecture?

    DEFF Research Database (Denmark)

    Grangaard, Sidse; Frandsen, Anne Kathrine

    2016-01-01

    – Universal Design (UD). The empirical material consists of input from six workshops to which all 700 Danish Architectural firms were invited, as well as eight group interviews. The analysis shows that the current prescriptive requirements are criticized for being too homogenous and possibilities...... for differentiation and zoning are required. Therefore, a majority of professionals are interested in a performance-based model because they think that such a model will support ‘accessibility zoning’, achieving flexibility because of different levels of accessibility in a building due to its performance. The common...... of educational objectives is suggested as a tool for such a boost. The research project has been financed by the Danish Transport and Construction Agency....

  5. TENTube: A Video-based Connection Tool Supporting Competence Development

    Directory of Open Access Journals (Sweden)

    Albert A Angehrn

    2008-07-01

    Full Text Available The vast majority of knowledge management initiatives fail because they do not take sufficiently into account the emotional, psychological and social needs of individuals. Only if users see real value for themselves will they actively use and contribute their own knowledge to the system, and engage with other users. Connection dynamics can make this easier, and even enjoyable, by connecting people and bringing them closer through shared experiences such as playing a game together. A higher connectedness of people to other people, and to relevant knowledge assets, will motivate them to participate more actively and increase system usage. In this paper, we describe the design of TENTube, a video-based connection tool we are developing to support competence development. TENTube integrates rich profiling and network visualization and navigation with agent-enhanced game-like connection dynamics.

  6. Support vector machine based battery model for electric vehicles

    International Nuclear Information System (INIS)

    Wang Junping; Chen Quanshi; Cao Binggang

    2006-01-01

    The support vector machine (SVM) is a novel type of learning machine based on statistical learning theory that can map a nonlinear function successfully. As a battery is a nonlinear system, it is difficult to establish the relationship between the load voltage and the current under different temperatures and state of charge (SOC). The SVM is used to model the battery nonlinear dynamics in this paper. Tests are performed on an 80Ah Ni/MH battery pack with the Federal Urban Driving Schedule (FUDS) cycle to set up the SVM model. Compared with the Nernst and Shepherd combined model, the SVM model can simulate the battery dynamics better with small amounts of experimental data. The maximum relative error is 3.61%

  7. Modular Architecture for Integrated Model-Based Decision Support.

    Science.gov (United States)

    Gaebel, Jan; Schreiber, Erik; Oeser, Alexander; Oeltze-Jafra, Steffen

    2018-01-01

    Model-based decision support systems promise to be a valuable addition to oncological treatments and the implementation of personalized therapies. For the integration and sharing of decision models, the involved systems must be able to communicate with each other. In this paper, we propose a modularized architecture of dedicated systems for the integration of probabilistic decision models into existing hospital environments. These systems interconnect via web services and provide model sharing and processing capabilities for clinical information systems. Along the lines of IHE integration profiles from other disciplines and the meaningful reuse of routinely recorded patient data, our approach aims for the seamless integration of decision models into hospital infrastructure and the physicians' daily work.

  8. Explaining Support Vector Machines: A Color Based Nomogram.

    Directory of Open Access Journals (Sweden)

    Vanya Van Belle

    Full Text Available Support vector machines (SVMs are very popular tools for classification, regression and other problems. Due to the large choice of kernels they can be applied with, a large variety of data can be analysed using these tools. Machine learning thanks its popularity to the good performance of the resulting models. However, interpreting the models is far from obvious, especially when non-linear kernels are used. Hence, the methods are used as black boxes. As a consequence, the use of SVMs is less supported in areas where interpretability is important and where people are held responsible for the decisions made by models.In this work, we investigate whether SVMs using linear, polynomial and RBF kernels can be explained such that interpretations for model-based decisions can be provided. We further indicate when SVMs can be explained and in which situations interpretation of SVMs is (hitherto not possible. Here, explainability is defined as the ability to produce the final decision based on a sum of contributions which depend on one single or at most two input variables.Our experiments on simulated and real-life data show that explainability of an SVM depends on the chosen parameter values (degree of polynomial kernel, width of RBF kernel and regularization constant. When several combinations of parameter values yield the same cross-validation performance, combinations with a lower polynomial degree or a larger kernel width have a higher chance of being explainable.This work summarizes SVM classifiers obtained with linear, polynomial and RBF kernels in a single plot. Linear and polynomial kernels up to the second degree are represented exactly. For other kernels an indication of the reliability of the approximation is presented. The complete methodology is available as an R package and two apps and a movie are provided to illustrate the possibilities offered by the method.

  9. Streaming support for data intensive cloud-based sequence analysis.

    Science.gov (United States)

    Issa, Shadi A; Kienzler, Romeo; El-Kalioby, Mohamed; Tonellato, Peter J; Wall, Dennis; Bruggmann, Rémy; Abouelhoda, Mohamed

    2013-01-01

    Cloud computing provides a promising solution to the genomics data deluge problem resulting from the advent of next-generation sequencing (NGS) technology. Based on the concepts of "resources-on-demand" and "pay-as-you-go", scientists with no or limited infrastructure can have access to scalable and cost-effective computational resources. However, the large size of NGS data causes a significant data transfer latency from the client's site to the cloud, which presents a bottleneck for using cloud computing services. In this paper, we provide a streaming-based scheme to overcome this problem, where the NGS data is processed while being transferred to the cloud. Our scheme targets the wide class of NGS data analysis tasks, where the NGS sequences can be processed independently from one another. We also provide the elastream package that supports the use of this scheme with individual analysis programs or with workflow systems. Experiments presented in this paper show that our solution mitigates the effect of data transfer latency and saves both time and cost of computation.

  10. Streaming Support for Data Intensive Cloud-Based Sequence Analysis

    Directory of Open Access Journals (Sweden)

    Shadi A. Issa

    2013-01-01

    Full Text Available Cloud computing provides a promising solution to the genomics data deluge problem resulting from the advent of next-generation sequencing (NGS technology. Based on the concepts of “resources-on-demand” and “pay-as-you-go”, scientists with no or limited infrastructure can have access to scalable and cost-effective computational resources. However, the large size of NGS data causes a significant data transfer latency from the client’s site to the cloud, which presents a bottleneck for using cloud computing services. In this paper, we provide a streaming-based scheme to overcome this problem, where the NGS data is processed while being transferred to the cloud. Our scheme targets the wide class of NGS data analysis tasks, where the NGS sequences can be processed independently from one another. We also provide the elastream package that supports the use of this scheme with individual analysis programs or with workflow systems. Experiments presented in this paper show that our solution mitigates the effect of data transfer latency and saves both time and cost of computation.

  11. A support vector machine (SVM) based voltage stability classifier

    Energy Technology Data Exchange (ETDEWEB)

    Dosano, R.D.; Song, H. [Kunsan National Univ., Kunsan, Jeonbuk (Korea, Republic of); Lee, B. [Korea Univ., Seoul (Korea, Republic of)

    2007-07-01

    Power system stability has become even more complex and critical with the advent of deregulated energy markets and the growing desire to completely employ existing transmission and infrastructure. The economic pressure on electricity markets forces the operation of power systems and components to their limit of capacity and performance. System conditions can be more exposed to instability due to greater uncertainty in day to day system operations and increase in the number of potential components for system disturbances potentially resulting in voltage stability. This paper proposed a support vector machine (SVM) based power system voltage stability classifier using local measurements of voltage and active power of load. It described the procedure for fast classification of long-term voltage stability using the SVM algorithm. The application of the SVM based voltage stability classifier was presented with reference to the choice of input parameters; input data preconditioning; moving window for feature vector; determination of learning samples; and other considerations in SVM applications. The paper presented a case study with numerical examples of an 11-bus test system. The test results for the feasibility study demonstrated that the classifier could offer an excellent performance in classification with time-series measurements in terms of long-term voltage stability. 9 refs., 14 figs.

  12. Environmental noise forecasting based on support vector machine

    Science.gov (United States)

    Fu, Yumei; Zan, Xinwu; Chen, Tianyi; Xiang, Shihan

    2018-01-01

    As an important pollution source, the noise pollution is always the researcher's focus. Especially in recent years, the noise pollution is seriously harmful to the human beings' environment, so the research about the noise pollution is a very hot spot. Some noise monitoring technologies and monitoring systems are applied in the environmental noise test, measurement and evaluation. But, the research about the environmental noise forecasting is weak. In this paper, a real-time environmental noise monitoring system is introduced briefly. This monitoring system is working in Mianyang City, Sichuan Province. It is monitoring and collecting the environmental noise about more than 20 enterprises in this district. Based on the large amount of noise data, the noise forecasting by the Support Vector Machine (SVM) is studied in detail. Compared with the time series forecasting model and the artificial neural network forecasting model, the SVM forecasting model has some advantages such as the smaller data size, the higher precision and stability. The noise forecasting results based on the SVM can provide the important and accuracy reference to the prevention and control of the environmental noise.

  13. Streaming Support for Data Intensive Cloud-Based Sequence Analysis

    Science.gov (United States)

    Issa, Shadi A.; Kienzler, Romeo; El-Kalioby, Mohamed; Tonellato, Peter J.; Wall, Dennis; Bruggmann, Rémy; Abouelhoda, Mohamed

    2013-01-01

    Cloud computing provides a promising solution to the genomics data deluge problem resulting from the advent of next-generation sequencing (NGS) technology. Based on the concepts of “resources-on-demand” and “pay-as-you-go”, scientists with no or limited infrastructure can have access to scalable and cost-effective computational resources. However, the large size of NGS data causes a significant data transfer latency from the client's site to the cloud, which presents a bottleneck for using cloud computing services. In this paper, we provide a streaming-based scheme to overcome this problem, where the NGS data is processed while being transferred to the cloud. Our scheme targets the wide class of NGS data analysis tasks, where the NGS sequences can be processed independently from one another. We also provide the elastream package that supports the use of this scheme with individual analysis programs or with workflow systems. Experiments presented in this paper show that our solution mitigates the effect of data transfer latency and saves both time and cost of computation. PMID:23710461

  14. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  15. Community-Based Child-Rearing Support for Families : Based on an Investigation in Sapporo, Japan

    OpenAIRE

    Kudo, Haruka

    2017-01-01

    Against the backdrop of a high proportion of mothers who take care of their children at home and the problem of child-rearing anxiety and social isolation among them, the Japanese government has currently expanded child-rearing support via the Community-based Child-rearing Support Centers (CCSCs). They are open spaces for infants and parents in the community, where they can gather freely, communicate with each other, and share their anxieties and worries related to child rearing. ...

  16. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  17. Use of web based systems to support postgraduate medical education.

    Science.gov (United States)

    Tochel, C; Beggs, K; Haig, A; Roberts, J; Scott, H; Walker, K; Watson, M

    2011-12-01

    BACKGROUND To meet the demands of delivering the Foundation programme across a geographically diverse country, two web based systems (ePortfolio and eLearning) were developed to promote accessibility to training material and assessment tools on standardised platforms. This study evaluated the use of both tools throughout an entire academic year. METHODS All Scottish Foundation trainees' online learning and assessment data in 2007/08 were analysed, providing a national breakdown of post specialty, completion rates of mandatory assessments (including summary analysis of anonymised scores), and trainees' use of non-mandatory learning tools. Independent verification of competence data was sought from Deaneries. RESULTS There were high levels of engagement with both the ePortfolio (75-97% assessment completion) and eLearning systems (89-98% induction course completion), and the majority of trainees completed all required elements. There was extensive use of ePortfolio beyond mandatory levels for recording of learning events, including almost 20 000 personal learning records submitted by second year trainees. There was evidence that ePortfolio was used to record achievement of clinical competence rather than to track improvements towards competence (median workplace based assessment scores were 'high' or 'very high'). Online learning modules received positive feedback and its flexible format suited the trainees' working environment. External verification of formal assessment data revealed good correlation with locally stored outcomes, both indicating approximately 99% programme completion rates. CONCLUSIONS Core components of the Foundation programme have been delivered successfully to thousands of trainees across Scotland using web based systems to deliver and support education and assessment. There is great potential for further exploration of this carefully managed, rich dataset at individual, regional, and national levels to inform the future of medical education.

  18. Noninvasive extraction of fetal electrocardiogram based on Support Vector Machine

    Science.gov (United States)

    Fu, Yumei; Xiang, Shihan; Chen, Tianyi; Zhou, Ping; Huang, Weiyan

    2015-10-01

    The fetal electrocardiogram (FECG) signal has important clinical value for diagnosing the fetal heart diseases and choosing suitable therapeutics schemes to doctors. So, the noninvasive extraction of FECG from electrocardiogram (ECG) signals becomes a hot research point. A new method, the Support Vector Machine (SVM) is utilized for the extraction of FECG with limited size of data. Firstly, the theory of the SVM and the principle of the extraction based on the SVM are studied. Secondly, the transformation of maternal electrocardiogram (MECG) component in abdominal composite signal is verified to be nonlinear and fitted with the SVM. Then, the SVM is trained, and the training results are compared with the real data to ensure the effect of the training. Meanwhile, the parameters of the SVM are optimized to achieve the best performance so that the learning machine can be utilized to fit the unknown samples. Finally, the FECG is extracted by removing the optimal estimation of MECG component from the abdominal composite signal. In order to evaluate the performance of FECG extraction based on the SVM, the Signal-to-Noise Ratio (SNR) and the visual test are used. The experimental results show that the FECG with good quality can be extracted, its SNR ratio is significantly increased as high as 9.2349 dB and the time cost is significantly decreased as short as 0.802 seconds. Compared with the traditional method, the noninvasive extraction method based on the SVM has a simple realization, the shorter treatment time and the better extraction quality under the same conditions.

  19. Contraband and threat material detection

    International Nuclear Information System (INIS)

    Lowrey, J. D.; Dunn, W.L.

    2008-01-01

    Full text: A pressing threat in modern society is the effective use of improvised explosive devices or IED's. One of the commonly used techniques to detect explosives is radiography. A primary drawback of this method is that humans are required in order to examine the image of each target. This requires trained personnel, who are subject to fatigue if many targets are being examined in rapid succession. Other trace element techniques generally require collection of samples from or near the surface of suspect targets. The signature-based radiation scanning (SBRS) technology has been developed to counter this threat. This technology can result in automated systems, requiring minimal operator involvement, that can rapidly identify IEDs from standoff. Preliminary research indicates that explosive samples of 5-10 kg or greater hidden in various targets can be detected from standoffs of more than a meter, with high sensitivity and high specificity. Many common explosives have similar concentrations of hydrogen, carbon, nitrogen and oxygen (HCNO). As neutrons interact with HCNO materials, unique signatures are created based on the specific composition of the material. We collect signatures from the HCNO prompt and inelastically scattered gamma rays and from scattered neutrons. Two neutron detectors (one bare and one cadmium-covered) are used in order to provide some measure of the back-scattered neutron spectrum. A library of signature templates, based on signatures detected from known targets containing known explosives in various configurations, is created. Similar signatures can be collected for suspect targets. Then a template-matching technique is used to construct two figure-of-merit metrics. The values of these metrics can be used to differentiate between safe targets and IEDs. Laboratory tests have been conducted using a high purity Germanium (HPGe) detector and two europium-doped lithium-iodide neutron detectors (one bare and one covered with cadmium) are used to

  20. A Boosting Algorithm Based Method to Predict Cyber-Threats Situation of Power Information Network%采用Boosting方法预测电力信息网络的威胁态势

    Institute of Scientific and Technical Information of China (English)

    徐茹枝; 王婧; 朱少敏; 许瑞辉

    2013-01-01

    The prediction of cyber-threats situation can effectively reflect the macroscopic security situation of power information network in the future time. To realize the accurate prediction of cyber-threats situation, an AdaBoosting algorithm based cyber-threats situation prediction method for information network is proposed. In the proposed method, the values of cyber-threats situation are used to describe the macroscopic security situation of power information network, and the prediction of macroscopic security situation is abstracted to a regression problem, and then the regression problem is solved by AdaBoosting algorithm. Firstly, using the sliding time window a time series sample set is constructed by cyber-threats situation values;then the sample set is input into AdaBoosting algorithm to be trained to obtain a regression analysis model;finally the prediction of cyber-threats situation is completed by the regression analysis model. Finally, the effectiveness of the proposed method is verified by results of replication experiments based on field data.%威胁态势预测可以有效反映电力信息网络在未来时刻的宏观安全状况。为实现威胁态势的精确预测,提出一种基于AdaBoosting方法的网络威胁态势预测方法。该方法采用威胁态势值描述电力信息网络的宏观安全态势,并将威胁态势值的预测抽象为回归问题,进而利用AdaBoosting方法求解。该方法先利用滑动时间窗口将威胁态势值构造成时间序列样本集,再将样本集输入到AdaBoosting方法中训练,以得到回归分析模型,并利用该模型完成威胁态势预测。最后基于现场数据的验证性实验证明了所提方法的有效性。

  1. School-Based Supported Employment: A Comprehensive Supported Employment Program for Mildly Mentally Retarded Youth.

    Science.gov (United States)

    Morgan, Valda B.; Karr-Kidwell, PJ

    Supported employment opportunities can help to meet the transition needs of individuals enrolled in special education programs. A review of related literature discusses characteristics of supported employment program participants, the need for individual transition planning, the school's role and responsibility, vocational planning, benefits,…

  2. Threats, protests greet conference.

    Science.gov (United States)

    Struck, D

    1994-09-04

    In preparation for the 1994 International Conference on Population and Development, Egypt has deployed 14,000 police to protect participants from threatened violence. The Vatican has joined forces with Muslim fundamentalists to condemn the conference as a vehicle for imposing Western ideals, particularly abortion, on Third world countries. In addition, the opposition is raising the specter of a descent of homosexuals onto Cairo and Muslim fundamentalists have threatened to murder Western representatives. A suit filed by Islamic lawyers, aimed at stopping the conference, failed. Sudan and Saudi Arabia plan to boycott the conference, and it remains uncertain whether Libya will be represented. Conference organizers have not been deterred by the threats and note that the controversy has drawn public attention to the central issues under debate.

  3. Nuclear Threats and Security

    Directory of Open Access Journals (Sweden)

    Garry Jacobs

    2012-10-01

    Full Text Available This article presents highlights and insights from the International Conference on “Nuclear Threats and Security” organized by the World Academy of Art and Science in association with the European Leadership Network and the Dag Hammarskjöld University College of International Relations and Diplomacy and sponsored by NATO at the Inter-University Centre, Dubrovnik on September 14-16, 2012. The conference examined important issues related to nuclear non-proliferation and disarmament, the legality of nuclear weapons and their use, illicit trade in nuclear materials, the dangers of nuclear terrorism, nuclear- and cyber-security. Papers and video recordings of the major presentations and session summaries can be found here.

  4. Gauging U.S. Emergency Medical Services workers' willingness to respond to pandemic influenza using a threat- and efficacy-based assessment framework.

    Directory of Open Access Journals (Sweden)

    Daniel J Barnett

    2010-03-01

    Full Text Available Emergency Medical Services workers' willingness to report to duty in an influenza pandemic is essential to healthcare system surge amidst a global threat. Application of Witte's Extended Parallel Process Model (EPPM has shown utility for revealing influences of perceived threat and efficacy on non-EMS public health providers' willingness to respond in an influenza pandemic. We thus propose using an EPPM-informed assessment of EMS workers' perspectives toward fulfilling their influenza pandemic response roles.We administered an EPPM-informed snapshot survey about attitudes and beliefs toward pandemic influenza response, to a nationally representative, stratified random sample of 1,537 U.S. EMS workers from May-June 2009 (overall response rate: 49%. Of the 586 respondents who met inclusion criteria (currently active EMS providers in primarily EMS response roles, 12% indicated they would not voluntarily report to duty in a pandemic influenza emergency if asked, 7% if required. A majority (52% indicated their unwillingness to report to work if risk of disease transmission to family existed. Confidence in personal safety at work (OR = 3.3 and a high threat/high efficacy ("concerned and confident" EPPM profile (OR = 4.7 distinguished those who were more likely to voluntarily report to duty. Although 96% of EMS workers indicated that they would probably or definitely report to work if they were guaranteed a pandemic influenza vaccine, only 59% had received an influenza immunization in the preceding 12 months.EMS workers' response willingness gaps pose a substantial challenge to prehospital surge capacity in an influenza pandemic. "Concerned and confident" EMS workers are more than four times as likely to fulfill pandemic influenza response expectations. Confidence in workplace safety is a positively influential modifier of their response willingness. These findings can inform insights into interventions for enhancing EMS workers' willingness to respond

  5. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  6. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  7. Technology Support for Discussion Based Learning: From Computer Supported Collaborative Learning to the Future of Massive Open Online Courses

    Science.gov (United States)

    Rosé, Carolyn Penstein; Ferschke, Oliver

    2016-01-01

    This article offers a vision for technology supported collaborative and discussion-based learning at scale. It begins with historical work in the area of tutorial dialogue systems. It traces the history of that area of the field of Artificial Intelligence in Education as it has made an impact on the field of Computer-Supported Collaborative…

  8. 24 CFR 9.131 - Direct threat.

    Science.gov (United States)

    2010-04-01

    ... health or safety of others. (b) “Direct threat” means a significant risk to the health or safety of... provision of auxiliary aids or services. (c) In determining whether an individual poses a direct threat to the health or safety of others, the agency must make an individualized assessment, based on reasonable...

  9. DNS Tunneling Detection Method Based on Multilabel Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Ahmed Almusawi

    2018-01-01

    Full Text Available DNS tunneling is a method used by malicious users who intend to bypass the firewall to send or receive commands and data. This has a significant impact on revealing or releasing classified information. Several researchers have examined the use of machine learning in terms of detecting DNS tunneling. However, these studies have treated the problem of DNS tunneling as a binary classification where the class label is either legitimate or tunnel. In fact, there are different types of DNS tunneling such as FTP-DNS tunneling, HTTP-DNS tunneling, HTTPS-DNS tunneling, and POP3-DNS tunneling. Therefore, there is a vital demand to not only detect the DNS tunneling but rather classify such tunnel. This study aims to propose a multilabel support vector machine in order to detect and classify the DNS tunneling. The proposed method has been evaluated using a benchmark dataset that contains numerous DNS queries and is compared with a multilabel Bayesian classifier based on the number of corrected classified DNS tunneling instances. Experimental results demonstrate the efficacy of the proposed SVM classification method by obtaining an f-measure of 0.80.

  10. Integrated environmental decision support tool based on GIS technology

    International Nuclear Information System (INIS)

    Doctor, P.G.; O'Neil, T.K.; Sackschewsky, M.R.; Becker, J.M.; Rykiel, E.J.; Walters, T.B.; Brandt, C.A.; Hall, J.A.

    1995-01-01

    Environmental restoration and management decisions facing the US Department of Energy require balancing trade-offs between diverse land uses and impacts over multiple spatial and temporal scales. Many types of environmental data have been collected for the Hanford Site and the Columbia River in Washington State over the past fifty years. Pacific Northwest National Laboratory (PNNL) is integrating these data into a Geographic Information System (GIS) based computer decision support tool. This tool provides a comprehensive and concise description of the current environmental landscape that can be used to evaluate the ecological and monetary trade-offs between future land use, restoration and remediation options before action is taken. Ecological impacts evaluated include effects to individual species of concern and habitat loss and fragmentation. Monetary impacts include those associated with habitat mitigation. The tool is organized as both a browsing tool for educational purposes, and as a framework that leads a project manager through the steps needed to be in compliance with environmental requirements

  11. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  12. Supporting Implementation of Evidence-Based Practices through Practice-Based Coaching

    Science.gov (United States)

    Snyder, Patricia A.; Hemmeter, Mary Louise; Fox, Lise

    2015-01-01

    In active implementation science frameworks, coaching has been described as an important competency "driver" to ensure evidence-based practices are implemented as intended. Empirical evidence also has identified coaching as a promising job-embedded professional development strategy to support implementation of quality teaching practices.…

  13. Designing Pd-based supported bimetallic catalysts for environmental applications

    OpenAIRE

    Nowicka, Ewa; Meenakshisundaram, Sankar

    2018-01-01

    Supported bimetallic nanoparticulate catalysts are an important class of heterogeneous catalysts for many reactions including selective oxidation, hydrogenation/hydrogenolysis, reforming, biomass conversion reactions, and many more. The activity, selectivity, and stability of these catalysts depend on their structural features including particle size, composition, and morphology. In this review, we present important structural features relevant to supported bimetallic catalysts focusing on Pd...

  14. Fast Grid Frequency Support from Distributed Inverter-Based Resources

    Energy Technology Data Exchange (ETDEWEB)

    Hoke, Anderson F [National Renewable Energy Laboratory (NREL), Golden, CO (United States)

    2018-05-04

    This presentation summarizes power hardware-in-the-loop testing performed to evaluate the ability of distributed inverter-coupled generation to support grid frequency on the fastest time scales. The research found that distributed PV inverters and other DERs can effectively support the grid on sub-second time scales.

  15. Threat Detection in Tweets with Trigger Patterns and Contextual Cues

    NARCIS (Netherlands)

    Spitters, M.M.; Eendebak, P.T.; Worm, D.T.H.; Bouma, H.

    2014-01-01

    Many threats in the real world can be related to activities in open sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming

  16. Security Evaluation of the Cyber Networks under Advanced Persistent Threats

    NARCIS (Netherlands)

    Yang, L.; Li, Pengdeng; Yang, Xiaofan; Tang, Yuan Yan

    2017-01-01

    Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based

  17. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  18. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  19. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  20. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  1. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  2. Reasoning-Supported Quality Assurance for Knowledge Bases

    OpenAIRE

    Nikitina, Nadeschda

    2012-01-01

    The increasing application of ontology reuse and automated knowledge acquisition tools in ontology engineering brings about a shift of development efforts from knowledge modeling towards quality assurance. Despite the high practical importance, there has been a substantial lack of support for ensuring semantic accuracy and conciseness. In this thesis, we make a significant step forward in ontology engineering by developing a support for two such essential quality assurance activities.

  3. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  4. In Brief: Forecasting meningitis threats

    Science.gov (United States)

    Showstack, Randy

    2008-12-01

    The University Corporation for Atmospheric Research (UCAR), in conjunction with a team of health and weather organizations, has launched a project to provide weather forecasts to medical officials in Africa to help reduce outbreaks of meningitis. The forecasts will enable local health care providers to target vaccination programs more effectively. In 2009, meteorologists with the National Center for Atmospheric Research, which is managed by UCAR, will begin issuing 14-day forecasts of atmospheric conditions in Ghana. Later, UCAR plans to work closely with health experts from several African countries to design and test a decision support system to provide health officials with useful meteorological information. ``By targeting forecasts in regions where meningitis is a threat, we may be able to help vulnerable populations. Ultimately, we hope to build on this project and provide information to public health programs battling weather-related diseases in other parts of the world,'' said Rajul Pandya, director of UCAR's Community Building Program. Funding for the project comes from a $900,000 grant from Google.org, the philanthropic arm of the Internet search company.

  5. An Experiment Support Computer for Externally-Based ISS Payloads

    Science.gov (United States)

    Sell, S. W.; Chen, S. E.

    2002-01-01

    The Experiment Support Facility - External (ESF-X) is a computer designed for general experiment use aboard the International Space Station (ISS) Truss Site locations. The ESF-X design is highly modular and uses commercial off-the-shelf (COTS) components wherever possible to allow for maximum reconfigurability to meet the needs of almost any payload. The ESF-X design has been developed with the EXPRESS Pallet as the target location and the University of Colorado's Micron Accuracy Deployment Experiment (MADE) as the anticipated first payload and capability driver. Thus the design presented here is configured for structural dynamics and control as well as optics experiments. The ESF-X is a small (58.4 x 48.3 x 17.8") steel and copper enclosure which houses a 14 slot VME card chassis and power supply. All power and data connections are made through a single panel on the enclosure so that only one side of the enclosure must be accessed for nominal operation and servicing activities. This feature also allows convenient access during integration and checkout activities. Because it utilizes a standard VME backplane, ESF-X can make use of the many commercial boards already in production for this standard. Since the VME standard is also heavily used in industrial and military applications, many ruggedized components are readily available. The baseline design includes commercial processors, Ethernet, MIL-STD-1553, and mass storage devices. The main processor board contains four TI 6701 DSPs with a PowerPC based controller. Other standard functions, such as analog-to-digital, digital-to-analog, motor driver, temperature readings, etc., are handled on industry-standard IP modules. Carrier cards, which hold 4 IP modules each, are placed in slots in the VME backplane. A unique, custom IP carrier board with radiation event detectors allows non RAD-hard components to be used in an extended exposure environment. Thermal control is maintained by conductive cooling through the copper

  6. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  7. Web-Based Group Decision Support System: an Economic Application

    Directory of Open Access Journals (Sweden)

    Ion ISTUDOR

    2010-01-01

    Full Text Available Decision Support Systems (DSS form a specific class of computerized information systems that support business and managerial decision-making activities. Making the right decision in business primarily depends on the quality of data. It also depends on the ability to analyze the data with a view to identifying trends that can suggest solutions and strategies. A “cooperative” decision support system means the data are collected, analyzed and then provided to a human agent who can help the system to revise or refine the data. It means that both a human component and computer component work together to come up with the best solution. This paper describes the usage of a software product (Vanguard System to a specific economic application (evaluating the financial risk assuming that the rate of the economic profitability can be under the value of the interest rate.

  8. Church-Based Social Support Among Caribbean Blacks in the United States

    Science.gov (United States)

    Nguyen, Ann W.; Taylor, Robert Joseph; Chatters, Linda M.

    2016-01-01

    An emerging body of research notes the importance of church-based social support networks in the daily lives of Americans. However, few studies examine church-based support, and especially among ethnic subgroups within the U.S. Black population, such as Caribbean Blacks. This study uses data from the National Survey of American Life (NSAL) to examine demographic and religious participation (e.g., attendance, interaction) correlates of church-based social support (e.g., receipt of emotional support, receipt of general support, provision of support to others, and negative interaction) among Caribbean Blacks residing in the U.S. Multiple regression analyses indicated that religious participation was associated with all four dependent variables. Church attendance was positively associated with receiving emotional support, general social support, and providing support to others, but was not associated with negative interaction. Frequency of interaction with fellow congregants was positively associated with receiving emotional support, receiving general support, providing support to others and negative interaction. Demographic findings indicated that women provided more support to church members and experienced more negative interactions with members than did men. Education was positively associated with frequency of support; household income was negatively associated with receiving emotional support and providing social support to others. Findings are discussed in relation to the role of church-based support networks in the lives of Caribbean Black immigrants and communities. PMID:27942078

  9. A task-based support architecture for developing point-of-care clinical decision support systems for the emergency department.

    Science.gov (United States)

    Wilk, S; Michalowski, W; O'Sullivan, D; Farion, K; Sayyad-Shirabad, J; Kuziemsky, C; Kukawka, B

    2013-01-01

    The purpose of this study was to create a task-based support architecture for developing clinical decision support systems (CDSSs) that assist physicians in making decisions at the point-of-care in the emergency department (ED). The backbone of the proposed architecture was established by a task-based emergency workflow model for a patient-physician encounter. The architecture was designed according to an agent-oriented paradigm. Specifically, we used the O-MaSE (Organization-based Multi-agent System Engineering) method that allows for iterative translation of functional requirements into architectural components (e.g., agents). The agent-oriented paradigm was extended with ontology-driven design to implement ontological models representing knowledge required by specific agents to operate. The task-based architecture allows for the creation of a CDSS that is aligned with the task-based emergency workflow model. It facilitates decoupling of executable components (agents) from embedded domain knowledge (ontological models), thus supporting their interoperability, sharing, and reuse. The generic architecture was implemented as a pilot system, MET3-AE--a CDSS to help with the management of pediatric asthma exacerbation in the ED. The system was evaluated in a hospital ED. The architecture allows for the creation of a CDSS that integrates support for all tasks from the task-based emergency workflow model, and interacts with hospital information systems. Proposed architecture also allows for reusing and sharing system components and knowledge across disease-specific CDSSs.

  10. A Textual Case-Based Mobile Phone Diagnosis Support System ...

    African Journals Online (AJOL)

    In this paper, a Mobile Phone Diagnosis Support System is presented as an extension to jCOLIBRI which accepts a problem and reasons with cases to provide a solution related to a new given problem. Experimental evaluation using some set of problems shows that the developed system predicts the solution that is ...

  11. Market-based support schemes for renewable energy sources

    NARCIS (Netherlands)

    Fagiani, R.

    2014-01-01

    The European Union set ambitious goals regarding the production of electricity from renewable energy sources and the majority of European governments have implemented policies stimulating investments in such technologies. Support schemes differ in many aspects, not only in their effectivity and

  12. Game-based versus storyboard-based evaluations of crew support prototypes for long duration missions

    Science.gov (United States)

    Smets, N. J. J. M.; Abbing, M. S.; Neerincx, M. A.; Lindenberg, J.; van Oostendorp, H.

    2010-03-01

    The Mission Execution Crew Assistant (MECA) is developing a distributed system of electronic partners (ePartners) to support astronauts performing nominal and off- nominal actions in long duration missions. The ePartners' support should adequately deal with the dynamics of the context, operations, team and personal conditions, which will change over time substantially. Such support—with the concerning context effects—should be thoroughly tested in all stages of the development process. A major question is how to address the context effects of in-space operations for evaluations of crew support prototypes. Via game-technology, the prototype can be tested with astronauts or their representatives, immersed in the envisioned, simulated context. We investigated if a game-based evaluation better addresses the context effects by producing a more elaborate, in-depth and realistic user experience than a "classical" storyboard-based evaluation. In the game-based evaluation, the participants showed higher arousal levels where expected, a more intense feeling of spatial presence, better situation awareness, and faster performance where needed. Such an evaluation can be used as an alternative or complement of field or micro-world tests when context dynamics cannot be simulated in these last tests cost-efficiently.

  13. Unmet Supportive Care Needs among Breast Cancer Survivors of Community-Based Support Group in Kuching, Sarawak

    Directory of Open Access Journals (Sweden)

    Emmanuel Joseph Fong

    2016-01-01

    Full Text Available Background. Recognizing the needs of cancer survivors is one of the important aspects in healthcare delivery. This study aimed to determine the prevalence of unmet supportive care needs and its associated factors among the breast cancer survivors of community-based support group in Kuching, Sarawak. Materials and Methods. This was a cross-sectional study using Supportive Care Needs Survey (SCNS-SF34. All the members of community-based breast cancer support groups in Kuching were invited. A total of 101 respondents were face-to-face interviewed after the consent was obtained. Data was entered and analyzed using SPSS version 20. Results. The respondents endorsed health system and information domain with the highest mean score (2.48; 95% CI: 2.32–2.64. Top 10 items with “moderate to high” level unmet needs had a prevalence of 14.9% to 34.7% of respondents indicating need. Significantly higher level of unmet needs was associated with survivors who were younger (less than 60 years old, had higher education attainment, were unemployed, had survival duration of up to 5 years, and were undergoing active treatment. Conclusion. Systematic delivery of health information which is targeted, culturally sensitive, and linguistically appropriate for addressing younger age, education level, employment status, length of survivorship, and treatment stage should be considered not only at hospital-based setting but also at the community-based support groups.

  14. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers.

    Science.gov (United States)

    Carey, Rachel N; Sarma, Kiran M

    2016-07-27

    Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These 'threat appeals' feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62) examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81) investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Findings suggest that threat-based road safety communications that target affective (fear) and cognitive (perceived efficacy) mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  15. Threat appeals in health communication: messages that elicit fear and enhance perceived efficacy positively impact on young male drivers

    Directory of Open Access Journals (Sweden)

    Rachel N. Carey

    2016-07-01

    Full Text Available Abstract Background Health communications often present graphic, threat-based representations of the potential consequences of health-risk behaviours. These ‘threat appeals’ feature prominently in public health campaigns, but their use is controversial, with studies investigating their efficacy reporting inconsistent, and often negative, findings. This research examined the impact of a threat-based road safety advertisement on the driving behaviour of young male drivers. Methods To address limitations of previous research, we first identified a road safety advertisement that objectively and subjectively elicited fear using physiological and subjective measures. Study 1 (n = 62 examined the effect of this advertisement, combined with a manipulation designed to increase perceived efficacy, on speed choice. Study 2 (n = 81 investigated whether a state emotion, anger, impacts on the effectiveness of the advertisement in changing four distinct driving behaviours. Both studies examined short-term effects only. Results Study 1 findings indicated that a high threat message, when combined with high perceived efficacy, can lead to a decrease in speed choice. Study 2 results suggested that increased levels of state anger may counteract the potential value of combining fear-arousing threats and efficacy-building messages. Conclusions Findings suggest that threat-based road safety communications that target affective (fear and cognitive (perceived efficacy mechanisms can positively affect driving behaviours. State emotions, such as anger, may negatively impact on the effectiveness of the message. Taken together, these findings provide additional support for the use of efficacy-building messages in threat-based communications, but highlight the need for further research into the complex array of affective influences on driving.

  16. Support Vector Machine Based Tool for Plant Species Taxonomic Classification

    OpenAIRE

    Manimekalai .K; Vijaya.MS

    2014-01-01

    Plant species are living things and are generally categorized in terms of Domain, Kingdom, Phylum, Class, Order, Family, Genus and name of Species in a hierarchical fashion. This paper formulates the taxonomic leaf categorization problem as the hierarchical classification task and provides a suitable solution using a supervised learning technique namely support vector machine. Features are extracted from scanned images of plant leaves and trained using SVM. Only class, order, family of plants...

  17. Seismic Base Isolators For A Silo Supporting Structure

    Directory of Open Access Journals (Sweden)

    Bîtcă Daniel

    2015-05-01

    Full Text Available A 3000 tones capacity silo, located in a seismic area with ground acceleration ag = 0,20g and TC =1,0s, was designed in a classical solution The supporting structure has an octagonal shape in planview, and columns with “Maltese cross sections”. The main lateral resisting system is made up of centric bracings with cross-section class I.

  18. Implementation of Multiple Intelligences Supported Project-Based Learning in EFL/ESL Classrooms

    Science.gov (United States)

    Bas, Gokhan

    2008-01-01

    This article deals with the implementation of Multiple Intelligences supported Project-Based learning in EFL/ESL Classrooms. In this study, after Multiple Intelligences supported Project-based learning was presented shortly, the implementation of this learning method into English classrooms. Implementation process of MI supported Project-based…

  19. Bomb Threat Becomes Real News.

    Science.gov (United States)

    Gastaldo, Evann

    1999-01-01

    Discusses how the staff of the newspaper at Camarillo High School (California) covered a bomb threat at their school. Describes how they, overnight, conducted interviews, took and developed photographs, produced the layout, and published the newspaper. (RS)

  20. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  1. Striving for Group Agency: Threat to Personal Control Increases the Attractiveness of Agentic Groups

    Directory of Open Access Journals (Sweden)

    Janine eStollberg

    2015-05-01

    Full Text Available When their sense of personal control is threatened people try to restore perceived control through the social self. We propose that it is the perceived agency of ingroups that provides the self with a sense of control. In three experiments, we for the first time tested the hypothesis that threat to personal control increases the attractiveness of being part or joining those groups that are perceived as coherent entities engaging in coordinated group goal pursuit (agentic groups but not of those groups whose agency is perceived to be low. Consistent with this hypothesis we found in Study 1 (N = 93 that threat to personal control increased ingroup identification only with task groups, but not with less agentic types of ingroups that were made salient simultaneously. Furthermore, personal control threat increased a sense of collective control and support within the task group, mediated through task-group identification (indirect effects. Turning to groups people are not (yet part of, Study 2 (N = 47 showed that personal control threat increased relative attractiveness ratings of small groups as possible future ingroups only when the relative agency of small groups was perceived to be high. Perceived group homogeneity or social power did not moderate the effect. Study 3 (N = 78 replicated the moderating role of perceived group agency for attractiveness ratings of entitative groups, whereas perceived group status did not moderate the effect. These findings extend previous research on group-based control, showing that perceived agency accounts for group-based responses to threatened control.

  2. A student-facilitated community-based support group initiative for ...

    African Journals Online (AJOL)

    A student-facilitated community-based support group initiative for Mental Health ... was a collaborative partnership between a local University Psychology Department ... users, Rehabilitation, Primary Health Care, Social support, Stigmatisation ...

  3. Game-based dynamic simulations supporting technical education and training

    Directory of Open Access Journals (Sweden)

    Tore Bjølseth

    2006-04-01

    Full Text Available Educational games may improve learning by taking advantage of the new knowledge and skills of today’s students obtained from extensive use of interactive games. This paper describes how interactive dynamic simulators of advanced technical systems and phenomena can be shaped and adapted as games and competitions supporting technical education and training. Some selected examples at different educational levels are shown, from vocational training to university level courses. The potential benefit and perceived learning effect of this approach is also described and underpinned from comprehensive user feedback.

  4. The Gaia Framework: Version Support In Web Based Open Hypermedia

    DEFF Research Database (Denmark)

    Grønbæk, Kaj; Kejser, Thomas

    2004-01-01

    The GAIA framework prototype, described herein, explores the possibilities and problems that arise when combining versioning and open hypermedia paradigms. It will be argued that it - by adding versioning as a separate service in the hypermedia architecture – is possible to build consistent...... versioning field and GAIA is compared with previous attempts at defining hypermedia versioning frameworks. GAIA is capable of multi-level versioning and versioning of structures and supports freezing mechanisms for both documents and hyperstructure. The experiences from GAIA provide an input to new reference...

  5. The Gaia Framework: Version Support In Web Based Open Hypermedia

    DEFF Research Database (Denmark)

    Kejser, Thomas; Grønbæk, Kaj

    2003-01-01

    The GAIA framework prototype, described herein, explores the possibilities and problems that arise when combining versioning and open hypermedia paradigms. It will be argued that it - by adding versioning as a separate service in the hypermedia architecture - is possible to build consistent...... versioning field and GAIA is compared with previous attempts at defining hypermedia versioning frameworks. GAIA is capable of multi-level versioning and versioning of structures and supports freezing mechanisms for both documents and hyperstructure. The experiences from GAIA provide an input to new reference...

  6. Fault trend prediction of device based on support vector regression

    International Nuclear Information System (INIS)

    Song Meicun; Cai Qi

    2011-01-01

    The research condition of fault trend prediction and the basic theory of support vector regression (SVR) were introduced. SVR was applied to the fault trend prediction of roller bearing, and compared with other methods (BP neural network, gray model, and gray-AR model). The results show that BP network tends to overlearn and gets into local minimum so that the predictive result is unstable. It also shows that the predictive result of SVR is stabilization, and SVR is superior to BP neural network, gray model and gray-AR model in predictive precision. SVR is a kind of effective method of fault trend prediction. (authors)

  7. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  8. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  9. Energy Rebound as a Potential Threat to a Low-Carbon Future: Findings from a New Exergy-Based National-Level Rebound Approach

    Directory of Open Access Journals (Sweden)

    Paul E. Brockway

    2017-01-01

    Full Text Available 150 years ago, Stanley Jevons introduced the concept of energy rebound: that anticipated energy efficiency savings may be “taken back” by behavioural responses. This is an important issue today because, if energy rebound is significant, this would hamper the effectiveness of energy efficiency policies aimed at reducing energy use and associated carbon emissions. However, empirical studies which estimate national energy rebound are rare and, perhaps as a result, rebound is largely ignored in energy-economy models and associated policy. A significant difficulty lies in the components of energy rebound assessed in empirical studies: most examine direct and indirect rebound in the static economy, excluding potentially significant rebound of the longer term structural response of the national economy. In response, we develop a novel exergy-based approach to estimate national energy rebound for the UK and US (1980–2010 and China (1981–2010. Exergy—as “available energy”—allows a consistent, thermodynamic-based metric for national-level energy efficiency. We find large energy rebound in China, suggesting that improvements in China’s energy efficiency may be associated with increased energy consumption (“backfire”. Conversely, we find much lower (partial energy rebound for the case of the UK and US. These findings support the hypothesis that producer-sided economies (such as China may exhibit large energy rebound, reducing the effectiveness of energy efficiency, unless other policy measures (e.g., carbon taxes are implemented. It also raises the prospect we need to deploy renewable energy sources faster than currently planned, if (due to rebound energy efficiency policies cannot deliver the scale of energy reduction envisaged to meet climate targets.

  10. Supporting Information Synthesis of fatty monoester lubricant base ...

    Indian Academy of Sciences (India)

    Synthesis of fatty monoester lubricant base oil catalyzed by Fe-Zn ... Physical properties of fatty acid monoesters viz., kinematic viscosity, viscosity index, density ... The analysis method involves titration of the diluted sample with ethanolic alkali ...

  11. AOIPS data base management systems support for GARP data sets

    Science.gov (United States)

    Gary, J. P.

    1977-01-01

    A data base management system is identified, developed to provide flexible access to data sets produced by GARP during its data systems tests. The content and coverage of the data base are defined and a computer-aided, interactive information storage and retrieval system, implemented to facilitate access to user specified data subsets, is described. The computer programs developed to provide the capability were implemented on the highly interactive, minicomputer-based AOIPS and are referred to as the data retrieval system (DRS). Implemented as a user interactive but menu guided system, the DRS permits users to inventory the data tape library and create duplicate or subset data sets based on a user selected window defined by time and latitude/longitude boundaries. The DRS permits users to select, display, or produce formatted hard copy of individual data items contained within the data records.

  12. SADA: Ecological Risk Based Decision Support System for Selective Remediation

    Science.gov (United States)

    Spatial Analysis and Decision Assistance (SADA) is freeware that implements terrestrial ecological risk assessment and yields a selective remediation design using its integral geographical information system, based on ecological and risk assessment inputs. Selective remediation ...

  13. Web-Based Analysis for Decision Support Systems

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, SA ... impact of web-based analysis on DSSs and how it affects ... Internal users. ... and control of models, especially accounting, financial,.

  14. A SOA-Based Platform to Support Clinical Data Sharing

    Directory of Open Access Journals (Sweden)

    R. Gazzarata

    2017-01-01

    Full Text Available The eSource Data Interchange Group, part of the Clinical Data Interchange Standards Consortium, proposed five scenarios to guide stakeholders in the development of solutions for the capture of eSource data. The fifth scenario was subdivided into four tiers to adapt the functionality of electronic health records to support clinical research. In order to develop a system belonging to the “Interoperable” Tier, the authors decided to adopt the service-oriented architecture paradigm to support technical interoperability, Health Level Seven Version 3 messages combined with LOINC (Logical Observation Identifiers Names and Codes vocabulary to ensure semantic interoperability, and Healthcare Services Specification Project standards to provide process interoperability. The developed architecture enhances the integration between patient-care practice and medical research, allowing clinical data sharing between two hospital information systems and four clinical data management systems/clinical registries. The core is formed by a set of standardized cloud services connected through standardized interfaces, involving client applications. The system was approved by a medical staff, since it reduces the workload for the management of clinical trials. Although this architecture can realize the “Interoperable” Tier, the current solution actually covers the “Connected” Tier, due to local hospital policy restrictions.

  15. Chord Recognition Based on Temporal Correlation Support Vector Machine

    Directory of Open Access Journals (Sweden)

    Zhongyang Rao

    2016-05-01

    Full Text Available In this paper, we propose a method called temporal correlation support vector machine (TCSVM for automatic major-minor chord recognition in audio music. We first use robust principal component analysis to separate the singing voice from the music to reduce the influence of the singing voice and consider the temporal correlations of the chord features. Using robust principal component analysis, we expect the low-rank component of the spectrogram matrix to contain the musical accompaniment and the sparse component to contain the vocal signals. Then, we extract a new logarithmic pitch class profile (LPCP feature called enhanced LPCP from the low-rank part. To exploit the temporal correlation among the LPCP features of chords, we propose an improved support vector machine algorithm called TCSVM. We perform this study using the MIREX’09 (Music Information Retrieval Evaluation eXchange Audio Chord Estimation dataset. Furthermore, we conduct comprehensive experiments using different pitch class profile feature vectors to examine the performance of TCSVM. The results of our method are comparable to the state-of-the-art methods that entered the MIREX in 2013 and 2014 for the MIREX’09 Audio Chord Estimation task dataset.

  16. Pervasive Computing Support for Hospitals: An Overview of the Activity-Based Computing Project

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak; Bardram, Jakob E

    2007-01-01

    The activity-based computing project researched pervasive computing support for clinical hospital work. Such technologies have potential for supporting the mobile, collaborative, and disruptive use of heterogeneous embedded devices in a hospital......The activity-based computing project researched pervasive computing support for clinical hospital work. Such technologies have potential for supporting the mobile, collaborative, and disruptive use of heterogeneous embedded devices in a hospital...

  17. The Research of Clinical Decision Support System Based on Three-Layer Knowledge Base Model

    Directory of Open Access Journals (Sweden)

    Yicheng Jiang

    2017-01-01

    Full Text Available In many clinical decision support systems, a two-layer knowledge base model (disease-symptom of rule reasoning is used. This model often does not express knowledge very well since it simply infers disease from the presence of certain symptoms. In this study, we propose a three-layer knowledge base model (disease-symptom-property to utilize more useful information in inference. The system iteratively calculates the probability of patients who may suffer from diseases based on a multisymptom naive Bayes algorithm, in which the specificity of these disease symptoms is weighted by the estimation of the degree of contribution to diagnose the disease. It significantly reduces the dependencies between attributes to apply the naive Bayes algorithm more properly. Then, the online learning process for parameter optimization of the inference engine was completed. At last, our decision support system utilizing the three-layer model was formally evaluated by two experienced doctors. By comparisons between prediction results and clinical results, our system can provide effective clinical recommendations to doctors. Moreover, we found that the three-layer model can improve the accuracy of predictions compared with the two-layer model. In light of some of the limitations of this study, we also identify and discuss several areas that need continued improvement.

  18. Age differences in the underlying mechanisms of stereotype threat effects.

    Science.gov (United States)

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  19. Perceived Threat and Corroboration: Key Factors That Improve a Predictive Model of Trust in Internet-based Health Information and Advice

    Science.gov (United States)

    Harris, Peter R; Briggs, Pam

    2011-01-01

    Background How do people decide which sites to use when seeking health advice online? We can assume, from related work in e-commerce, that general design factors known to affect trust in the site are important, but in this paper we also address the impact of factors specific to the health domain. Objective The current study aimed to (1) assess the factorial structure of a general measure of Web trust, (2) model how the resultant factors predicted trust in, and readiness to act on, the advice found on health-related websites, and (3) test whether adding variables from social cognition models to capture elements of the response to threatening, online health-risk information enhanced the prediction of these outcomes. Methods Participants were asked to recall a site they had used to search for health-related information and to think of that site when answering an online questionnaire. The questionnaire consisted of a general Web trust questionnaire plus items assessing appraisals of the site, including threat appraisals, information checking, and corroboration. It was promoted on the hungersite.com website. The URL was distributed via Yahoo and local print media. We assessed the factorial structure of the measures using principal components analysis and modeled how well they predicted the outcome measures using structural equation modeling (SEM) with EQS software. Results We report an analysis of the responses of participants who searched for health advice for themselves (N = 561). Analysis of the general Web trust questionnaire revealed 4 factors: information quality, personalization, impartiality, and credible design. In the final SEM model, information quality and impartiality were direct predictors of trust. However, variables specific to eHealth (perceived threat, coping, and corroboration) added substantially to the ability of the model to predict variance in trust and readiness to act on advice on the site. The final model achieved a satisfactory fit: χ2 5 = 10

  20. Recycling of Na in advanced life support: strategies based on crop production systems.

    Science.gov (United States)

    Guntur, S V; Mackowiak, C; Wheeler, R M

    1999-01-01

    Sodium is an essential dietary requirement in human nutrition, but seldom holds much importance as a nutritional element for crop plants. In Advanced Life Support (ALS) systems, recycling of gases, nutrients, and water loops is required to improve system closure. If plants are to play a significant role in recycling of human wastes, Na will need to accumulate in edible tissues for return to the crew diet. If crops fail to accumulate the incoming Na into edible tissues, Na could become a threat to the hydroponic food production system by increasing the nutrient solution salinity. Vegetable crops of Chenopodiaceae such as spinach, table beet, and chard may have a high potential to supply Na to the human diet, as Na can substitute for K to a large extent in metabolic processes of these crops. Various strategies are outlined that include both genetic and environmental management aspects to optimize the Na recovery from waste streams and their resupply through the human diet in ALS.

  1. Decision Making Based On Management Information System and Decision Support System

    Directory of Open Access Journals (Sweden)

    Şükrü Ada

    2015-04-01

    Full Text Available Information hasbecome an essentialresource for managing modern organizations. This is so because today’sbusiness environment is volatile, dynamic, turbulent and necessitates the burgeoning demand for accurate, relevant, complete,timely and economical information needed to drive the decision-making process in order to accentuate organizational abilities to manage opportunities and threat. MIS work on online mode with an average processing speed. Generally, it is used by low level management. Decision support system are powerful tool that assist corporate executives, administrators and other senior officials in making decision regarding the problem. Management Information Systems is a useful tool that provided organized and summarized information in a proper time to decision makers and enable making accurate decision for managers in organizations. This paper will discuss the concept, characteristics, types of MIS, the MIS model, and in particular it will highlight the impact and role of MIS on decision making.

  2. Pointing control using a moving base of support.

    Science.gov (United States)

    Hondzinski, Jan M; Kwon, Taegyong

    2009-07-01

    The purposes of this study were to determine whether gaze direction provides a control signal for movement direction for a pointing task requiring a step and to gain insight into why discrepancies previously identified in the literature for endpoint accuracy with gaze directed eccentrically exist. Straight arm pointing movements were performed to real and remembered target locations, either toward or 30 degrees eccentric to gaze direction. Pointing occurred in normal room lighting or darkness while subjects sat, stood still or side-stepped left or right. Trunk rotation contributed 22-65% to gaze orientations when it was not constrained. Error differences for different target locations explained discrepancies among previous experiments. Variable pointing errors were influenced by gaze direction, while mean systematic pointing errors and trunk orientations were influenced by step direction. These data support the use of a control strategy that relies on gaze direction and equilibrium inputs for whole-body goal-directed movements.

  3. Institutional support to the nuclear power based on transportable installations

    International Nuclear Information System (INIS)

    Kuznetsov, V.P.; Cherepnin, Y.S.

    2010-01-01

    Existing nuclear power uses large-power nuclear plants (more than 1,000 MWe) and enriched uranium fuel ( 2 35 U ). Each plant is treated as an exclusive costly project. As a result, large NPPs are operated predominantly in highly developed big countries. In many countries, construction of large power units is not reasonable because of the economic conditions and national specifics. This calls for the use of small- and medium-power nuclear plants (SMPNP), especially transportable nuclear installations (TNI). TNI feature small power (up to 100 MWe); serial production, and transportability. Small- and medium-power nuclear plants could serve to produce electricity and heat; perform water desalination; provide temporary and emergency energy supply. The authors discuss some findings of the studies carried out on the various aspects of the TNI life, as well as the legal and institutional support to their development, construction and operation. The studies have been performed in the framework of the INPRO Action Plan

  4. SOA based intensive support system for space radiation data

    International Nuclear Information System (INIS)

    Goranova, M.; Shishedjiev, B.; Genova, S.; Semkova, J.

    2013-01-01

    Modern data intensive science involves heterogeneous and structured data sets in sophisticated data formats. Scientists need access to distributed computing and data sources and support for remote access to expensive, multinational specialized instruments. Scientists need effective software for data analysis, querying, accessing and visualization. The interaction between computer science and science and engineering becomes essential for the automation of data manipulation. The key solution uses the Service-oriented Architecture (SOA) in the field of science and Grid computing. The goal of this paper is managing the scientific data received by the Lyulin-5 particle telescope used in MATROSHKA-R experiment performed at the International Space Station (ISS). The dynamics of radiation characteristics and their dependency on the time and the orbital parameters have been established. The experiment helps the accurate estimation of the impact of space radiation on human health in long-duration manned missions

  5. Implementation of evidence-based supported employment in regional Australia.

    Science.gov (United States)

    Morris, Adrienne; Waghorn, Geoffrey; Robson, Emma; Moore, Lyndell; Edwards, Emma

    2014-06-01

    To implement the Individual Placement and Support (IPS) approach at 4 locations in regional New South Wales, Australia. Outcomes attained were compared with a national non-IPS program and with international trials of IPS within and outside the United States. Four IPS programs were established through formal partnerships between mental health services and disability employment services. Ninety-five mental health service clients commenced employment assistance and were tracked for a minimum of 12 months. Two sites achieved good fidelity to IPS principles, and 2 sites achieved fair fidelity. IPS clients had 3.5 times greater odds of attaining 13 weeks' employment than those receiving assistance in the national network of disability employment services. Implementing IPS is challenging in the Australian service delivery context. Factors other than program fidelity appear to contribute to excellent employment outcomes. Further research is needed to identify these factors.

  6. NDT-based bridge condition assessment supported by expert tools

    Science.gov (United States)

    Bień, J.; KuŻawa, M.

    2016-06-01

    This paper is focused on the progress in the application of Expert Tools supporting integration of inspection and NDT testing findings in order to effectuate effective decision making by bridge owners. Possibilities of knowledge representation in the intelligent computer Expert Tools by means of the multi-level hybrid network technology are described. These multi-level hybrid networks can be built of neural, fuzzy and functional components depending on the problem that needs to be solved and on the type of available information. Application of the technology is illustrated by an example of the Bridge Evaluation Expert Function (BEEF) implemented in the Railway Bridge Management System "SMOK" operated by the Polish State Railways.

  7. Case-based discussion supporting learning and practice in optometry.

    Science.gov (United States)

    Bullock, Alison; Barnes, Emma; Ryan, Barbara; Sheen, Nik

    2014-09-01

    To enhance continuing professional development and address the risk that professional isolation poses, the UK General Optical Council introduced a requirement for all optometrists to engage in at least one case-based discussion per 3 year cycle of continuing education. In this paper, we explore participants' impression of the acceptability, effectiveness and long-term impact-on-practice of case-based discussion as a mode of continuing education. Case-based discussion participants attended an evening session comprising a lecture and a group discussion. They completed three questionnaires: prior to the session, immediately post-session and 3-4 months post-session. We coded the questionnaires to allow matching. Seventy-five case-based discussion groups were held with 379 participants; 377 completed both pre- and post-questionnaires and 331 (88%) returned a follow-up questionnaire. Case-based discussions were an acceptable method of learning, with many preferring it to distance-learning. Prior to the event, women, employees and part-time workers were more likely to have concerns about participating. In terms of learning, gaps in knowledge were more likely to be revealed in those who work in isolation. The respondents highlighted social aspects, reassurance of practice as well as new learning. Participants significantly improved self-confidence ratings in all key learning areas. At three months post-session, the majority (75%) self-reported that they had implemented their intended changes to practice. The evaluation showed that participants felt that case-based discussion developed their knowledge, notably for sole practitioners, and influenced later workplace practice. The peer interaction of this mode of continuing education can combat professional isolation. © 2014 The Authors Ophthalmic & Physiological Optics © 2014 The College of Optometrists.

  8. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  9. Cloud-Based Technologies: Faculty Development, Support, and Implementation

    Science.gov (United States)

    Diaz, Veronica

    2011-01-01

    The number of instructional offerings in higher education that are online, blended, or web-enhanced, including courses and programs, continues to grow exponentially. Alongside the growth of e-learning, higher education has witnessed the explosion of cloud-based or Web 2.0 technologies, a term that refers to the vast array of socially oriented,…

  10. Formal Support for Development of Knowledge-Based Systems

    NARCIS (Netherlands)

    Fensel, Dieter; Van Harmelen, Frank; Reif, Wolfgang; Ten Teije, Annette

    1998-01-01

    This article provides an approach for developing reliable knowledge-based systems. Its main contributions are: Specification is done at an architectural level that abstracts from a specific implementation formalism. The model of expertise of CommonKADS distinguishs different types of knowledge and

  11. Blueprint template support for engineering cloud-based services

    NARCIS (Netherlands)

    Nguyen, D.K.; Lelli, F.; Taher, Y.; Parkin, M.S.; Papazoglou, M.; van den Heuvel, W.J.A.M.; Abramowicz, W.; Martín Llorente, I.; Surridge, M.; Zisman, A.; Vayssière, J.

    2011-01-01

    Current cloud-based service offerings are often provided as one-size-fits-all solutions and give little or no room for customization. This limits the ability for application developers to pick and choose offerings from multiple software, platform, infrastructure service providers and configure them

  12. Environmental impact assessment based on planning support system

    NARCIS (Netherlands)

    Carsjens, G.J.; Chen, W.

    2011-01-01

    How to assess environmental impact is one of the keys in land use planning. This article described in detail the concepts of activities, impact zones, functions, and sensitivities, as well as the development of STEPP (strategic tool for integrating environmental aspects in planning procedures) based

  13. Threats to economic security of the region

    Directory of Open Access Journals (Sweden)

    Y. A. Salikov

    2017-01-01

    Full Text Available Various aspects of economic security are in sight of the researchers for more than two decades. Today in the economic literature widely presents the conceptual aspects of economic safety of the state. Theoretical and methodological foundations of the study of this multifaceted problem lies in the researches of many domestic and foreign scientists, which are the basic levels of economic security. Among the priority levels include, in our view, the regional level (meso-level and actual problems of economic security studied to date lack detail. Economic development regions of the country has its own specifics, which is projected to the achieving of regional and national economic security. The article summarizes the approaches to definition of essence of the category “economic security of the region” and was given its author’s interpretation, considers the reasons of appearance and development of crisis situations causing threats to the economic security of the region. Given that the prevention of threats and reduction of their consequences is the basis of regional economic security, the article identifies the main threats to economic security, as well as the peculiarities of their manifestations (for example, the most significant threats to economic security of the Voronezh region, as well as the proposed activities in support of regional economic security and stated objectives of regional economic policy, the solution of which is aimed at ensuring the economic security of the region. In addition, it is proved that the actual problems of economic security must be constantly in sight of the regional leadership and find its solution in government documents and policy programmes promising socio-economic development of the region.

  14. Research on the Optimization of Air Route in Air-interception Based on Threat Situation%基于态势威胁的歼击机截击航路优化方法研究

    Institute of Scientific and Technical Information of China (English)

    李俊; 林云; 韩玉龙; 章世峰; 王兆军

    2016-01-01

    针对如何设计截击空战中的接敌阶段的航路问题,提出基于扩大对敌威胁因子的航路设计算法。根据双方飞机性能与挂载武器性能,改进了飞机的机动模型和威胁因子模型,将截击过程分成若干时间段,建立相对态势威胁与飞机机动策略之间的函数关系,得出每个时间段内对敌威胁最大的策略,视为在该时间段内的最优策略,将每个时间段内做出最优策略后的飞机所在坐标连续记录,即为截击飞机的最优航路。最后对随机假想的初始态势利用 MATLAB 软件进行仿真计算,结果表明:利用该算法可以得到歼击机在截击接敌段的最优航路。%According to the problem that how to design the air route when get approach in air‐interception ,this paper puts forward an algorithm to design air route based on increasing the threat factor to enemy .The battleplane’s mobility model and threat factor model are improved according to the ability of battleplane and airborne weapons system of two side .The time for air‐interception is cut to many little parts ,and a relationship between the threat factor and the battleplane’s mobility strategy in every part are built up to get a best mobility strategy for increasing the threat factor ,recording the coordinate of the battleplane after doing the best strategy continuously ,to get a best air route in target approach of air‐interception .At last ,an example is given to simulate with Matlab ,get an optimized air route in target approach of air‐interception.

  15. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  16. Decentralised bioenergy systems: A review of opportunities and threats

    International Nuclear Information System (INIS)

    Mangoyana, Robert B.; Smith, Timothy F.

    2011-01-01

    Decentralised bioenergy systems are receiving increasing attention due to the potential ability to support local development, create local employment, and contribute to climate change mitigation. These issues, along with other bioenergy sustainability issues, are reviewed through eighteen international case studies with the objective of identifying opportunities and threats to decentralised bioenergy systems. The case studies were selected based on feedstock type, bioenergy type, production capacity, synergistic alliances, ownership structure and physical locations. This variation was used to provide a basis for evaluating opportunities and threats from different contexts. Commercial viability remains the primary concern for the sustainability of decentralised bioenergy systems. There are, however, opportunities for compounding benefits through integrating small scale decentralised bioenergy systems with other production systems. Integrated production, including closed loop models, allow waste materials from one process to be used as inputs in other production processes, and thereby increasing economic, social and environmental outcomes. Synergistic opportunities along the bioenergy production chain, which include feedstock production, bioenergy marketing and distribution could also be exploited by communities and other investors to minimise decentralised production risk. - Research Highlights: → Small scale decentralised bioenergy production is a potentially sustainable energy system. →Economic viability limits small scale decentralised bioenergy production. → Synergistic alliances along the bioenergy production chain could enhance viability.

  17. The Financial Arm Of The FARC: A Threat Finance Perspective

    Directory of Open Access Journals (Sweden)

    Thomas Cook

    2011-01-01

    Full Text Available The FARC (Fuerzas Armadas Revolucionarias de Colombia or Revolutionary Armed Forces of Colombia transformed from a traditional guerrilla group into a full-fledged insurgency because of its ability to effectively convert the proceeds derived from illegal narcotic trafficking into operational funds. Those financial capabilities allowed the FARC to challenge government authority in large swathes of the Colombian state. The FARC moved into the drug trade, initially controlling production territory and subsequently engaging in trafficking, which allowed the organization to increase its war-fighting capabilities. This paper only scratches the surface of the mechanism by which the FARC utilized its coca revenue in order to fund its community reinvestment programs, engage in large scale military buildup, and buy political support throughout the region. The exploration of the financial side of the FARC adds to our understanding of how insurgencies become successful. Based on open source information, Threat Finance and financial investigative techniques are underutilized in foreign policy, law enforcement, and intelligence. The critical role played by financing in the rise of the FARC suggests that Threat Finance efforts can be most effective when used to track terrorist and criminal networks. American law enforcement and intelligence agencies should be given bigger budgets and tasked earlier to shut down or disrupt financial networks of foreign insurgencies, such as the FARC.

  18. A Support-Based Reconstruction for SENSE MRI

    Directory of Open Access Journals (Sweden)

    Bradley S. Peterson

    2013-03-01

    Full Text Available A novel, rapid algorithm to speed up and improve the reconstruction of sensitivity encoding (SENSE MRI was proposed in this paper. The essence of the algorithm was that it iteratively solved the model of simple SENSE on a pixel-by-pixel basis in the region of support (ROS. The ROS was obtained from scout images of eight channels by morphological operations such as opening and filling. All the pixels in the FOV were paired and classified into four types, according to their spatial locations with respect to the ROS, and each with corresponding procedures of solving the inverse problem for image reconstruction. The sensitivity maps, used for the image reconstruction and covering only the ROS, were obtained by a polynomial regression model without extrapolation to keep the estimation errors small. The experiments demonstrate that the proposed method improves the reconstruction of SENSE in terms of speed and accuracy. The mean square errors (MSE of our reconstruction is reduced by 16.05% for a 2D brain MR image and the mean MSE over the whole slices in a 3D brain MRI is reduced by 30.44% compared to those of the traditional methods. The computation time is only 25%, 45%, and 70% of the traditional method for images with numbers of pixels in the orders of 103, 104, and 105–107, respectively.

  19. Smart Web-Based Platform to Support Physical Rehabilitation

    Directory of Open Access Journals (Sweden)

    Yves Rybarczyk

    2018-04-01

    Full Text Available The enhancement of ubiquitous and pervasive computing brings new perspectives in medical rehabilitation. In that sense, the present study proposes a smart, web-based platform to promote the reeducation of patients after hip replacement surgery. This project focuses on two fundamental aspects in the development of a suitable tele-rehabilitation application, which are: (i being based on an affordable technology, and (ii providing the patients with a real-time assessment of the correctness of their movements. A probabilistic approach based on the development and training of ten Hidden Markov Models (HMMs is used to discriminate in real time the main faults in the execution of the therapeutic exercises. Two experiments are designed to evaluate the precision of the algorithm for classifying movements performed in the laboratory and clinical settings, respectively. A comparative analysis of the data shows that the models are as reliable as the physiotherapists to discriminate and identify the motion errors. The results are discussed in terms of the required setup for a successful application in the field and further implementations to improve the accuracy and usability of the system.

  20. Cyber Conflicts as a New Global Threat

    Directory of Open Access Journals (Sweden)

    Alexander Kosenkov

    2016-09-01

    Full Text Available In this paper, an attempt is made to analyze the potential threats and consequences of cyber conflicts and, in particular, the risks of a global cyber conflict. The material is based on a comprehensive analysis of the nature of cyber conflict and its elements from both technical and societal points of view. The approach used in the paper considers the societal component as an essential part of cyber conflicts, allowing basics of cyber conflicts often disregarded by researchers and the public to be highlighted. Finally, the conclusion offers an opportunity to consider cyber conflict as the most advanced form of modern warfare, which imposes the most serious threat and whose effect could be comparable to weapons of mass destruction.

  1. Scientifically defensible fish conservation and recovery plans: Addressing diffuse threats and developing rigorous adaptive management plans

    Science.gov (United States)

    Maas-Hebner, Kathleen G.; Schreck, Carl B.; Hughes, Robert M.; Yeakley, Alan; Molina, Nancy

    2016-01-01

    We discuss the importance of addressing diffuse threats to long-term species and habitat viability in fish conservation and recovery planning. In the Pacific Northwest, USA, salmonid management plans have typically focused on degraded freshwater habitat, dams, fish passage, harvest rates, and hatchery releases. However, such plans inadequately address threats related to human population and economic growth, intra- and interspecific competition, and changes in climate, ocean, and estuarine conditions. Based on reviews conducted on eight conservation and/or recovery plans, we found that though threats resulting from such changes are difficult to model and/or predict, they are especially important for wide-ranging diadromous species. Adaptive management is also a critical but often inadequately constructed component of those plans. Adaptive management should be designed to respond to evolving knowledge about the fish and their supporting ecosystems; if done properly, it should help improve conservation efforts by decreasing uncertainty regarding known and diffuse threats. We conclude with a general call for environmental managers and planners to reinvigorate the adaptive management process in future management plans, including more explicitly identifying critical uncertainties, implementing monitoring programs to reduce those uncertainties, and explicitly stating what management actions will occur when pre-identified trigger points are reached.

  2. Students' satisfaction to hybrid problem-based learning format for basic life support/advanced cardiac life support teaching.

    Science.gov (United States)

    Chilkoti, Geetanjali; Mohta, Medha; Wadhwa, Rachna; Saxena, Ashok Kumar; Sharma, Chhavi Sarabpreet; Shankar, Neelima

    2016-11-01

    Students are exposed to basic life support (BLS) and advanced cardiac life support (ACLS) training in the first semester in some medical colleges. The aim of this study was to compare students' satisfaction between lecture-based traditional method and hybrid problem-based learning (PBL) in BLS/ACLS teaching to undergraduate medical students. We conducted a questionnaire-based, cross-sectional survey among 118 1 st -year medical students from a university medical college in the city of New Delhi, India. We aimed to assess the students' satisfaction between lecture-based and hybrid-PBL method in BLS/ACLS teaching. Likert 5-point scale was used to assess students' satisfaction levels between the two teaching methods. Data were collected and scores regarding the students' satisfaction levels between these two teaching methods were analysed using a two-sided paired t -test. Most students preferred hybrid-PBL format over traditional lecture-based method in the following four aspects; learning and understanding, interest and motivation, training of personal abilities and being confident and satisfied with the teaching method ( P < 0.05). Implementation of hybrid-PBL format along with the lecture-based method in BLS/ACLS teaching provided high satisfaction among undergraduate medical students.

  3. Support Vector Machine Based on Adaptive Acceleration Particle Swarm Optimization

    Science.gov (United States)

    Abdulameer, Mohammed Hasan; Othman, Zulaiha Ali

    2014-01-01

    Existing face recognition methods utilize particle swarm optimizer (PSO) and opposition based particle swarm optimizer (OPSO) to optimize the parameters of SVM. However, the utilization of random values in the velocity calculation decreases the performance of these techniques; that is, during the velocity computation, we normally use random values for the acceleration coefficients and this creates randomness in the solution. To address this problem, an adaptive acceleration particle swarm optimization (AAPSO) technique is proposed. To evaluate our proposed method, we employ both face and iris recognition based on AAPSO with SVM (AAPSO-SVM). In the face and iris recognition systems, performance is evaluated using two human face databases, YALE and CASIA, and the UBiris dataset. In this method, we initially perform feature extraction and then recognition on the extracted features. In the recognition process, the extracted features are used for SVM training and testing. During the training and testing, the SVM parameters are optimized with the AAPSO technique, and in AAPSO, the acceleration coefficients are computed using the particle fitness values. The parameters in SVM, which are optimized by AAPSO, perform efficiently for both face and iris recognition. A comparative analysis between our proposed AAPSO-SVM and the PSO-SVM technique is presented. PMID:24790584

  4. Support Vector Machine Based on Adaptive Acceleration Particle Swarm Optimization

    Directory of Open Access Journals (Sweden)

    Mohammed Hasan Abdulameer

    2014-01-01

    Full Text Available Existing face recognition methods utilize particle swarm optimizer (PSO and opposition based particle swarm optimizer (OPSO to optimize the parameters of SVM. However, the utilization of random values in the velocity calculation decreases the performance of these techniques; that is, during the velocity computation, we normally use random values for the acceleration coefficients and this creates randomness in the solution. To address this problem, an adaptive acceleration particle swarm optimization (AAPSO technique is proposed. To evaluate our proposed method, we employ both face and iris recognition based on AAPSO with SVM (AAPSO-SVM. In the face and iris recognition systems, performance is evaluated using two human face databases, YALE and CASIA, and the UBiris dataset. In this method, we initially perform feature extraction and then recognition on the extracted features. In the recognition process, the extracted features are used for SVM training and testing. During the training and testing, the SVM parameters are optimized with the AAPSO technique, and in AAPSO, the acceleration coefficients are computed using the particle fitness values. The parameters in SVM, which are optimized by AAPSO, perform efficiently for both face and iris recognition. A comparative analysis between our proposed AAPSO-SVM and the PSO-SVM technique is presented.

  5. Reliability analysis of idealized tunnel support system using probability-based methods with case studies

    NARCIS (Netherlands)

    Gharouni-Nik, M.; Naeimi, M.; Ahadi, S.; Alimoradi, Z.

    2014-01-01

    In order to determine the overall safety of a tunnel support lining, a reliability-based approach is presented in this paper. Support elements in jointed rock tunnels are provided to control the ground movement caused by stress redistribution during the tunnel drive. Main support elements contribute

  6. Support for Offering Sexual Health Services through School-Based Health Clinics

    Science.gov (United States)

    Moore, Michele Johnson; Barr, Elissa; Wilson, Kristina; Griner, Stacey

    2016-01-01

    Background: Numerous studies document support for sexuality education in the schools. However, there is a dearth of research assessing support for sexual health services offered through school-based health clinics (SBHCs). The purpose of this study was to assess voter support for offering 3 sexual health services (STI/HIV testing, STI/HIV…

  7. Support for school-based obesity prevention efforts: attitudes among administrators at nationally representative samples of US elementary schools.

    Science.gov (United States)

    Turner, Lindsey; Slater, Sandy J; Chaloupka, Frank J

    2013-08-01

    With the continued threat of childhood obesity, many public health intervention efforts focus on school settings. The current study sought to document administrator attitudes regarding obesity and interest in improving relevant school practices (i.e., nutrition and physical activity) in elementary schools. Mail-back surveys were used to gather data from public and private elementary schools during the 2006-2007, 2007-2008, 2008-2009, and 2010-2011 school years. In each year, a different set of items pertaining to administrator attitudes was included. Numbers of responding schools annually ranged from 259 to 336 private schools, and from 578 to 748 public schools. The vast majority of elementary school administrators (>90%) agreed that schools can play a role in addressing childhood obesity, physical education improves a variety of academic outcomes, and they were interested in improving practices at their school. Concern about childhood obesity and perceiving that schools can play a role in addressing obesity were both associated with more interest in improving school practices. However, only one-third of administrators agreed that parents were interested in participating in improving nutrition and physical activity practices, suggesting opportunities for efforts to improve collaboration. Administrators are generally very supportive of school-based efforts to improve nutrition and physical activity practices and see the value in doing so. Given the amount of time children spend in school, schools are an essential venue for efforts to address childhood obesity.

  8. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  9. [Problem-based learning in cardiopulmonary resuscitation: basic life support].

    Science.gov (United States)

    Sardo, Pedro Miguel Garcez; Dal Sasso, Grace Terezinha Marcon

    2008-12-01

    Descriptive and exploratory study, aimed to develop an educational practice of Problem-Based Learning in CPR/BLS with 24 students in the third stage of the Nursing Undergraduate Course in a University in the Southern region of Brazil. The study used the PBL methodology, focused on problem situations of cardiopulmonary arrest, and was approved by the CONEP. The methodological strategies for data collection, such as participative observation and questionnaires to evaluate the learning, the educational practices and their methodology, allowed for grouping the results in: students' expectations; group activities; individual activities; practical activities; evaluation of the meetings and their methodology. The study showed that PBL allows the educator to evaluate the academic learning process in several dimensions, functioning as a motivating factor for both the educator and the student, because it allows the theoretical-practical integration in an integrated learning process.

  10. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  11. Restricted grouper reproductive migrations support community-based management

    KAUST Repository

    Waldie, Peter A.

    2016-03-09

    Conservation commonly requires trade-offs between social and ecological goals. For tropical small-scale fisheries, spatial scales of socially appropriate management are generally small—the median no-take locally managed marine area (LMMA) area throughout the Pacific is less than 1 km2. This is of particular concern for large coral reef fishes, such as many species of grouper, which migrate to aggregations to spawn. Current data suggest that the catchment areas (i.e. total area from which individuals are drawn) of such aggregations are at spatial scales that preclude effective community-based management with no-take LMMAs. We used acoustic telemetry and tag-returns to examine reproductive migrations and catchment areas of the grouper Epinephelus fuscoguttatus at a spawning aggregation in Papua New Guinea. Protection of the resultant catchment area of approximately 16 km2 using a no-take LMMA is socially untenable here and throughout much of the Pacific region. However, we found that spawning migrations were skewed towards shorter distances. Consequently, expanding the current 0.2 km2 no-take LMMA to 1–2 km2 would protect approximately 30–50% of the spawning population throughout the non-spawning season. Contrasting with current knowledge, our results demonstrate that species with moderate reproductive migrations can be managed at scales congruous with spatially restricted management tools.

  12. Automated support for experience-based software management

    Science.gov (United States)

    Valett, Jon D.

    1992-01-01

    To effectively manage a software development project, the software manager must have access to key information concerning a project's status. This information includes not only data relating to the project of interest, but also, the experience of past development efforts within the environment. This paper describes the concepts and functionality of a software management tool designed to provide this information. This tool, called the Software Management Environment (SME), enables the software manager to compare an ongoing development effort with previous efforts and with models of the 'typical' project within the environment, to predict future project status, to analyze a project's strengths and weaknesses, and to assess the project's quality. In order to provide these functions the tool utilizes a vast corporate memory that includes a data base of software metrics, a set of models and relationships that describe the software development environment, and a set of rules that capture other knowledge and experience of software managers within the environment. Integrating these major concepts into one software management tool, the SME is a model of the type of management tool needed for all software development organizations.

  13. Beyond fluid intelligence and personality traits in social support: the role of ability based emotional intelligence.

    Science.gov (United States)

    Fabio, Annamaria Di

    2015-01-01

    Social support represents an important individual resource that has been associated with multiple indices of adaptive functioning and resiliency. Existing research has also identified an association between emotional intelligence (EI) and social support. The present study builds on prior research by investigating the contributions of ability based EI to social support, beyond the effects of fluid intelligence and personality traits. The Advanced Progressive Matrices, the Big Five Questionnaire, the Mayer Salovey Caruso EI test (MSCEIT), and the Multidimensional Scale of Perceived Social Support were administered to 149 Italian high school students. The results showed that ability based EI added significant incremental variance in explaining perceived social support, beyond the variance due to fluid intelligence and personality traits. The results underline the role of ability based EI in relation to perceived social support. Since ability based EI can be increased through specific training, the results of the present study highlight new possibilities for research and intervention in a preventive framework.

  14. Providing Evidence-Based, Intelligent Support for Flood Resilient Planning and Policy: The PEARL Knowledge Base

    Directory of Open Access Journals (Sweden)

    George Karavokiros

    2016-09-01

    Full Text Available While flood risk is evolving as one of the most imminent natural hazards and the shift from a reactive decision environment to a proactive one sets the basis of the latest thinking in flood management, the need to equip decision makers with necessary tools to think about and intelligently select options and strategies for flood management is becoming ever more pressing. Within this context, the Preparing for Extreme and Rare Events in Coastal Regions (PEARL intelligent knowledge-base (PEARL KB of resilience strategies is presented here as an environment that allows end-users to navigate from their observed problem to a selection of possible options and interventions worth considering within an intuitive visual web interface assisting advanced interactivity. Incorporation of real case studies within the PEARL KB enables the extraction of (evidence-based lessons from all over the word, while the KB’s collection of methods and tools directly supports the optimal selection of suitable interventions. The Knowledge-Base also gives access to the PEARL KB Flood Resilience Index (FRI tool, which is an online tool for resilience assessment at a city level available to authorities and citizens. We argue that the PEARL KB equips authorities with tangible and operational tools that can improve strategic and operational flood risk management by assessing and eventually increasing resilience, while building towards the strengthening of risk governance. The online tools that the PEARL KB gives access to were demonstrated and tested in the city of Rethymno, Greece.

  15. The threat of nuclear terrorism

    International Nuclear Information System (INIS)

    Maerli, M.

    2001-01-01

    Full text: There have always been enormous gaps between the potential of a weapon and the abilities and/or the will to employ it by terrorists. New means and methods of violence with unknown outcomes could be less appealing for sub-national groups. Conventional 'off the shelf' weaponry is thus likely to remain the major tools for traditional terrorists. However, the analysis show that while the risk of nuclear terrorism may be remote, it should not and cannot be excluded. Rigorous standards and means the protection, control and accounting of fissile materials are thus needed. 'Nuclear terrorism' can be defined as acts of violence and destruction where the means applied are nuclear devices, or threats of use of such means, to create a condition of fear, to get attention, or to blackmail to have wider effect on others than the directly targeted victim(s). Nuclear terrorism is a subset of radiological terrorism, were the means (or threats) applied are radioactive substances. While being distinctly dissimilar in terms of technical approaches and damage potentials, many of the features with regards to public threat perception are likely to be similar. No non-state actors have ever deployed or used a nuclear device, and the number of (publicly known) nuclear bomb treats has been limited. However, there is a disturbing interest among some terrorist organizations in acquiring nuclear weapon capabilities, probably for tactical purposes. The biological and chemical programs of the Japanese 'Aum Shinrikyo' cult that culminated in the Tokyo metro attack is highly publicized. Less well-known is the nuclear weapon program of the group. Nuclear material was acquired from the sect's properties in Australia and markets were explored to purchase nuclear technology via straw trading companies. Another highly profiled terrorist group with obvious nuclear intentions is the 'Al- Qa'ida', the group of bin Laden. The recent trail for the bombings of the U.S. embassies in Nairobi, Kenya

  16. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  17. BIM-Based Decision Support System for Material Selection Based on Supplier Rating

    Directory of Open Access Journals (Sweden)

    Abiola Akanmu

    2015-12-01

    Full Text Available Material selection is a delicate process, typically hinged on a number of factors which can be either cost or environmental related. This process becomes more complicated when designers are faced with several material options of building elements and each option can be supplied by different suppliers whose selection criteria may affect the budgetary and environmental requirements of the project. This paper presents the development of a decision support system based on the integration of building information models, a modified harmony search algorithm and supplier performance rating. The system is capable of producing the cost and environmental implications of different material combinations or building designs. A case study is presented to illustrate the functionality of the developed system.

  18. Biological Threats Detection Technologies

    International Nuclear Information System (INIS)

    Bartoszcze, M.

    2007-01-01

    Among many decisive factors, which can have the influence on the possibility of decreases the results of use biological agents should be mentioned obligatory: rapid detection and identification of biological factor used, the proper preventive treatment and the medical management. The aims of identification: to identify the factor used, to estimate the area of contamination, to evaluate the possible countermeasure efforts (antibiotics, disinfectants) and to assess the effectiveness of the decontamination efforts (decontamination of the persons, equipment, buildings, environment etc.). The objects of identification are: bacteria and bacteria's spores, viruses, toxins and genetically modified factors. The present technologies are divided into: based on PCR techniques (ABI PRISM, APSIS, BIOVERIS, RAPID), immuno (BADD, RAMP, SMART) PCR and immuno techniques (APDS, LUMINEX) and others (BDS2, LUNASCAN, MALDI). The selected technologies assigned to field conditions, mobile and stationary laboratories will be presented.(author)

  19. Familiarity Threat Arguement Revisited

    DEFF Research Database (Denmark)

    Warming-Rasmussen, Bent; Aschauer, Ewald

    2013-01-01

    Abstract: Trust between auditors and their clients is commonly thought to threaten auditors’ professional skepticism and thus compromise audit quality, although a systematic review of auditing literature provides an ambiguous picture. We close this gap by investigating the impact of auditors’ trust...... in their clients on the clients’ perceptions of their auditors’ professional skepticism. Further, we investigate the impact of auditor /audit firm tenure, non-audit services (NAS) and auditors’ confidence in their clients. We employ a two-study design. First, in a qualitative study conducted among auditors...... and clients, we identify their subjective theories of trust and discuss them against the backdrop of recent trust research to develop four hypotheses. In the second study, the hypotheses are tested in an OLS regression based on data from 218 auditor-client dyads in Germany. Then, our interpretations...

  20. Asymmetric threat data mining and knowledge discovery

    Science.gov (United States)

    Gilmore, John F.; Pagels, Michael A.; Palk, Justin

    2001-03-01

    Asymmetric threats differ from the conventional force-on- force military encounters that the Defense Department has historically been trained to engage. Terrorism by its nature is now an operational activity that is neither easily detected or countered as its very existence depends on small covert attacks exploiting the element of surprise. But terrorism does have defined forms, motivations, tactics and organizational structure. Exploiting a terrorism taxonomy provides the opportunity to discover and assess knowledge of terrorist operations. This paper describes the Asymmetric Threat Terrorist Assessment, Countering, and Knowledge (ATTACK) system. ATTACK has been developed to (a) data mine open source intelligence (OSINT) information from web-based newspaper sources, video news web casts, and actual terrorist web sites, (b) evaluate this information against a terrorism taxonomy, (c) exploit country/region specific social, economic, political, and religious knowledge, and (d) discover and predict potential terrorist activities and association links. Details of the asymmetric threat structure and the ATTACK system architecture are presented with results of an actual terrorist data mining and knowledge discovery test case shown.

  1. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  2. Cyber threat model for tactical radio networks

    Science.gov (United States)

    Kurdziel, Michael T.

    2014-05-01

    The shift to a full information-centric paradigm in the battlefield has allowed ConOps to be developed that are only possible using modern network communications systems. Securing these Tactical Networks without impacting their capabilities has been a challenge. Tactical networks with fixed infrastructure have similar vulnerabilities to their commercial counterparts (although they need to be secure against adversaries with greater capabilities, resources and motivation). However, networks with mobile infrastructure components and Mobile Ad hoc Networks (MANets) have additional unique vulnerabilities that must be considered. It is useful to examine Tactical Network based ConOps and use them to construct a threat model and baseline cyber security requirements for Tactical Networks with fixed infrastructure, mobile infrastructure and/or ad hoc modes of operation. This paper will present an introduction to threat model assessment. A definition and detailed discussion of a Tactical Network threat model is also presented. Finally, the model is used to derive baseline requirements that can be used to design or evaluate a cyber security solution that can be scaled and adapted to the needs of specific deployments.

  3. Evaluation of Potential Biological Threats in Ukraine

    International Nuclear Information System (INIS)

    Pozdnyakova, L.; Slavina, N.; Pozdnyakov, S.

    2007-01-01

    Dilating of biological threats spectrum, EDI diffusion opportunities and routes, unpredictability of outbreaks connected with connatural, technogenic, terrorist factors determines constant monitoring and readiness for operative BPA indication and identification. Scientific analytical approach of existing and probable regional bio-threats evaluation is necessary for adequate readiness system creation and maintenance of medical counteraction tactics to probable biological threats. Basing on the international experience, we carry out analysis of a situation present in Ukraine and routes for the decisions. The basic directions are: - Evaluation of a reality for EDI penetration from abroad and presence of conditions for their further diffusion inside the country. - Revealing of presence and definition of connatural EDI foci biocenoses features and BPAs. - Appropriate level of biological safety and physical protection of bio-laboratories and pathogens collections maintenance. - Gene/molecular and phenotypical definition of EDI circulating strains. - Creation of the circulating EDI gene/ phenotypic characteristics regional data bank. - Ranging of EDI actual for area. - Introduction of GPT, mathematical modeling and forecasting for tactics development in case of technogenic accidents and connatural outbreaks. - Methodical basis and equipment improvement for BPA system indication for well-timed identification of natural, or modified agent. - Education and training The international cooperation in maintenance of biosafety and bioprotection within the framework of scientific programs, grants, exchange of experience, introduction of international standards and rules are among basic factors in the decision for creating system national biosafety for countries not included in EU and the NATO. (author)

  4. Status threat, not economic hardship, explains the 2016 presidential vote.

    Science.gov (United States)

    Mutz, Diana C

    2018-05-08

    This study evaluates evidence pertaining to popular narratives explaining the American public's support for Donald J. Trump in the 2016 presidential election. First, using unique representative probability samples of the American public, tracking the same individuals from 2012 to 2016, I examine the "left behind" thesis (that is, the theory that those who lost jobs or experienced stagnant wages due to the loss of manufacturing jobs punished the incumbent party for their economic misfortunes). Second, I consider the possibility that status threat felt by the dwindling proportion of traditionally high-status Americans (i.e., whites, Christians, and men) as well as by those who perceive America's global dominance as threatened combined to increase support for the candidate who emphasized reestablishing status hierarchies of the past. Results do not support an interpretation of the election based on pocketbook economic concerns. Instead, the shorter relative distance of people's own views from the Republican candidate on trade and China corresponded to greater mass support for Trump in 2016 relative to Mitt Romney in 2012. Candidate preferences in 2016 reflected increasing anxiety among high-status groups rather than complaints about past treatment among low-status groups. Both growing domestic racial diversity and globalization contributed to a sense that white Americans are under siege by these engines of change. Copyright © 2018 the Author(s). Published by PNAS.

  5. Cyber situation awareness: modeling detection of cyber attacks with instance-based learning theory.

    Science.gov (United States)

    Dutt, Varun; Ahn, Young-Suk; Gonzalez, Cleotilde

    2013-06-01

    To determine the effects of an adversary's behavior on the defender's accurate and timely detection of network threats. Cyber attacks cause major work disruption. It is important to understand how a defender's behavior (experience and tolerance to threats), as well as adversarial behavior (attack strategy), might impact the detection of threats. In this article, we use cognitive modeling to make predictions regarding these factors. Different model types representing a defender, based on Instance-Based Learning Theory (IBLT), faced different adversarial behaviors. A defender's model was defined by experience of threats: threat-prone (90% threats and 10% nonthreats) and nonthreat-prone (10% threats and 90% nonthreats); and different tolerance levels to threats: risk-averse (model declares a cyber attack after perceiving one threat out of eight total) and risk-seeking (model declares a cyber attack after perceiving seven threats out of eight total). Adversarial behavior is simulated by considering different attack strategies: patient (threats occur late) and impatient (threats occur early). For an impatient strategy, risk-averse models with threat-prone experiences show improved detection compared with risk-seeking models with nonthreat-prone experiences; however, the same is not true for a patient strategy. Based upon model predictions, a defender's prior threat experiences and his or her tolerance to threats are likely to predict detection accuracy; but considering the nature of adversarial behavior is also important. Decision-support tools that consider the role of a defender's experience and tolerance to threats along with the nature of adversarial behavior are likely to improve a defender's overall threat detection.

  6. Phishing - A Growing Threat to E-Commerce

    OpenAIRE

    Banday, M. Tariq; Qadri, Jameel A.

    2011-01-01

    In today's business environment, it is difficult to imagine a workplace without access to the web, yet a variety of email born viruses, spyware, adware, Trojan horses, phishing attacks, directory harvest attacks, DoS attacks, and other threats combine to attack businesses and customers. This paper is an attempt to review phishing - a constantly growing and evolving threat to Internet based commercial transactions. Various phishing approaches that include vishing, spear phishng, pharming, keyl...

  7. Entry Threat and Entry Deterrence: The Timing of Broadband Rollout

    OpenAIRE

    Mo Xiao; Peter F. Orazem

    2007-01-01

    Past empirical literature provides strong evidence that competition increases when new firms enter a market. However, rarely have economists been able to examine how competition changes with the threat of entry. This paper uses the evolution of the zip code level market structure of facilities-based broadband providers from 1999 to 2004 to investigate how a firm adjusts its entry strategy when facing the threat of additional entrants. We identify the potential entrant into a local market as t...

  8. Software Requirement Specifications For ASocial Media Threat Assessment Tool

    Science.gov (United States)

    2017-12-01

    media means a much higher volume of threats than before, which taxes law enforcement’s ability to investigate each one. Complicating the investigation...Obtaining the identity of a Twitter account holder requires court paperwork based on probable cause or exigent circumstances. Second, social media...instant connectivity of social media means a much higher number of threats than before, which taxes law enforcement’s ability to investigate each one

  9. Understanding Cyber Threats and Vulnerabilities

    NARCIS (Netherlands)

    Luiijf, H.A.M.

    2012-01-01

    This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was first coined during the 1980s. Being the

  10. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  11. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  12. Threat from Emerging Vectorborne Viruses

    Centers for Disease Control (CDC) Podcasts

    2016-06-09

    Reginald Tucker reads an abridged version of the commentary by CDC author Ronald Rosenberg, Threat from Emerging Vectorborne Viruses.  Created: 6/9/2016 by National Center for Emerging and Zoonotic Infectious Diseases (NCEZID).   Date Released: 6/9/2016.

  13. The threat of soil salinity

    NARCIS (Netherlands)

    Daliakopoulos, I.N.; Tsanis, I.K.; Koutroulis, A.; Kourgialas, N.N.; Varouchakis, A.E.; Karatzas, G.P.; Ritsema, C.J.

    2016-01-01

    Soil salinisation is one of the major soil degradation threats occurring in Europe. The effects of salinisation can be observed in numerous vital ecological and non-ecological soil functions. Drivers of salinisation can be detected both in the natural and man-made environment, with climate and

  14. Insider Threat Security Reference Architecture

    Science.gov (United States)

    2012-04-01

    this challenge. CMU/SEI-2012-TR-007 | 2 2 The Components of the ITSRA Figure 2 shows the four layers of the ITSRA. The Business Security layer......organizations improve their level of preparedness to address the insider threat. Business Security Architecture Data Security Architecture

  15. Bomb Threats Taking Financial Toll

    Science.gov (United States)

    Bowman, Darcia Harris

    2004-01-01

    Despite all its efforts to crack down on the bomb scares that disrupted classes again and again in 2003, North Carolina's Orange County district fell victim to yet another false alarm this school year, 2004. For some schools, bomb threats have become more routine than fire drills, with each incident ringing up multi-thousand-dollar tabs for…

  16. The interRAI Acute Care instrument incorporated in an eHealth system for standardized and web-based geriatric assessment: strengths, weaknesses, opportunities and threats in the acute hospital setting

    Science.gov (United States)

    2013-01-01

    Background The interRAI Acute Care instrument is a multidimensional geriatric assessment system intended to determine a hospitalized older persons’ medical, psychosocial and functional capacity and needs. Its objective is to develop an overall plan for treatment and long-term follow-up based on a common set of standardized items that can be used in various care settings. A Belgian web-based software system (BelRAI-software) was developed to enable clinicians to interpret the output and to communicate the patients’ data across wards and care organizations. The purpose of the study is to evaluate the (dis)advantages of the implementation of the interRAI Acute Care instrument as a comprehensive geriatric assessment instrument in an acute hospital context. Methods In a cross-sectional multicenter study on four geriatric wards in three acute hospitals, trained clinical staff (nurses, occupational therapists, social workers, and geriatricians) assessed 410 inpatients in routine clinical practice. The BelRAI-system was evaluated by focus groups, observations, and questionnaires. The Strengths, Weaknesses, Opportunities and Threats were mapped (SWOT-analysis) and validated by the participants. Results The primary strengths of the BelRAI-system were a structured overview of the patients’ condition early after admission and the promotion of multidisciplinary assessment. Our study was a first attempt to transfer standardized data between home care organizations, nursing homes and hospitals and a way to centralize medical, allied health professionals and nursing data. With the BelRAI-software, privacy of data is guaranteed. Weaknesses are the time-consuming character of the process and the overlap with other assessment instruments or (electronic) registration forms. There is room for improving the user-friendliness and the efficiency of the software, which needs hospital-specific adaptations. Opportunities are a timely and systematic problem detection and continuity of

  17. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  18. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  19. A Wavelet Kernel-Based Primal Twin Support Vector Machine for Economic Development Prediction

    Directory of Open Access Journals (Sweden)

    Fang Su

    2013-01-01

    Full Text Available Economic development forecasting allows planners to choose the right strategies for the future. This study is to propose economic development prediction method based on the wavelet kernel-based primal twin support vector machine algorithm. As gross domestic product (GDP is an important indicator to measure economic development, economic development prediction means GDP prediction in this study. The wavelet kernel-based primal twin support vector machine algorithm can solve two smaller sized quadratic programming problems instead of solving a large one as in the traditional support vector machine algorithm. Economic development data of Anhui province from 1992 to 2009 are used to study the prediction performance of the wavelet kernel-based primal twin support vector machine algorithm. The comparison of mean error of economic development prediction between wavelet kernel-based primal twin support vector machine and traditional support vector machine models trained by the training samples with the 3–5 dimensional input vectors, respectively, is given in this paper. The testing results show that the economic development prediction accuracy of the wavelet kernel-based primal twin support vector machine model is better than that of traditional support vector machine.

  20. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  1. The Melbourne Family Support Program: evidence-based strategies that prepare family caregivers for supporting palliative care patients

    Science.gov (United States)

    Hudson, Peter; Aranda, Sanchia

    2014-01-01

    Background A key component of palliative care is support for family caregivers. Although some family caregivers identify positive aspects, the impact is typically burdensome; they are prone to physical and psychological morbidity, financial disadvantage and social isolation. Outcomes of systematic reviews have highlighted the importance of investment in family caregiver intervention research. Purpose To provide an overview of the development, evaluation and outcomes arising from of a programme of research (The Melbourne Family Support Program (FSP)), which focused on reducing the psychosocial burden of family caregivers. Methods Developmental work involved a systematic literature review; focus groups with family caregivers and health professionals; and identification of a conceptual framework. Following a pilot randomised controlled trial (RCT), a programme of psychoeducational intervention studies was developed and tested; one via RCT, the others via prepost test. Results Four psychoeducational interventions, incorporating one-to-one and group format delivery, conducted in both the home and inpatient hospital/hospice were evaluated. Statistically significant outcomes included improvements in family caregivers’ preparedness, competence, positive emotions, more favourable levels of psychological wellbeing and a reduction in unmet needs. Internationally endorsed guidelines for the psychosocial support of family caregivers were produced and several resources were constructed. Fifteen publications in international peer-reviewed journals have arisen from this programme. Conclusions The interventions and resources from the Melbourne FSP provide several evidenced-based and clinically relevant approaches that focus on reducing the psychosocial burden of the caregiving role. In several instances, however, more rigorous methodological testing is advocated. PMID:24644195

  2. Rethinking climate change as a security threat

    Energy Technology Data Exchange (ETDEWEB)

    Schoch, Corinne

    2011-10-15

    Once upon a time climate change was a strictly environment and development issue. Today it has become a matter of national and international security. Efforts to link climate change with violent conflict may not be based on solid evidence, but they have certainly captured the attention of governments. They have played a vital role in raising the much-needed awareness of climate change as an issue that deserves global action. But at what cost? Focusing on climate change as a security threat alone risks devolving humanitarian responsibilities to the military, ignoring key challenges and losing sight of those climate-vulnerable communities that stand most in need of protection.

  3. Cybersecurity Public Sector Threats and Responses

    CERN Document Server

    Andreasson, Kim J

    2011-01-01

    The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks. An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around

  4. Big-Data Based Decision-Support Systems to Improve Clinicians’ Cognition

    Science.gov (United States)

    Roosan, Don; Samore, Matthew; Jones, Makoto; Livnat, Yarden; Clutter, Justin

    2016-01-01

    Complex clinical decision-making could be facilitated by using population health data to inform clinicians. In two previous studies, we interviewed 16 infectious disease experts to understand complex clinical reasoning. For this study, we focused on answers from the experts on how clinical reasoning can be supported by population-based Big-Data. We found cognitive strategies such as trajectory tracking, perspective taking, and metacognition has the potential to improve clinicians’ cognition to deal with complex problems. These cognitive strategies could be supported by population health data, and all have important implications for the design of Big-Data based decision-support tools that could be embedded in electronic health records. Our findings provide directions for task allocation and design of decision-support applications for health care industry development of Big data based decision-support systems. PMID:27990498

  5. Big-Data Based Decision-Support Systems to Improve Clinicians' Cognition.

    Science.gov (United States)

    Roosan, Don; Samore, Matthew; Jones, Makoto; Livnat, Yarden; Clutter, Justin

    2016-01-01

    Complex clinical decision-making could be facilitated by using population health data to inform clinicians. In two previous studies, we interviewed 16 infectious disease experts to understand complex clinical reasoning. For this study, we focused on answers from the experts on how clinical reasoning can be supported by population-based Big-Data. We found cognitive strategies such as trajectory tracking, perspective taking, and metacognition has the potential to improve clinicians' cognition to deal with complex problems. These cognitive strategies could be supported by population health data, and all have important implications for the design of Big-Data based decision-support tools that could be embedded in electronic health records. Our findings provide directions for task allocation and design of decision-support applications for health care industry development of Big data based decision-support systems.

  6. Optimization-based decision support systems for planning problems in processing industries

    OpenAIRE

    Claassen, G.D.H.

    2014-01-01

    Summary Optimization-based decision support systems for planning problems in processing industries Nowadays, efficient planning of material flows within and between supply chains is of vital importance and has become one of the most challenging problems for decision support in practice. The tremendous progress in hard- and software of the past decades was an important gateway for developing computerized systems that are able to support decision making on different levels within enterprises. T...

  7. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  8. Introduced organisms pose the most significant threat to the ...

    African Journals Online (AJOL)

    spamer

    Introduced organisms pose the most significant threat to the conservation status of oceanic islands (e.g.. Williamson 1996). Subantarctic Prince Edward Island, the smaller of the two islands in the Prince Edward. Island group, has few introduced organisms; it is cur- rently known to support only three introduced animals.

  9. The indoor as a scene for biological threats

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Gunnarsen, Lars; Bräuner, Elvira

    2014-01-01

    The paper presents the result of involving users in developing a user-friendly device for easy and fast detection of bio-threats in indoor settings. Bio-protect is a project supported by the European Commission, with the concept of developing a fast-alert, mobile, easy-to-use device to detect and...

  10. Law Enforcement Use of Threat Assessments to Predict Violence

    Science.gov (United States)

    Wood, Tracey Michelle

    2016-01-01

    The purpose of this qualitative, descriptive multiple case study was to explore what process, policies and procedures, or set of empirically supported norms governed law enforcement officers in a selected county in the southwest region of the United States when threat assessments were conducted on potentially violent subjects threatening mass…

  11. Survey of Threats and Assaults by Patients on Psychiatry Residents

    Science.gov (United States)

    Dvir, Yael; Moniwa, Emiko; Crisp-Han, Holly; Levy, Dana; Coverdale, John H.

    2012-01-01

    Objective: The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents, their consequences, and the perceived adequacy of supports and institutional responses. Method: Authors conducted an anonymous survey of 519 psychiatry residents in 13 psychiatry programs across the United States. The survey…

  12. Filling in biodiversity threat gaps

    DEFF Research Database (Denmark)

    Joppa, L. N.; O'Connor, Brian; Visconti, Piero

    2016-01-01

    increase to 10,000 times the background rate should species threatened with extinction succumb to pressures they face (4). Reversing these trends is a focus of the Convention on Biological Diversity's 2020 Strategic Plan for Biodiversity and its 20 Aichi Targets and is explicitly incorporated...... into the United Nations' 2030 Agenda for Sustainable Development and its 17 Sustainable Development Goals (SDGs). We identify major gaps in data available for assessing global biodiversity threats and suggest mechanisms for closing them....

  13. Military Expenditure, Threats, and Growth

    OpenAIRE

    Aizenman, Joshua; Glick, Reuven

    2003-01-01

    This paper clarifies one of the puzzling results of the economic growth literature: the impact of military expenditure is frequently found to be non-significant or negative, yet most countries spend a large fraction of their GDP on defense and the military. We start by empirical evaluation of the non- linear interactions between military expenditure, external threats, corruption, and other relevant controls. While growth falls with higher levels of military spending, given the values of the o...

  14. Support to Academic Based Research on Leadership Vision and Gender Implications

    National Research Council Canada - National Science Library

    Murphy, Sally

    1997-01-01

    The purpose of this paper is to describe U.S. Army War College (AWC) support to an academic based research project on leadership vision and to recommend expanded support to similar research by students, faculty, and staff of the AWC...

  15. Support to Academic Based Research on Leadership Vision and Gender Implications

    National Research Council Canada - National Science Library

    Murphy, Sally

    1997-01-01

    .... Support to Academic Based Research on Leadership Vision and Gender Implications suggests that additional scholarly research, including that which can be leveraged by the U.S. Army from academic institutional efforts, is necessary to achieve the vision of the fourth AWC and to support the U.S. Army in its re-engineering efforts.

  16. Changes in Social Support over Time in a Faith-Based Physical Activity Intervention

    Science.gov (United States)

    Story, Chandra R.; Knutson, Douglas; Brown, Jameisha B.; Spears-Laniox, Erica; Harvey, Idethia Shevon; Gizlice, Ziya; Whitt-Glover, Melicia C.

    2017-01-01

    African-American women report higher levels of chronic conditions and church attendance relative to the overall US population. Therefore, efforts have increased over the past decade to design church-based health promotion programs. The present study compared changes in religiosity, religious social support and general social support across time…

  17. Knowledge-Based Information Management in Decision Support for Ecosystem Management

    Science.gov (United States)

    Keith Reynolds; Micahel Saunders; Richard Olson; Daniel Schmoldt; Michael Foster; Donald Latham; Bruce Miller; John Steffenson; Lawrence Bednar; Patrick Cunningham

    1995-01-01

    The Pacific Northwest Research Station (USDA Forest Service) is developing a knowledge-based information management system to provide decision support for watershed analysis in the Pacific Northwest region of the U.S. The decision support system includes: (1) a GIS interface that allows users to graphically navigate to specific provinces and watersheds and display a...

  18. Optimization-based decision support systems for planning problems in processing industries

    NARCIS (Netherlands)

    Claassen, G.D.H.

    2014-01-01

    Summary

    Optimization-based decision support systems for planning problems in processing industries

    Nowadays, efficient planning of material flows within and between supply chains is of vital importance and has become one of the most challenging problems for decision support in

  19. EMDS users guide (version 2.0): knowledge-based decision support for ecological assessment.

    Science.gov (United States)

    Keith M. Reynolds

    1999-01-01

    The USDA Forest Service Pacific Northwest Research Station in Corvallis, Oregon, has developed the ecosystem management decision support (EMDS) system. The system integrates the logical formalism of knowledge-based reasoning into a geographic information system (GIS) environment to provide decision support for ecological landscape assessment and evaluation. The...

  20. The role of support and promoter on the oxidation of sulfur dioxide using platinum based catalysts

    DEFF Research Database (Denmark)

    Koutsopoulos, Sotiris; Rasmussen, Søren Birk; Eriksen, Kim Michael

    2006-01-01

    The catalytic oxidation of SO2 to SO3 was studied over platinum based catalysts in the absence and the presence of dopants. The active metal was supported on silica gel or titania (anatase) by impregnation. The activities of the silica supported catalysts were found to follow the order PtRh/SiO2 ...

  1. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  2. Stereotype threat's effect on women's achievement in chemistry: The interaction of achievement goal orientation for women in science majors

    Science.gov (United States)

    Conway-Klaassen, Janice Marjorie

    type threat effect which reduced the differences among the experimental conditions. However, there were significant findings related to the participants' achievement goal orientations. Individuals in the stereotype threat condition displayed higher levels of performance avoidance, overall performance, and overall avoidance goal orientations consistent with the existing literature. Post-hoc open-ended questionnaires revealed that most participants believed that men and women were equally capable in mathematics and sciences but that they also had an awareness of the negative stereotype against women in mathematics and sciences among the public. This study supports the demonstration of stereotype threat effects on women who are enrolled in science based college majors. Although I was not able to create a stereotype threat effect on their chemistry challenge test scores, I was able to demonstrate an effect on their achievement goal orientations, which has implications for instructional design and standardized testing.

  3. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  4. MODIS-Based Products for Operational Decision Support Systems, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — SMH Consulting proposes to develop a web-based decision support system to assist in Rapid Assessment, Monitoring, and Management (RAMM-DSS) on a regional scale. SMH...

  5. AWESOME: A widget-based dashboard for awareness-support in Research Networks

    NARCIS (Netherlands)

    Reinhardt, Wolfgang; Mletzko, Christian; Drachsler, Hendrik; Sloep, Peter

    2011-01-01

    Reinhardt, W., Mletzko, C., Drachsler, H., & Sloep, P. B. (2011). AWESOME: A widget-based dashboard for awareness-support in Research Networks. In Proceedings of The PLE Conference 2011. July, 11-13, 2011, Southampton, UK.

  6. Learning Algorithms for Audio and Video Processing: Independent Component Analysis and Support Vector Machine Based Approaches

    National Research Council Canada - National Science Library

    Qi, Yuan

    2000-01-01

    In this thesis, we propose two new machine learning schemes, a subband-based Independent Component Analysis scheme and a hybrid Independent Component Analysis/Support Vector Machine scheme, and apply...

  7. A Decision Support Framework For Science-Based, Multi-Stakeholder Deliberation: A Coral Reef Example

    Science.gov (United States)

    We present a decision support framework for science-based assessment and multi-stakeholder deliberation. The framework consists of two parts: a DPSIR (Drivers-Pressures-States-Impacts-Responses) analysis to identify the important causal relationships among anthropogenic environ...

  8. Using satellite-based rainfall data to support the implementation of ...

    African Journals Online (AJOL)

    2009-10-30

    Oct 30, 2009 ... of environmental water requirements in South Africa ... The methods currently available in South Africa to implement environmental flows are based on ..... B and TENTE T (2009) Decision support system for the Berg River.

  9. An open-loop, physiologic model-based decision support system can provide appropriate ventilator settings

    DEFF Research Database (Denmark)

    Karbing, Dan Stieper; Spadaro, Savino; Dey, Nilanjan

    2018-01-01

    OBJECTIVES: To evaluate the physiologic effects of applying advice on mechanical ventilation by an open-loop, physiologic model-based clinical decision support system. DESIGN: Prospective, observational study. SETTING: University and Regional Hospitals' ICUs. PATIENTS: Varied adult ICU population...

  10. Semantic-Based Concurrency Control for Object-Oriented Database Systems Supporting Real-Time Applications

    National Research Council Canada - National Science Library

    Lee, Juhnyoung; Son, Sang H

    1994-01-01

    .... This paper investigates major issues in designing semantic-based concurrency control for object-oriented database systems supporting real-time applications, and it describes approaches to solving...

  11. Planning and management support for NPP personnel SAT-based training programmes

    International Nuclear Information System (INIS)

    Ziakova, M.

    1998-01-01

    Planning and management support for NPP personnel SAT-based training programmes is described for the following job positions: reactor operator; turbine operator; reactor maintenance worker; pump maintenance worker; chemistry foreman; health physics foreman; electric maintenance worker

  12. Is energy cropping in Europe compatible with biodiversity? – Opportunities and threats to biodiversity from land-based production of biomass for bioenergy purposes

    NARCIS (Netherlands)

    Pedroli, G.B.M.; Elbersen, B.S.; Frederiksen, P.; Grandin, U.; Heikkilä, R.; Krogh, P.H.; Izakovicová, Z.; Johansen, A.; Meiresonne, L.; Spijker, J.H.

    2013-01-01

    Based on literature and six country studies (Belgium, Denmark, Finland, Netherlands, Sweden, Slovakia) this paper discusses the compatibility of the EU 2020 targets for renewable energy with conservation of biodiversity. We conclude that increased demand for biomass for bioenergy purposes may lead

  13. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  14. Game-based versus storyboard-based evaluations of crew support prototypes for long duration missions

    NARCIS (Netherlands)

    Smets, N.J.J.M.; Abbing, M.S.; Neerincx, M.A.; Lindenberg, J.; Oostendorp, H. van

    2010-01-01

    The Mission Execution Crew Assistant (MECA) is developing a distributed system of electronic partners (ePartners) to support astronauts performing nominal and off- nominal actions in long duration missions. The ePartners' support should adequately deal with the dynamics of the context, operations,

  15. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  16. Frequency support capability of variable speed wind turbine based on electromagnetic coupler

    DEFF Research Database (Denmark)

    You, Rui; Barahona Garzón, Braulio; Chai, Jianyun

    2015-01-01

    In the variable speed wind turbine based on electromagnetic coupler (WT-EMC), a synchronous generator is directly coupled with grid. So like conventional power plants WT-EMC is able to support grid frequency inherently. But due to the reduced inertia of synchronous generator, its frequency support...... capability has to be enhanced. In this paper, the frequency support capability of WT-EMC is studied at three typical wind conditions and with two control strategies-droop control and inertial control to enhance its frequency support capability. The synchronous generator speed, more stable than the grid...

  17. A work-based learning approach for clinical support workers on mental health inpatient wards.

    Science.gov (United States)

    Kemp, Philip; Gilding, Moorene; Seewooruttun, Khooseal; Walsh, Hannah

    2016-09-14

    Background With a rise in the number of unqualified staff providing health and social care, and reports raising concerns about the quality of care provided, there is a need to address the learning needs of clinical support workers. This article describes a qualitative evaluation of a service improvement project that involved a work-based learning approach for clinical support workers on mental health inpatient wards. Aim To investigate and identify insights in relation to the content and process of learning using a work-based learning approach for clinical support workers. Method This was a qualitative evaluation of a service improvement project involving 25 clinical support workers at the seven mental health inpatient units in South London and Maudsley NHS Foundation Trust. Three clinical skills tutors were appointed to develop, implement and evaluate the work-based learning approach. Four sources of data were used to evaluate this approach, including reflective journals, qualitative responses to questionnaires, three focus groups involving the clinical support workers and a group interview involving the clinical skills tutors. Data were analysed using thematic analysis. Findings The work-based learning approach was highly valued by the clinical support workers and enhanced learning in practice. Face-to-face learning in practice helped the clinical support workers to develop practice skills and reflective learning skills. Insights relating to the role of clinical support workers were also identified, including the benefits of face-to-face supervision in practice, particularly in relation to the interpersonal aspects of care. Conclusion A work-based learning approach has the potential to enhance care delivery by meeting the learning needs of clinical support workers and enabling them to apply learning to practice. Care providers should consider how the work-based learning approach can be used on a systematic, organisation-wide basis in the context of budgetary

  18. Societal threat, authoritarianism, conservatism, and U.S. state death penalty sentencing (1977-2004).

    Science.gov (United States)

    McCann, Stewart J H

    2008-05-01

    On the basis of K. Stenner's (2005) authoritarian dynamic theory, it was hypothesized that the number of death sentences and executions would be higher in more threatened conservative states than in less threatened conservative states, and would be lower in more threatened liberal states than in less threatened liberal states. Threat was based on state homicide rate, violent crime rate, and non-White percentage of population. Conservatism was based on state voter ideological identification, Democratic and Republican Party elite liberalism-conservatism, policy liberalism-conservatism, religious fundamentalism, degree of economic freedom, and 2004 presidential election results. For 1977-2004, with controls for state population and years with a death penalty provision, the interactive hypothesis received consistent support using the state conservatism composite and voter ideological identification alone. As well, state conservatism was related to death penalties and executions, but state threat was not. The temporal stability of the findings was demonstrated with a split-half internal replication using the periods 1977-1990 and 1991-2004. The interactive hypothesis and the results also are discussed in the context of other threat-authoritarianism theories and terror management theory. (c) 2008 APA, all rights reserved

  19. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    , descriptive and intense language enhance those levels, not only increase people’s reception of messages, but also and their willingness to change their behaviour. Conclusion: The findings of this study hold important implications for news agencies to consider combining threat and efficacy and using language skilfully and persuasively to create effective cancer risk messages. This work was supported by the Transdisciplinary Research Grant Scheme (TRGS of the Ministry of Higher Education awarded to the researchers at Universiti Malaysia Sarawak: C09/TRGS/1519/2016.

  20. The Melbourne Family Support Program: evidence-based strategies that prepare family caregivers for supporting palliative care patients.

    Science.gov (United States)

    Hudson, Peter; Aranda, Sanchia

    2014-09-01

    A key component of palliative care is support for family caregivers. Although some family caregivers identify positive aspects, the impact is typically burdensome; they are prone to physical and psychological morbidity, financial disadvantage and social isolation. Outcomes of systematic reviews have highlighted the importance of investment in family caregiver intervention research. To provide an overview of the development, evaluation and outcomes arising from of a programme of research (The Melbourne Family Support Program (FSP)), which focused on reducing the psychosocial burden of family caregivers. Developmental work involved a systematic literature review; focus groups with family caregivers and health professionals; and identification of a conceptual framework. Following a pilot randomised controlled trial (RCT), a programme of psychoeducational intervention studies was developed and tested; one via RCT, the others via prepost test. Four psychoeducational interventions, incorporating one-to-one and group format delivery, conducted in both the home and inpatient hospital/hospice were evaluated. Statistically significant outcomes included improvements in family caregivers' preparedness, competence, positive emotions, more favourable levels of psychological wellbeing and a reduction in unmet needs. Internationally endorsed guidelines for the psychosocial support of family caregivers were produced and several resources were constructed. Fifteen publications in international peer-reviewed journals have arisen from this programme. The interventions and resources from the Melbourne FSP provide several evidenced-based and clinically relevant approaches that focus on reducing the psychosocial burden of the caregiving role. In several instances, however, more rigorous methodological testing is advocated. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  1. Employer-Based Programs to Support Breastfeeding Among Working Mothers: A Systematic Review.

    Science.gov (United States)

    Dinour, Lauren M; Szaro, Jacalyn M

    2017-04-01

    Many mothers experience barriers to maintaining a breastfeeding relationship with their infants upon returning to work and, consequently, terminate breastfeeding earlier than recommended or intended. As such, employers are in a unique position to help further increase breastfeeding rates, durations, and exclusivity. The purpose of this review is to examine the literature regarding employer-based programs, policies, and interventions to support breastfeeding among working mothers. A systematic literature search was conducted for peer-reviewed articles published before April 2016. Studies were included if they focused on workplace-based lactation/breastfeeding support programs, policies, or interventions to promote breastfeeding among employees. For inclusion, articles must have measured at least one outcome, such as breastfeeding duration, breastfeeding exclusivity, or employee satisfaction. Twenty-two articles were included, representing 10 different countries and both public- and private-sector employers, including governmental offices, schools, hospitals, manufacturing/industrial companies, and financial settings, among others. Providing a lactation space was the most common employer-based support accommodation studied, followed by breastfeeding breaks and comprehensive lactation support programs. The majority of studies analyzing these three support types found at least one positive breastfeeding and/or nonbreastfeeding outcome. This review suggests that maintaining breastfeeding while working is not only possible but also more likely when employers provide the supports that women need to do so. Although some employers may have more extensive breastfeeding support policies and practices than others, all employers can implement a breastfeeding support program that fits their company's budget and resources.

  2. Support for Programming Models in Network-on-Chip-based Many-core Systems

    DEFF Research Database (Denmark)

    Rasmussen, Morten Sleth

    This thesis addresses aspects of support for programming models in Network-on- Chip-based many-core architectures. The main focus is to consider architectural support for a plethora of programming models in a single system. The thesis has three main parts. The first part considers parallelization...... models to be supported by a single architecture. The architecture features a specialized network interface processor which allows extensive configurability of the memory system. Based on this architecture, a detailed implementation of the cache coherent shared memory programming model is presented...

  3. Mitigation of the threat posed to transfusion by donors traveling to Zika-affected areas: a Canadian risk-based approach.

    Science.gov (United States)

    Germain, Marc; Delage, Gilles; O'Brien, Sheila F; Grégoire, Yves; Fearon, Margaret; Devine, Dana

    2017-10-01

    The recent spread of the Zika virus to the Americas and the recognition that it can cause severe disease in the developing fetus has prompted the adoption of measures to mitigate the risk that this virus might pose to transfusion safety. In nonendemic countries, the risk to transfusion results from donors traveling to an endemic region. Canada implemented a 21-day temporary deferral for prospective donors who traveled to such regions. We present the rationale for this policy, including a quantitative risk assessment supported by a Monte Carlo simulation. The model considered the following parameters, each with specified values and ranges: the probability that a donor recently returned from a Zika-endemic region, the duration of travel to this region, the daily risk of acquiring Zika while in an endemic region, and the incubation and viremic periods. We ran the simulation 20 times, each with 10 million iterations. In the absence of any travel deferral, 32 donors (range, 20-46 donors) would be able to donate while still being at risk of transmitting Zika, corresponding to a rate of 1:312,500 (range, 1:217,000 to 1:500,000). None of these donors would be viremic beyond 21 days after returning from their travel, with a risk estimated at less than 1:200,000,000. A 21-day temporary travel deferral offers an extremely wide margin of safety for the possible transmission of Zika by a donation obtained from someone who recently returned from a country where the virus is circulating. © 2017 AABB.

  4. [Development of a medical equipment support information system based on PDF portable document].

    Science.gov (United States)

    Cheng, Jiangbo; Wang, Weidong

    2010-07-01

    According to the organizational structure and management system of the hospital medical engineering support, integrate medical engineering support workflow to ensure the medical engineering data effectively, accurately and comprehensively collected and kept in electronic archives. Analyse workflow of the medical, equipment support work and record all work processes by the portable electronic document. Using XML middleware technology and SQL Server database, complete process management, data calculation, submission, storage and other functions. The practical application shows that the medical equipment support information system optimizes the existing work process, standardized and digital, automatic and efficient orderly and controllable. The medical equipment support information system based on portable electronic document can effectively optimize and improve hospital medical engineering support work, improve performance, reduce costs, and provide full and accurate digital data

  5. Exploring Nurse Manager Support of Evidence-Based Practice: Clinical Nurse Perceptions.

    Science.gov (United States)

    Caramanica, Laura; Spiva, LeeAnna

    2018-05-01

    The study identifies what constitutes nurse manager (NM) support and other resources that enable clinical nurses (CNs) to engage in evidence-based practice (EBP). Clinical nurses report that NM support enables them to use EBP but what constitutes NM support is still unclear. Nurse managers, CNs, and EBP mentors received specialized education and use a team approach for EBP. Data were collected preintervention, mid-intervention, and postintervention from observations, interviews, journaling, and surveys. Results demonstrate how NMs can perform their role responsibilities and still engage CNs to develop a spirit of inquiry, seek answers to their clinical questions using EBP, and advance their clinical performance to improve patient outcomes. Four NM supportive behaviors emerged: cultivating a shared EBP vision, ensuring use of EBP, communicating the value of EBP, and providing resources for EBP. Through education and support, NMs describe supportive behaviors necessary for the successful conduction of EBP by CNs.

  6. Evidence-Based Support for the Characteristics of Tsunami Warning Messages for Local, Regional and Distant Sources

    Science.gov (United States)

    Gregg, C. E.; Johnston, D. M.; Sorensen, J. H.; Vogt Sorensen, B.; Whitmore, P.

    2014-12-01

    Many studies since 2004 have documented the dissemination and receipt of risk information for local to distant tsunamis and factors influencing people's responses. A few earlier tsunami studies and numerous studies of other hazards provide additional support for developing effective tsunami messages. This study explores evidence-based approaches to developing such messages for the Pacific and National Tsunami Warning Centers in the US. It extends a message metric developed for the NWS Tsunami Program. People at risk to tsunamis receive information from multiple sources through multiple channels. Sources are official and informal and environmental and social cues. Traditionally, official tsunami messages followed a linear dissemination path through relatively few channels from warning center to emergency management to public and media. However, the digital age has brought about a fundamental change in the dissemination and receipt of official and informal communications. Information is now disseminated in very non-linear paths and all end-user groups may receive the same message simultaneously. Research has demonstrated a range of factors that influence rapid respond to an initial real or perceived threat. Immediate response is less common than one involving delayed protective actions where people first engage in "milling behavior" to exchange information and confirm the warning before taking protective action. The most important message factors to achieve rapid response focus on the content and style of the message and the frequency of dissemination. Previously we developed a tsunami message metric consisting of 21 factors divided into message content and style and receiver characteristics. Initially, each factor was equally weighted to identify gaps, but here we extend the work by weighting specific factors. This utilizes recent research that identifies the most important determinants of protective action. We then discuss the prioritization of message information

  7. Complementary methods to plan pedestrian evacuation of the French Riviera's beaches in case of tsunami threat: graph- and multi-agent-based modelling

    Directory of Open Access Journals (Sweden)

    A. Sahal

    2013-07-01

    Full Text Available Small amplitude tsunamis have impacted the French Mediterranean shore (French Riviera in the past centuries. Some caused casualties; others only generated economic losses. While the North Atlantic and Mediterranean tsunami warning system is being tested and is almost operational, no awareness and preparedness measure is being implemented at a local scale. Evacuation is to be considered along the French Riviera, but no plan exists within communities. We show that various approaches can provide local stakeholders with evacuation capacities assessments to develop adapted evacuation plans through the case study of the Cannes–Antibes region. The complementarity between large- and small-scale approaches is demonstrated with the use of macro-simulators (graph-based and micro-simulators (multi-agent-based to select shelter points and choose evacuation routes for pedestrians located on the beach. The first one allows automatically selecting shelter points and measuring and mapping their accessibility. The second one shows potential congestion issues during pedestrian evacuations, and provides leads for the improvement of urban environment. Temporal accessibility to shelters is compared to potential local and distal tsunami travel times, showing a 40 min deficit for an adequate crisis management in the first scenario, and a 30 min surplus for the second one.

  8. Complementary methods to plan pedestrian evacuation of the French Riviera's beaches in case of tsunami threat: graph- and multi-agent-based modelling

    Science.gov (United States)

    Sahal, A.; Leone, F.; Péroche, M.

    2013-07-01

    Small amplitude tsunamis have impacted the French Mediterranean shore (French Riviera) in the past centuries. Some caused casualties; others only generated economic losses. While the North Atlantic and Mediterranean tsunami warning system is being tested and is almost operational, no awareness and preparedness measure is being implemented at a local scale. Evacuation is to be considered along the French Riviera, but no plan exists within communities. We show that various approaches can provide local stakeholders with evacuation capacities assessments to develop adapted evacuation plans through the case study of the Cannes-Antibes region. The complementarity between large- and small-scale approaches is demonstrated with the use of macro-simulators (graph-based) and micro-simulators (multi-agent-based) to select shelter points and choose evacuation routes for pedestrians located on the beach. The first one allows automatically selecting shelter points and measuring and mapping their accessibility. The second one shows potential congestion issues during pedestrian evacuations, and provides leads for the improvement of urban environment. Temporal accessibility to shelters is compared to potential local and distal tsunami travel times, showing a 40 min deficit for an adequate crisis management in the first scenario, and a 30 min surplus for the second one.

  9. Amygdala lesions in rhesus macaques decrease attention to threat

    Science.gov (United States)

    Dal Monte, Olga; Costa, Vincent D.; Noble, Pamela L.; Murray, Elisabeth A.; Averbeck, Bruno B.

    2015-01-01

    Evidence from animal and human studies has suggested that the amygdala plays a role in detecting threat and in directing attention to the eyes. Nevertheless, there has been no systematic investigation of whether the amygdala specifically facilitates attention to the eyes or whether other features can also drive attention via amygdala processing. The goal of the present study was to examine the effects of amygdala lesions in rhesus monkeys on attentional capture by specific facial features, as well as gaze patterns and changes in pupil dilation during free viewing. Here we show reduced attentional capture by threat stimuli, specifically the mouth, and reduced exploration of the eyes in free viewing in monkeys with amygdala lesions. Our findings support a role for the amygdala in detecting threat signals and in directing attention to the eye region of faces when freely viewing different expressions. PMID:26658670

  10. Studies Regarding the Membranous Support of a Glucose Biosensor Based on Gox

    Directory of Open Access Journals (Sweden)

    Otilia Bizerea-Spiridon

    2010-05-01

    Full Text Available To obtain glucose biosensors based on glucose oxidase (GOx, the enzyme can be immobilized on the sensitive surface of a glass electrode by different techniques: deposition on membranous support (cellophane or other macromolecular material or entrapment in a matrix. Deposition on membranous support also involves cross-linking with glutaraldehyde or entrapment in silica gel, following the sol-gel procedure. The aim of this preliminary work was to study the influence of cellophane replacement with a PVA based membranous support on the glucose biosensor performance. The data obtained at pH measurements of buffer solutions with cellophane and PVA membranous supports respectively, show that the PVA based membrane assures superior performances of the biosensor for low glucose concentrations determination (about 10-4 M. These results allow the transition to an improved immobilization technique, namely the enzyme entrapment in membranous material.

  11. The use of GIS-based support of recreational trail planning by local governments

    DEFF Research Database (Denmark)

    Olafsson, Anton Stahl; Skov-Petersen, Hans

    2014-01-01

    In the last decade, multiple GIS-based planning support systems have been developed in order to improve the basis for spatial planning. Recent research has focused on problems regarding a lack of utilisation or barriers to the use of advanced GIS and GIS-based planning support systems in planning...... applications. This paper discusses these research findings in the context of outdoor recreational planning by local governments in Denmark. According to a national survey of municipal planners, GIS-based planning support is widely used in Denmark, but more GIS is needed and is being requested for local outdoor...... recreation planning. However, considerable differences exist between the ways municipalities assess their need for and use of GIS planning support. These differences are explored in more detail using a factor analysis of planning variables and uses of GIS. Three situations are described: 1) extensive network...

  12. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  13. The Needs-Based Assessment of Parental (Guardian) Support: a test of its validity and reliability.

    Science.gov (United States)

    Bolen, Rebecca M; Leah Lamb, J; Gradante, Jennifer

    2002-10-01

    The purpose of this paper is to present a newly developed measure of guardian support, the Needs-Based Assessment of Parental (Guardian) Support (NAPS), an empirical evaluation of that measure, and its comparison with another measure of guardian support. The theoretical model that underlies this measure applies humanistic theory and Maslow's hierarchy of needs to the understanding of guardian support. The study employed a cross-sectional nonexperimental survey design using 183 nonoffending guardians who accompanied children presenting for a medical/forensic examination for sexual abuse. The NAPS and an existing measure of guardian support were administered during the hospital outpatient visit, and basic information concerning the child and abuse situations were gathered. The NAPS had robust psychometric properties and was culturally sensitive. Tests of specific hypotheses supported the construct validity of the measure and a conceptualization of guardian support as hierarchical, with four stages of support. The brevity and ease of administration of the NAPS for both the clinician and guardian suggest that it is a viable assessment tool. The strong support for the NAPS' underlying theoretical model suggests that the nonoffending guardians' available resources need to be considered when assessing guardian support.

  14. Problems and Issues in Using Computer- Based Support Tools to Enhance 'Soft' Systems Methodologies

    Directory of Open Access Journals (Sweden)

    Mark Stansfield

    2001-11-01

    Full Text Available This paper explores the issue of whether computer-based support tools can enhance the use of 'soft' systems methodologies as applied to real-world problem situations. Although work has been carried out by a number of researchers in applying computer-based technology to concepts and methodologies relating to 'soft' systems thinking such as Soft Systems Methodology (SSM, such attempts appear to be still in their infancy and have not been applied widely to real-world problem situations. This paper will highlight some of the problems that may be encountered in attempting to develop computer-based support tools for 'soft' systems methodologies. Particular attention will be paid to an attempt by the author to develop a computer-based support tool for a particular 'soft' systems method of inquiry known as the Appreciative Inquiry Method that is based upon Vickers' notion of 'appreciation' (Vickers, 196S and Checkland's SSM (Checkland, 1981. The final part of the paper will explore some of the lessons learnt from developing and applying the computer-based support tool to a real world problem situation, as well as considering the feasibility of developing computer-based support tools for 'soft' systems methodologies. This paper will put forward the point that a mixture of manual and computer-based tools should be employed to allow a methodology to be used in an unconstrained manner, but the benefits provided by computer-based technology should be utilised in supporting and enhancing the more mundane and structured tasks.

  15. Supporting Problem Solving with Case-Stories Learning Scenario and Video-based Collaborative Learning Technology

    Directory of Open Access Journals (Sweden)

    Chun Hu

    2004-04-01

    Full Text Available In this paper, we suggest that case-based resources, which are used for assisting cognition during problem solving, can be structured around the work of narratives in social cultural psychology. Theories and other research methods have proposed structures within narratives and stories which may be useful to the design of case-based resources. Moreover, embedded within cases are stories which are contextually rich, supporting the epistemological groundings of situated cognition. Therefore the purposes of this paper are to discuss possible frameworks of case-stories; derive design principles as to “what” constitutes a good case story or narrative; and suggest how technology can support story-based learning. We adopt video-based Computer-Supported Collaborative Learning (CSCL technology to support problem solving with case-stories learning scenarios. Our hypothesis in this paper is that well-designed case-based resources are able to aid in the cognitive processes undergirding problem solving and meaning making. We also suggest the use of an emerging video-based collaborative learning technology to support such an instructional strategy.

  16. New threats to academic freedom.

    Science.gov (United States)

    Minerva, Francesca

    2014-05-01

    Using a specific case as an example, the article argues that the Internet allows dissemination of academic ideas to the general public in ways that can sometimes pose a threat to academic freedom. Since academic freedom is a fundamental element of academia and since it benefits society at large, it is important to safeguard it. Among measures that can be taken in order to achieve this goal, the publication of anonymous research seems to be a good option. © 2013 John Wiley & Sons Ltd.

  17. Nuclear terrorism - Threat or not?

    Science.gov (United States)

    Pomper, Miles A.; Tarini, Gabrielle

    2017-11-01

    A terrorist attack using nuclear or radiological materials is a low-probability event, but if executed, would lead to unprecedented socio-economic, material, and psychological disruption and damage. This chapter seeks to provide a sound assessment of the scope and nature of the threat by examining the different types of nuclear terrorism, each of which poses different risks, involves different barriers to success, and requires different terrorist capabilities. In addition, the chapter aims to provide an overview of the sources and nature of terrorists' motivations to employ a nuclear attack.

  18. The threat of nuclear war

    International Nuclear Information System (INIS)

    1985-01-01

    This report aims to describe the present threat of nuclear war, with particular reference to New Zealand, and the increasing concern felt by many scientists, from a scientific viewpoint but in non-technical language. It surveys what is known about nuclear weapons and the consequences of their use, and attention is drawn to the importance of penetrating the language and examining the assumptions made in the propaganda about n uclear deterrence . The tasks involved in maintaining the present peace and attempting to establish an agreed disarmament is examined. The report pays particular attention to the roles of scientists in these endeavours

  19. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  20. Multiculturalism in Technology-Based Education: Case Studies on ICT-Supported Approaches

    Science.gov (United States)

    Garcia-Penalvo, Francicso Jose

    2013-01-01

    Our differences in language, cultures, and history around the world play a vital role in the way we learn. As technology-based education continues to be used worldwide, there is an ever growing interest in how multiculturalism comes into effect. Multiculturalism in Technology-Based Education: Case Studies on ICT-Supported Approaches explores the…

  1. Dispositions Supporting Elementary Interns in the Teaching of Reform-Based Science Materials

    Science.gov (United States)

    Eick, Charles J.; Stewart, Bethany

    2010-01-01

    Dispositions supporting the teaching of science as structured inquiry by four elementary candidates are presented. Candidates were studied during student teaching based on their positive attitudes toward teaching science with reform-based materials in their methods course. Personal learning histories informed their attitudes, values, and beliefs…

  2. Digital Game-Based Learning Supports Student Motivation, Cognitive Success, and Performance Outcomes

    Science.gov (United States)

    Woo, Jeng-Chung

    2014-01-01

    Traditional multimedia learning is primarily based on the cognitive load concept of information processing theory. Recent digital game-based learning (DGBL) studies have focused on exploring content support for learning motivation and related game characteristics. Motivation, volition, and performance (MVP) theory indicates that cognitive load and…

  3. Evidence-Based Literacy Support: The "Literacy Octopus" Trial. Evaluation Report and Executive Summary

    Science.gov (United States)

    Lord, Pippa; Rabiasz, Adam; Roy, Palak; Harland, Jennie; Styles, Ben; Fowler, Katherine

    2017-01-01

    The Evidence-based Literacy Support-"Literacy Octopus" Trial tested a range of dissemination interventions and resources, all of which aimed to engage schools in using evidence-based materials to improve teaching and learning in Key Stage 2 literacy. Four delivery partners provided interventions. These included light-touch,…

  4. A risk-based model for maintenance decision support of civil structures using RAMS

    NARCIS (Netherlands)

    Viana Da Rocha, T. C.; Stipanovic, I.; Hartmann, A.; Bakker, J.

    2017-01-01

    As a cornerstone of transportation asset management, risk-based approaches have been used to support maintenance decisions of civil structures. However, ambiguous and subjective risk criteria and inconsistency on the use of risk-based approaches can lead to a fuzzy understanding of the risks

  5. Designing and Implementing a Mentoring Program to Support Clinically-Based Teacher Education

    Science.gov (United States)

    Henning, John E.; Gut, Dianne; Beam, Pamela

    2015-01-01

    This article describes one teacher preparation program's approach to designing and implementing a mentoring program to support clinically-based teacher education. The design for the program is based on an interview study that compared the mentoring experiences of 18 teachers across three different contexts: student teaching, early field…

  6. Using Wikis as a Support and Assessment Tool in Collaborative Digital Game-Based Learning Environments

    Science.gov (United States)

    Samur, Yavuz

    2011-01-01

    In computer-supported collaborative learning (CSCL) environments, there are many researches done on collaborative learning activities; however, in game-based learning environments, more research and literature on collaborative learning activities are required. Actually, both game-based learning environments and wikis enable us to use new chances…

  7. Evaluation of water quality threats to the endangered Okaloosa darter (Etheostoma okaloosae) in East Turkey Creek on Eglin Air Force Base.

    Science.gov (United States)

    Weil, R E; Spade, D J; Knoebl, I; Hemming, J M; Tongue, M L; Szabo, N J; Kroll, K J; Tate, W B; Denslow, N D

    2012-04-01

    The threatened Okaloosa darter (Etheostoma okaloosae) is found almost exclusively on the Eglin Air Force Base in the Choctawhatchee Bay watershed of Florida. Portions of this limited habitat are threatened with soil erosion, altered hydrology, and impaired water quality. In the present study, general water quality parameters (i.e., dissolved oxygen, specific conductance, pH, temperature, relative turbidity, and primary productivity) were characterized in East Turkey Creek, which is a body of water potentially impacted by treated wastewater sprayfields, and Long Creek, an adjacent reference stream that does not border the sprayfields. Water quality was assessed during a 30-day exposure using passive samplers for both non-polar and polar effluent parameters. Because the Okaloosa darter was listed as endangered at the time of sampling we chose a closely related species from the same creeks, the sailfin shiner (Pteronotropis hypseleotris) in which to measure metal body burdens. Additionally, fathead minnows (Pimephales promelas) were used for microarray analysis on gonad and liver tissues after 48 h exposures to water collected from the two creeks and brought into the laboratory. Waters from all sites, including reference sites, affected the expression of genes related to various biological processes including transcription and translation, cell cycle control, metabolism, and signaling pathways, suggesting that the sum of anthropogenic compounds in the site waters may cause a generalized stress response in both liver and testis, an effect that could be related to the generally low populations of the Okaloosa darter. Furthermore, effects of site waters on fish gene expression may be related to the impact of human activities other than the wastewater sprayfields, as nearby areas are closed to the public for military testing, training, and administrative activities and due to ordnance contamination. Copyright © 2012 Elsevier B.V. All rights reserved.

  8. Explaining the Variable Effects of Social Support on Work-Based Stressor-Strain Relations: The Role of Perceived Pattern of Support Exchange

    Science.gov (United States)

    Nahum-Shani, Inbal; Bamberger, Peter A.

    2010-01-01

    Seeking to explain mixed empirical findings regarding the buffering effect of social support on work-based stress-strain relations, we posit that whether an increase in the level of support received buffers or exacerbates the harmful effects of workload on employee health and well-being is contingent upon the general pattern characterizing an employee supportive exchanges across his/her close relationships. Specifically, we propose that the buffering effect of receiving social support depends on whether the employee perceives his/her social exchanges as reciprocal (support given equals support received), under-reciprocating (support given exceeds support received), or over-reciprocating (support received exceeds support given). Based on longitudinal data collected from a random sample of blue-collar workers, our findings support our predictions, indicating that the buffering effect of social support on the relationship between work hours (on the one hand) and employee health and well-being (on the other) varies as a function of the pattern of exchange relations between an employee and his/her close support providers. PMID:21152110

  9. Explaining the Variable Effects of Social Support on Work-Based Stressor-Strain Relations: The Role of Perceived Pattern of Support Exchange.

    Science.gov (United States)

    Nahum-Shani, Inbal; Bamberger, Peter A

    2011-01-01

    Seeking to explain mixed empirical findings regarding the buffering effect of social support on work-based stress-strain relations, we posit that whether an increase in the level of support received buffers or exacerbates the harmful effects of workload on employee health and well-being is contingent upon the general pattern characterizing an employee supportive exchanges across his/her close relationships. Specifically, we propose that the buffering effect of receiving social support depends on whether the employee perceives his/her social exchanges as reciprocal (support given equals support received), under-reciprocating (support given exceeds support received), or over-reciprocating (support received exceeds support given). Based on longitudinal data collected from a random sample of blue-collar workers, our findings support our predictions, indicating that the buffering effect of social support on the relationship between work hours (on the one hand) and employee health and well-being (on the other) varies as a function of the pattern of exchange relations between an employee and his/her close support providers.

  10. Assessment of wind erosion threat for soils in cadastral area of Hajske

    International Nuclear Information System (INIS)

    Muchova, Z.; Stredanska, A.

    2008-01-01

    This contribution illustrates the application of methods of erosion threat assessment in lan adaptation projects. Calculations of the soil erosion index of particular soil blocks are demonstrated for the cadastral area of Hajske. Two methods for assessment of erosion threat have been applied. First the assessment based on the ecological soil-quality units (ESQU) has been performed. Next, the Pasak method for a detailed analysis of the soil erosion threat was applied. Both of the mentioned approaches are recommended for the land adaption projects. Based on the results, the soil blocks have been ranked by their soil erosion threat. (authors)

  11. Evaluation of a pilot 'peer support' training programme for volunteers in a hospital-based cancer information and support centre.

    Science.gov (United States)

    Kinnane, Nicole Anne; Waters, Trish; Aranda, Sanchia

    2011-01-01

    Volunteers from Peter MacCallum Cancer Centre (Peter Mac) Patient Information and Support Centre (PISC) assist the Cancer Support Nurse by helping patients and families/carers find information and provide face-to-face peer support. Benefits of shared personal experiences between volunteer and patient are clearly different from professional support. Volunteers require specific skill sets and detailed preparation for this role. Volunteers completed a 3-day training programme adapted from the Cancer Council Victoria's 'Cancer Connect Telephone Peer Support Volunteer' training programme. The focus was role expectations and boundaries for peer support volunteers, debriefing, communication skills training, support services, complementary and alternative therapies and internet information. Assessment included a quiz and observation for a range of competencies. Role-play with simulated patients developed appropriate support skills. Eight volunteers participated. Pre-training questionnaires revealed all volunteers highly self-rated existing skills supporting people affected by cancer. During training, volunteers recognised these skills were inadequate. All agreed that role-play using an actor as a 'simulated patient' helped develop communication skills; however, the experience proved challenging. Post-training all reported increased knowledge of role definition and boundaries, supportive communication skills, supports available for patients and families/carers and importance of self-care. Facilitators recommended seven of the eight participants be accredited PISC Peer Support Volunteers. One volunteer was assessed unsuitable for consistently overstepping the boundaries of the peer support role and withdrew from training. Success of the programme resulted in a trained 'face-to-face peer support volunteer' group better equipped for their role. Sixteen months following training, all who completed the programme remain active volunteers in the PISC. Planned educational updates

  12. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  13. A constraint-based approach to intelligent support of nuclear reactor design

    International Nuclear Information System (INIS)

    Furuta, Kazuo

    1993-01-01

    Constraint is a powerful representation to formulate and solve problems in design; a constraint-based approach to intelligent support of nuclear reactor design is proposed. We first discuss the features of the approach, and then present the architecture of a nuclear reactor design support system under development. In this design support system, the knowledge base contains constraints useful to structure the design space as object class definitions, and several types of constraint resolvers are provided as design support subsystems. The adopted method of constraint resolution are explained in detail. The usefulness of the approach is demonstrated using two design problems: Design window search and multiobjective optimization in nuclear reactor design. (orig./HP)

  14. Older persons' experiences of a home-based exercise program with behavioral change support.

    Science.gov (United States)

    Arkkukangas, Marina; Sundler, Annelie J; Söderlund, Anne; Eriksson, Staffan; Johansson, Ann-Christin

    2017-12-01

    It is a challenge to promote exercise among older persons. Knowledge is needed regarding the maintenance of exercise aiming at preventing falls and promoting health and well-being in older persons. This descriptive study used a qualitative inductive approach to describe older persons' experiences of a fall-preventive, home-based exercise program with support for behavioral change. Semi-structured interviews were conducted with 12 elderly persons aged 75 years or older, and a qualitative content analysis was performed. Four categories emerged: facilitators of performing exercise in everyday life, the importance of support, perceived gains from exercise, and the existential aspects of exercise. With support from physiotherapists (PTs), home-based exercise can be adapted to individual circumstances in a meaningful way. Including exercises in everyday life and daily routines could support the experience of being stronger, result in better physical functioning, and give hope for an extended active life in old age.

  15. Supporting Seamful Development of Positioning Applications through Model Based Translucent Middleware

    DEFF Research Database (Denmark)

    Jensen, Jakob Langdal

    middleware, and how that middleware can provide developers with methods for controlling application qualities that are related to the positioning process. One key challenge is to understand how to support application development in a heterogeneous domain like that of positioning. Recent trends in application...... middleware used to support application development. We transfer the concept of tactics from the field of software architecture and apply it to specific qualities related to position based applications. We further argue that many of these tactics can be implemented as policies that can be enforced......Positioning technologies are becoming ever more pervasive, and they are used for a growing number of applications in a broad range of fields. We aim to support software developers who create position based applications. More specifically, how support can be provided through the use of specialized...

  16. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  17. Halloysite nanotube-based electrospun ceramic nanofibre mat: a novel support for zeolite membranes

    Science.gov (United States)

    Chen, Zhuwen; Zeng, Jiaying; Lv, Dong; Gao, Jinqiang; Zhang, Jian; Bai, Shan; Li, Ruili; Hong, Mei; Wu, Jingshen

    2016-12-01

    Some key parameters of supports such as porosity, pore shape and size are of great importance for fabrication and performance of zeolite membranes. In this study, we fabricated millimetre-thick, self-standing electrospun ceramic nanofibre mats and employed them as a novel support for zeolite membranes. The nanofibre mats were prepared by electrospinning a halloysite nanotubes/polyvinyl pyrrolidone composite followed by a programmed sintering process. The interwoven nanofibre mats possess up to 80% porosity, narrow pore size distribution, low pore tortuosity and highly interconnected pore structure. Compared with the commercial α-Al2O3 supports prepared by powder compaction and sintering, the halloysite nanotube-based mats (HNMs) show higher flux, better adsorption of zeolite seeds, adhesion of zeolite membranes and lower Al leaching. Four types of zeolite membranes supported on HNMs have been successfully synthesized with either in situ crystallization or a secondary growth method, demonstrating good universality of HNMs for supporting zeolite membranes.

  18. A Multiple Mobility Support Approach (MMSA Based on PEAS for NCW in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Bong-Joo Koo

    2011-01-01

    Full Text Available Wireless Sensor Networks (WSNs can be implemented as one of sensor systems in Network Centric Warfare (NCW. Mobility support and energy efficiency are key concerns for this application, due to multiple mobile users and stimuli in real combat field. However, mobility support approaches that can be adopted in this circumstance are rare. This paper proposes Multiple Mobility Support Approach (MMSA based on Probing Environment and Adaptive Sleeping (PEAS to support the simultaneous mobility of both multiple users and stimuli by sharing the information of stimuli in WSNs. Simulations using Qualnet are conducted, showing that MMSA can support multiple mobile users and stimuli with good energy efficiency. It is expected that the proposed MMSA can be applied to real combat field.

  19. Dual-Use Threat Assessment Framework - An Attempt to Quantify the Risk

    International Nuclear Information System (INIS)

    Stephen, E. R.; Lavigne, J. J.; Colton, B.

    2007-01-01

    Advances in the biosciences over the past decade have been rapid and transformative. While these advances offer significant benefit to society, they also provide very significant challenges in terms of security. Concerns over misuse and/or accidental use/release (dual use) although not new, are now being viewed through the security lens. There is a wide-spread view that public or private sector scientists, supported through investments by pharmaceutical, environmental and agricultural interests working in the fields that comprise biotechnology, posses the ability to assess the implications of their own work and work within a regime of self-control that is for the most part self-governing (codes of practice). On the other end of the spectrum are those that would codify or legislative control. All this is being done in the absence of a mechanism for quantifying the threat. This presentation will discuss the development of an assessment framework that addresses both actual and potential threats. The framework was developed based on available intelligence and other open source information along with interviews with those persons familiar with the concept of dual use and the multiple, sometimes competing agendas of a variety of interest groups. The framework will help to bring some clarity to the discussion and at the same time, help to inform those that are positioned to respond to the threat. (author)

  20. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    International Nuclear Information System (INIS)

    Winson, A; Kinvig, H; Gottsmann, J; Partington, E; Geyer, A

    2008-01-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  1. Camera formation and more, but what comes next? an analysis of volcanic threat of Nisyros island, Greece

    Energy Technology Data Exchange (ETDEWEB)

    Winson, A; Kinvig, H; Gottsmann, J; Partington, E; Geyer, A [Department of Earth Sciences, University of Bristol (United Kingdom)

    2008-10-01

    We present an analysis of volcanic threat of Nisyros island (Greece) based on a catalogue of questions compiled for the USGS National Volcano Early Warning System (NVEWS). We find that the score puts Nisyros in the league of volcanoes posing a very high threat. US volcanoes with a comparable threat level include Mt. St. Helens, Augustine and the Long Valley caldera.

  2. Twenty Years of Stereotype Threat Research: A Review of Psychological Mediators.

    Science.gov (United States)

    Pennington, Charlotte R; Heim, Derek; Levy, Andrew R; Larkin, Derek T

    2016-01-01

    This systematic literature review appraises critically the mediating variables of stereotype threat. A bibliographic search was conducted across electronic databases between 1995 and 2015. The search identified 45 experiments from 38 articles and 17 unique proposed mediators that were categorized into affective/subjective (n = 6), cognitive (n = 7) and motivational mechanisms (n = 4). Empirical support was accrued for mediators such as anxiety, negative thinking, and mind-wandering, which are suggested to co-opt working memory resources under stereotype threat. Other research points to the assertion that stereotype threatened individuals may be motivated to disconfirm negative stereotypes, which can have a paradoxical effect of hampering performance. However, stereotype threat appears to affect diverse social groups in different ways, with no one mediator providing unequivocal empirical support. Underpinned by the multi-threat framework, the discussion postulates that different forms of stereotype threat may be mediated by distinct mechanisms.

  3. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  4. Derivation and validation of the Personal Support Algorithm: an evidence-based framework to inform allocation of personal support services in home and community care.

    Science.gov (United States)

    Sinn, Chi-Ling Joanna; Jones, Aaron; McMullan, Janet Legge; Ackerman, Nancy; Curtin-Telegdi, Nancy; Eckel, Leslie; Hirdes, John P

    2017-11-25

    Personal support services enable many individuals to stay in their homes, but there are no standard ways to classify need for functional support in home and community care settings. The goal of this project was to develop an evidence-based clinical tool to inform service planning while allowing for flexibility in care coordinator judgment in response to patient and family circumstances. The sample included 128,169 Ontario home care patients assessed in 2013 and 25,800 Ontario community support clients assessed between 2014 and 2016. Independent variables were drawn from the Resident Assessment Instrument-Home Care and interRAI Community Health Assessment that are standardised, comprehensive, and fully compatible clinical assessments. Clinical expertise and regression analyses identified candidate variables that were entered into decision tree models. The primary dependent variable was the weekly hours of personal support calculated based on the record of billed services. The Personal Support Algorithm classified need for personal support into six groups with a 32-fold difference in average billed hours of personal support services between the highest and lowest group. The algorithm explained 30.8% of the variability in billed personal support services. Care coordinators and managers reported that the guidelines based on the algorithm classification were consistent with their clinical judgment and current practice. The Personal Support Algorithm provides a structured yet flexible decision-support framework that may facilitate a more transparent and equitable approach to the allocation of personal support services.

  5. Derivation and validation of the Personal Support Algorithm: an evidence-based framework to inform allocation of personal support services in home and community care

    Directory of Open Access Journals (Sweden)

    Chi-Ling Joanna Sinn

    2017-11-01

    Full Text Available Abstract Background Personal support services enable many individuals to stay in their homes, but there are no standard ways to classify need for functional support in home and community care settings. The goal of this project was to develop an evidence-based clinical tool to inform service planning while allowing for flexibility in care coordinator judgment in response to patient and family circumstances. Methods The sample included 128,169 Ontario home care patients assessed in 2013 and 25,800 Ontario community support clients assessed between 2014 and 2016. Independent variables were drawn from the Resident Assessment Instrument-Home Care and interRAI Community Health Assessment that are standardised, comprehensive, and fully compatible clinical assessments. Clinical expertise and regression analyses identified candidate variables that were entered into decision tree models. The primary dependent variable was the weekly hours of personal support calculated based on the record of billed services. Results The Personal Support Algorithm classified need for personal support into six groups with a 32-fold difference in average billed hours of personal support services between the highest and lowest group. The algorithm explained 30.8% of the variability in billed personal support services. Care coordinators and managers reported that the guidelines based on the algorithm classification were consistent with their clinical judgment and current practice. Conclusions The Personal Support Algorithm provides a structured yet flexible decision-support framework that may facilitate a more transparent and equitable approach to the allocation of personal support services.

  6. 10 CFR 603.300 - Difference between an expenditure-based and a fixed-support TIA.

    Science.gov (United States)

    2010-01-01

    ... TECHNOLOGY INVESTMENT AGREEMENTS Requirements for Expenditure-Based and Fixed-Support Technology Investment... requirements in this subpart. The fundamental difference between an expenditure-based and a fixed-support TIA...

  7. The method of rapid design of the folding bridge based on floating supports

    Directory of Open Access Journals (Sweden)

    Jan Marszałek

    2016-09-01

    Full Text Available The article includes a methodology for the rapid design of the folding bridge based on floating supports. This methodology includes an analysis of the possibilities of using blocks from the park pontoon PP-64 as a support for the floating folding DMS-65 bridge, built as a tem-porary crossing for civilian application. The analysis was carried out for the bridge loaded with a moving vehicle. The results of this analysis have been developed in the form of nomograms that enable rapid development of crossings in different structural systems.[b]Keywords[/b]: civil engineering, folding bridges, floating supports

  8. Design and realization of tourism spatial decision support system based on GIS

    Science.gov (United States)

    Ma, Zhangbao; Qi, Qingwen; Xu, Li

    2008-10-01

    In this paper, the existing problems of current tourism management information system are analyzed. GIS, tourism as well as spatial decision support system are introduced, and the application of geographic information system technology and spatial decision support system to tourism management and the establishment of tourism spatial decision support system based on GIS are proposed. System total structure, system hardware and software environment, database design and structure module design of this system are introduced. Finally, realization methods of this systemic core functions are elaborated.

  9. Staff views on supporting evidence based practice for children with ASD.

    Science.gov (United States)

    Trembath, David; Sulek, Rhylee; Paynter, Jessica; Simpson, Kate; Keen, Deb

    2017-11-22

    A variety of empirically supported interventions are available for children with autism spectrum disorder (ASD), but previous research suggests that their selection and use within an evidence-based practice (EBP) framework in clinical settings is challenging. To date, research has primarily focused on identifying individual, organisational, and contextual barriers to EBP rather than identifying collaborative solutions to these barriers through consultation with staff. The aim of our study was to explore staff views on supporting EBP in their work with children with ASD. We conducted five focus groups involving 29 professional (e.g., speech pathologists, teachers), paraprofessional (e.g., childcare workers), and managerial staff to explore their views. Audio recordings were transcribed verbatim and analysed using thematic analysis. Two central themes, comprising six categories, emerged to account for the participants' views. Initiative and Effort accounted for the range of creative strategies staff had developed to support their engagement in EBP. They also expressed the need for A Better Way involving organisational-wide support such as this engagement, including peer-to-peer mentoring. The findings suggest that an organisational-wide model to support engagement in EBP, with peer-to-peer mentoring at its foundation, may provide a desirable, ecologically valid, and acceptable model. Implications for Rehabilitation Clinicians and educators recognise the importance of evidence-based practice. Efforts to support evidence-based practice have focused mostly on access to research evidence. Clinicians and educators in this study were developing their own strategies based on intuition. They identified a need for organisation-wide approaches to supporting evidence-based practice. Peer-to-peer mentoring appears to be an acceptable and viable strategy.

  10. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  11. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  12. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  13. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  14. Threats to Feminist Identity and Reactions to Gender Discrimination.

    Science.gov (United States)

    Cichocka, Aleksandra; Golec de Zavala, Agnieszka; Kofta, Mirek; Rozum, Joanna

    2013-05-01

    The aim of this research was to examine conditions that modify feminists' support for women as targets of gender discrimination. In an experimental study we tested a hypothesis that threatened feminist identity will lead to greater differentiation between feminists and conservative women as victims of discrimination and, in turn, a decrease in support for non-feminist victims. The study was conducted among 96 young Polish female professionals and graduate students from Gender Studies programs in Warsaw who self-identified as feminists ( M age  = 22.23). Participants were presented with a case of workplace gender discrimination. Threat to feminist identity and worldview of the discrimination victim (feminist vs. conservative) were varied between research conditions. Results indicate that identity threat caused feminists to show conditional reactions to discrimination. Under identity threat, feminists perceived the situation as less discriminatory when the target held conservative views on gender relations than when the target was presented as feminist. This effect was not observed under conditions of no threat. Moreover, feminists showed an increase in compassion for the victim when she was portrayed as a feminist compared to when she was portrayed as conservative. Implications for the feminist movement are discussed.

  15. Avoidance Denial versus Optimistic Denial in Reaction to the Threat of Future Cardiovascular Disease

    Science.gov (United States)

    Thompson, Suzanne C.; Ting, Sarah A.

    2012-01-01

    Two distinctly different denial-based threat orientations (avoidance denial and optimistic denial) were examined using a message about the future risk of cardiovascular disease (CVD) for young adults. Participants (N = 101) completed measures of denial-based dispositional threat orientations, current eating, comparative risk, and objective risk…

  16. Are Facebook "Friends" Helpful? Development of a Facebook-Based Measure of Social Support and Examination of Relationships Among Depression, Quality of Life, and Social Support.

    Science.gov (United States)

    McCloskey, Wilfred; Iwanicki, Sierra; Lauterbach, Dean; Giammittorio, David M; Maxwell, Kendal

    2015-09-01

    Greater social support is predictive of lower depression and higher quality of life (QOL). However, the way in which social support is provided has changed greatly with the expanding role of social networking sites (e.g., Facebook). While there are numerous anecdotal accounts of the benefits of Facebook-based social support, little empirical evidence exists to support these assertions, and there are no empirically validated measures designed to assess social support provided via this unique social networking medium. This study sought to develop an empirically sound measure of Facebook-based social support (Facebook Measure of Social Support [FMSS]) and to assess how this new measure relates to previously established measures of support and two outcome variables: depression and QOL. Following exploratory factor analysis, the FMSS was determined to assess four factors of social support on Facebook (Perceived, Emotional, Negative, Received/Instrumental). The Negative Support factor on the FMSS was most strongly related to both depression and QOL with magnitudes (and direction of relationships) comparable to a traditional measure of perceived social support. However, two FMSS factors (Received/Instrumental and Perceived) were unrelated to both mental health outcomes. Contrary to expectations, elevations in one FMSS factor (Emotional) was associated with worse symptoms of depression and poorer psychological QOL. When taken together, only the absence of negative social support on Facebook is significantly predictive of mental health functioning. Consequently, those hoping to use Facebook as a medium for reducing depression or improving QOL are unlikely to realize significant therapeutic benefits.

  17. Towards An Intelligent Model-Based Decision Support System For An Integrated Oil Company (EGPC)

    International Nuclear Information System (INIS)

    Khorshid, M.; Hassan, H.; Abdel Latife, M.A.

    2004-01-01

    Decision Support System (DSS) is an interactive, flexible and adaptable computer-based support system specially developed for supporting the solution of unstructured management problems [31] DSS has become widespread for oil industry domain in recent years. The computer-based DSS, which were developed and implemented in oil industry, are used to address the complex short-term planning and operational issues associated with downstream industry. Most of these applications concentrate on the data-centered tools, while the model-centered applications of DSS are still very limited up till now [20]. This study develops an Intelligent Model-Based DSS for an integrated oil company, to help policy makers and petroleum planner in improving the effectiveness of the strategic planning in oil sector. This domain basically imposes semi-structured or unstructured decisions and involves a very complex modeling process

  18. FEASIBILITY ANALYSIS OF NAVAL BASE RELOCATION USING SWOT AND AHP METHOD TO SUPPORT MAIN DUTIES OPERATION

    Directory of Open Access Journals (Sweden)

    Putu Yogi

    2017-11-01

    Full Text Available Naval Base as part of Integrated Fleet Weapon System has an important role in maintaining the strategic environment in the region of Indonesia. Naval Base with a strategic location will support Indonesian Navy’s main duty to carry out the administrative and logistical support. Due to the limitation of Naval Base’s condition, feasibility study will be required to relocate the Naval Base. In this feasibility study, a combination of methods between SWOT analysis and Analytical Hierarchy Process (AHP is used. The results of the Internal Factors Evaluation (IFE Matrix Analysis is 4.72 and External Factors Evaluation (EFE Matrix Analysis is 2.91. In general, the balance of power between the IFE Matrix and EFE Matrix is located in Quadrants I and thus, the Aggressive Strategy is supported. While the Matrix Analysis’ result of Internal - External (IE showed that the score of IFE and EFE located in Quadrant II and VII.

  19. A simulation based optimization approach to model and design life support systems for manned space missions

    Science.gov (United States)

    Aydogan, Selen

    This dissertation considers the problem of process synthesis and design of life-support systems for manned space missions. A life-support system is a set of technologies to support human life for short and long-term spaceflights, via providing the basic life-support elements, such as oxygen, potable water, and food. The design of the system needs to meet the crewmember demand for the basic life-support elements (products of the system) and it must process the loads generated by the crewmembers. The system is subject to a myriad of uncertainties because most of the technologies involved are still under development. The result is high levels of uncertainties in the estimates of the model parameters, such as recovery rates or process efficiencies. Moreover, due to the high recycle rates within the system, the uncertainties are amplified and propagated within the system, resulting in a complex problem. In this dissertation, two algorithms have been successfully developed to help making design decisions for life-support systems. The algorithms utilize a simulation-based optimization approach that combines a stochastic discrete-event simulation and a deterministic mathematical programming approach to generate multiple, unique realizations of the controlled evolution of the system. The timelines are analyzed using time series data mining techniques and statistical tools to determine the necessary technologies, their deployment schedules and capacities, and the necessary basic life-support element amounts to support crew life and activities for the mission duration.

  20. Research and Design of Fixed Photovoltaic Support Structure Based on SAP2000

    Directory of Open Access Journals (Sweden)

    Wang Xingxing

    2018-01-01

    Full Text Available In the solar photovoltaic power station project, PV support is one of the main structures, and fixed photovoltaic PV support is one of the most commonly used stents. For the the actual demand in a Japanese photovoltaic power, SAP2000 finite element analysis software is used in this paper, based on Japanese Industrial Standard (JIS C 8955-2011, describing the system of fixed photovoltaic support structure design and calculation method and process. The results show that: (1 according to the general requirements of 4 rows and 5 columns fixed photovoltaic support, the typical permanent load of the PV support is 4679.4 N, the wind load being 1.05 kN/m2, the snow load being 0.89 kN/m2 and the seismic load is 5877.51 N; (2 by theoretical calculation of the two ends extended beam model, the beam span under the rail is determined 2200 mm; (3 by the way of using the single factor experiment, through the calculation and analysis of SAP2000, the three best supporting points of the support of the W stent are determined; (4 by comprehensive simulation, the optimal parameters for the rail, beam, support and bolt are 60× 60× 1.0, 60× 60× 1.0, 40× 50× 2.0, and M10 respectively.

  1. USING WIKIS AS A SUPPORT AND ASSESSMENT TOOL IN COLLABORATIVE DIGITAL GAME-BASED LEARNING ENVIRONMENTS

    Directory of Open Access Journals (Sweden)

    Yavuz SAMUR

    2011-04-01

    Full Text Available In computer-supported collaborative learning (CSCL environments, there are many researches done on collaborative learning activities; however, in game-based learning environments, more research and literature on collaborative learning activities are required. Actually, both game-based learning environments and wikis enable us to use new chances for learning, especially in collaborative learning activities. Therefore, in this paper, related literature on wikis and how game & instructional designers can leverage from wikis in game-based learning settings for enhancing students’ collaborative learning activities are examined. Based on the reviewed literature, two main suggestions are given in this paper with their underlying reasons. First, using wikis as a support tool for enhancing collaboration in digital game-based learning (DGBL environments, and second using wikis as an assessment tool in DGBL are suggested.

  2. Twelve evidence-based principles for implementing self-management support in primary care.

    Science.gov (United States)

    Battersby, Malcolm; Von Korff, Michael; Schaefer, Judith; Davis, Connie; Ludman, Evette; Greene, Sarah M; Parkerton, Melissa; Wagner, Edward H

    2010-12-01

    Recommendations to improve self-management support and health outcomes for people with chronic conditions in primary care settings are provided on the basis of expert opinion supported by evidence for practices and processes. Practices and processes that could improve self-management support in primary care were identified through a nominal group process. In a targeted search strategy, reviews and meta-analyses were then identifed using terms from a wide range of chronic conditions and behavioral risk factors in combination with Self-Care, Self-Management, and Primary Care. On the basis of these reviews, evidence-based principles for self-management support were developed. The evidence is organized within the framework of the Chronic Care Model. Evidence-based principles in 12 areas were associated with improved patient self-management and/or health outcomes: (1) brief targeted assessment, (2) evidence-based information to guide shared decision-making, (3) use of a nonjudgmental approach, (4) collaborative priority and goal setting, (5) collaborative problem solving, (6) self-management support by diverse providers, (7) self-management interventions delivered by diverse formats, (8) patient self-efficacy, (9) active followup, (10) guideline-based case management for selected patients, (11) linkages to evidence-based community programs, and (12) multifaceted interventions. A framework is provided for implementing these principles in three phases of the primary care visit: enhanced previsit assessment, a focused clinical encounter, and expanded postvisit options. There is a growing evidence base for how self-management support for chronic conditions can be integrated into routine health care.

  3. Indicators of implicit and explicit social anxiety influence threat-related interpretive bias as a function of working memory capacity

    Directory of Open Access Journals (Sweden)

    Elske eSalemink

    2013-05-01

    Full Text Available Interpretive biases play a crucial role in anxiety disorders. The aim of the current study was to examine factors that determine the relative strength of threat-related interpretive biases that are characteristic of individuals high in social anxiety. Different (dual process models argue that both implicit and explicit processes determine information processing biases and behaviour, and that their impact is moderated by the availability of executive resources such as working memory capacity (WMC. Based on these models, we expected indicators of implicit social anxiety to predict threat-related interpretive bias in individuals low, but not high in WMC. Indicators of explicit social anxiety should predict threat-related interpretive bias in individuals high, but not low in WMC. As expected, WMC moderated the impact of implicit social anxiety on threat-related interpretive bias, although the simple slope for individuals low in WMC was not statistically significant. The hypotheses regarding explicit social anxiety (with fear of negative evaluation used as an indicator were fully supported. The clinical implications of these findings are discussed.

  4. Model Based Analysis of Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Han, Tingting; Kammueller, Florian

    2016-01-01

    In order to detect malicious insider attacks it is important to model and analyse infrastructures and policies of organisations and the insiders acting within them. We extend formal approaches that allow modelling such scenarios by quantitative aspects to enable a precise analysis of security...... designs. Our framework enables evaluating the risks of an insider attack to happen quantitatively. The framework first identifies an insider's intention to perform an inside attack, using Bayesian networks, and in a second phase computes the probability of success for an inside attack by this actor, using...

  5. Network Monitoring for Web-Based Threats

    Science.gov (United States)

    2011-02-01

    Using the HTP Package [49] 52 Figure 5-42: SQL Injection Using the CXTSYS Package [49] 52 Figure 5-43: Bypassing the PL/SQL Exclusion List with...forced browsing28 [19]. This method consists of simply manually submitting different HTTP requests. An attacker will often submit requests involving... manually modifying the orderID field could give the attacker access to another order that he or she should not have access to, as shown in Figure 4-7

  6. Threat Based Risk Assessment for Enterprise Networks

    Science.gov (United States)

    2016-02-15

    devastating insider attacks, Edward Snowden exfiltrated 1.7 million documents from the National Security Agency [1]. That same year, the security company...Weller-Fahy, and Tamara Yu. References 1. G. Greenwald, No Place to Hide: Edward Snowden , the NSA, and the U.S. Surveillance State. London: Hamish

  7. Brillouin Spectroscopy Data Base for Biological Threats

    National Research Council Canada - National Science Library

    Rubel, Glenn

    2003-01-01

    .... Brillouin scattering from DNA, ovalbumen, the Bacillus spores globigii and thuringiensis were measured to determine the feasibility of biological material discrimination using Brillouin scattering...

  8. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  9. Cooperative Threat Reduction: Status of Defense Conversion Efforts in the Former Soviet Union

    National Research Council Canada - National Science Library

    1997-01-01

    DOD's program to convert former Soviet Union defense industries to commercial enterprises is part of the Cooperative Threat Reduction program, which DOD has supported since 1992 to reduce the weapons...

  10. Vector-borne disease intelligence: strategies to deal with disease burden and threats

    Czech Academy of Sciences Publication Activity Database

    Braks, M.; Medlock, J. M.; Hubálek, Zdeněk; Hjertqvist, M.; Perrin, Y.; Lancelot, R.; Duchyene, E.; Hendrickx, G.; Stroo, A.; Heyman, P.; Sprong, H.

    2014-01-01

    Roč. 2, č. 280 (2014), s. 280 ISSN 2296-2565 Institutional support: RVO:68081766 Keywords : disease burden * emerging diseases * one health * surveillance * threat * vector-borne diseases Subject RIV: EE - Microbiology, Virology

  11. Track Circuit Fault Diagnosis Method based on Least Squares Support Vector

    Science.gov (United States)

    Cao, Yan; Sun, Fengru

    2018-01-01

    In order to improve the troubleshooting efficiency and accuracy of the track circuit, track circuit fault diagnosis method was researched. Firstly, the least squares support vector machine was applied to design the multi-fault classifier of the track circuit, and then the measured track data as training samples was used to verify the feasibility of the methods. Finally, the results based on BP neural network fault diagnosis methods and the methods used in this paper were compared. Results shows that the track fault classifier based on least squares support vector machine can effectively achieve the five track circuit fault diagnosis with less computing time.

  12. Towards tool support for spreadsheet-based domain-specific languages

    DEFF Research Database (Denmark)

    Adam, Marian Sorin; Schultz, Ulrik Pagh

    2015-01-01

    Spreadsheets are commonly used by non-programmers to store data in a structured form, this data can in some cases be considered to be a program in a domain-specific language (DSL). Unlike ordinary text-based domain-specific languages, there is however currently no formalism for expressing...... the syntax of such spreadsheet-based DSLs (SDSLs), and there is no tool support for automatically generating language infrastructure such as parsers and IDE support. In this paper we define a simple notion of two-dimensional grammars for SDSLs, and show how such grammars can be used for automatically...

  13. Plant diversity to support humans in a CELSS ground based demonstrator

    Science.gov (United States)

    Howe, J. M.; Hoff, J. E.

    1981-01-01

    A controlled ecological life support system (CELSS) for human habitation in preparation for future long duration space flights is considered. The success of such a system depends upon the feasibility of revitalization of food resources and the human nutritional needs which are to be met by these food resources. Edible higher plants are prime candidates for the photoautotrophic components of this system if nutritionally adequate diets can be derived from these plant sources to support humans. Human nutritional requirements information based on current knowledge are developed for inhabitants envisioned in the CELSS ground based demonstrator. Groups of plant products that can provide the nutrients are identified.

  14. Asymmetric actuating structure generates negligible influence on the supporting base for high performance scanning probe microscopies

    Science.gov (United States)

    Yi Yan, Gang; Bin Liu, Yong; Hua Feng, Zhi

    2014-02-01

    An asymmetric actuating structure generating negligible influence on the supporting base for high performance scanning probe microscopies is proposed in this paper. The actuator structure consists of two piezostacks, one is used for actuating while the other is for counterbalancing. In contrast with balanced structure, the two piezostacks are installed at the same side of the supporting base. The effectiveness of the structure is proved by some experiments with the actuators fixed to the free end of a cantilever. Experimental results show that almost all of the vibration modes of the cantilever are suppressed effectively at a wide frequency range of 90 Hz-10 kHz.

  15. Nurse-Moderated Internet-Based Support for New Mothers: Non-Inferiority, Randomized Controlled Trial.

    Science.gov (United States)

    Sawyer, Michael G; Reece, Christy E; Bowering, Kerrie; Jeffs, Debra; Sawyer, Alyssa C P; Mittinty, Murthy; Lynch, John W

    2017-07-24

    Internet-based interventions moderated by community nurses have the potential to improve support offered to new mothers, many of whom now make extensive use of the Internet to obtain information about infant care. However, evidence from population-based randomized controlled trials is lacking. The aim of this study was to test the non-inferiority of outcomes for mothers and infants who received a clinic-based postnatal health check plus nurse-moderated, Internet-based group support when infants were aged 1-7 months as compared with outcomes for those who received standard care consisting of postnatal home-based support provided by a community nurse. The design of the study was a pragmatic, preference, non-inferiority randomized control trial. Participants were recruited from mothers contacted for their postnatal health check, which is offered to all mothers in South Australia. Mothers were assigned either (1) on the basis of their preference to clinic+Internet or home-based support groups (n=328), or (2) randomly assigned to clinic+Internet or home-based groups if they declared no strong preference (n=491). The overall response rate was 44.8% (819/1827). The primary outcome was parenting self-competence, as measured by the Parenting Stress Index (PSI) Competence subscale, and the Karitane Parenting Confidence Scale scores. Secondary outcome measures included PSI Isolation, Interpersonal Support Evaluation List-Short Form, Maternal Support Scale, Ages and Stages Questionnaire-Social-Emotional and MacArthur Communicative Development Inventory (MCDI) scores. Assessments were completed offline via self-assessment questionnaires at enrolment (mean child age=4.1 weeks, SD 1.3) and again when infants were aged 9, 15, and 21 months. Generalized estimating equations adjusting for post-randomization baseline imbalances showed that differences in outcomes between mothers in the clinic+Internet and home-based support groups did not exceed the pre-specified margin of

  16. Classification of buildings mold threat using electronic nose

    Science.gov (United States)

    Łagód, Grzegorz; Suchorab, Zbigniew; Guz, Łukasz; Sobczuk, Henryk

    2017-07-01

    Mold is considered to be one of the most important features of Sick Building Syndrome and is an important problem in current building industry. In many cases it is caused by the rising moisture of building envelopes surface and exaggerated humidity of indoor air. Concerning historical buildings it is mostly caused by outdated raising techniques among that is absence of horizontal isolation against moisture and hygroscopic materials applied for construction. Recent buildings also suffer problem of mold risk which is caused in many cases by hermetization leading to improper performance of gravitational ventilation systems that make suitable conditions for mold development. Basing on our research there is proposed a method of buildings mold threat classification using electronic nose, based on a gas sensors array which consists of MOS sensors (metal oxide semiconductor). Used device is frequently applied for air quality assessment in environmental engineering branches. Presented results show the interpretation of e-nose readouts of indoor air sampled in rooms threatened with mold development in comparison with clean reference rooms and synthetic air. Obtained multivariate data were processed, visualized and classified using a PCA (Principal Component Analysis) and ANN (Artificial Neural Network) methods. Described investigation confirmed that electronic nose - gas sensors array supported with data processing enables to classify air samples taken from different rooms affected with mold.

  17. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  18. Managing threats from emerging technologies: can safeguards show the way?

    International Nuclear Information System (INIS)

    Leffer, Teri N.

    2014-01-01

    The system of international nuclear safeguards implemented by the International Atomic Energy Agency (IAEA) is primarily a means of verification of states’ commitments under various legal instruments, principally the Nuclear Non‑Proliferation Treaty (NPT), to utilize controlled nuclear fission for peaceful purposes only. However, the safeguards system can also be seen as a mechanism through which states acted to reduce the threat posed by a new technology that had a transformative impact on existing national security paradigms when it emerged in the twentieth century. In the twenty‑first century, new technologies with equally profound national security implications are emerging. These include biotechnology and synthetic biology, nano technology, information technology, cognitive science, robotics and artificial intelligence. Throughout its history, the safeguards system has evolved to accommodate new technologies, new undertakings and new threats. Because multiple emerging technologies now constitute potential national security threats, it is appropriate to consider whether and how the lessons and successes of the safeguards system, including its capacity to evolve in response to changing requirements, could be leveraged to mitigate the threat posed by these new technologies. This paper addresses the possibility of re‑imagining safeguards in a way that makes them applicable to a broader range of technology‑based threats without compromising their effectiveness for their original purpose.

  19. Benefits of integrating complementarity into priority threat management.

    Science.gov (United States)

    Chadés, Iadine; Nicol, Sam; van Leeuwen, Stephen; Walters, Belinda; Firn, Jennifer; Reeson, Andrew; Martin, Tara G; Carwardine, Josie

    2015-04-01

    Conservation decision tools based on cost-effectiveness analysis are used to assess threat management strategies for improving species persistence. These approaches rank alternative strategies by their benefit to cost ratio but may fail to identify the optimal sets of strategies to implement under limited budgets because they do not account for redundancies. We devised a multiobjective optimization approach in which the complementarity principle is applied to identify the sets of threat management strategies that protect the most species for any budget. We used our approach to prioritize threat management strategies for 53 species of conservation concern in the Pilbara, Australia. We followed a structured elicitation approach to collect information on the benefits and costs of implementing 17 different conservation strategies during a 3-day workshop with 49 stakeholders and experts in the biodiversity, conservation, and management of the Pilbara. We compared the performance of our complementarity priority threat management approach with a current cost-effectiveness ranking approach. A complementary set of 3 strategies: domestic herbivore management, fire management and research, and sanctuaries provided all species with >50% chance of persistence for $4.7 million/year over 20 years. Achieving the same result cost almost twice as much ($9.71 million/year) when strategies were selected by their cost-effectiveness ranks alone. Our results show that complementarity of management benefits has the potential to double the impact of priority threat management approaches. © 2014 Society for Conservation Biology.

  20. A complexity science-based framework for global joint operations analysis to support force projection: LDRD Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Lawton, Craig R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). System Sustainment & Readiness Technologies Dept.

    2015-01-01

    The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineering system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.