WorldWideScience

Sample records for terrorist group profiles

  1. Hidden Markov models for the activity profile of terrorist groups

    OpenAIRE

    Raghavan, Vasanthan; Galstyan, Aram; Tartakovsky, Alexander G.

    2012-01-01

    The main focus of this work is on developing models for the activity profile of a terrorist group, detecting sudden spurts and downfalls in this profile, and, in general, tracking it over a period of time. Toward this goal, a $d$-state hidden Markov model (HMM) that captures the latent states underlying the dynamics of the group and thus its activity profile is developed. The simplest setting of $d=2$ corresponds to the case where the dynamics are coarsely quantized as Active and Inactive, re...

  2. Profile of a Terrorist.

    Science.gov (United States)

    1988-04-01

    than those questions dealing with terrorists and their methods. Explosives are used routinely and plastique has entered the terrorist’s preferred...to handle. (12:23) The female Lebanese terrorist, May Mansin, easily concealed plastique in a body cavity and proceeded to blow a hole into the side

  3. Terrorist Group Profiles

    Science.gov (United States)

    1988-11-01

    Germany. Leadership Rudolph Raabe, Sonia Suder, Christian Gauger, Rudolf Schindler, Sabine Eckle. Other Names Revolutionaere Zellen, Rote Zora...through Jaime Guillot Lara, a Colombian drug smuggler, although no further operations of this type are known to have occurred. Since 1984, there have been...Attempted to assassinate Minister of Government Jaime Castro as he drove to work. July 1986 - Stole 1.6 million pesos from a bank in Bogota, wounding

  4. Will it Ever be Possible to Profile the Terrorist?

    Directory of Open Access Journals (Sweden)

    Jonathan A Rae

    2012-09-01

    Full Text Available 'This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise their crude reductionism, an absence of internal and external validity, and their lack of practical application. Current evidence indicates that the profiling of terrorists is a futile venture.'

  5. Will it ever be possible to profile the terrorist?

    OpenAIRE

    Rae, Jonathan A.

    2012-01-01

    This paper critiques the claim that terrorists can be profiled – that is to say that terrorists possess distinguishable attributes that can be conceivably identified by an observer. In doing so, the most prominent profiling parameters - racial, gender, age, pathological, psychological and socioeconomic – are investigated. The above approaches are found to have little to no applied value in identifying terrorists from a societal population. The dominant criticisms of these methods emphasise th...

  6. Survival of the Fittest: Why Terrorist Groups Endure

    Directory of Open Access Journals (Sweden)

    Joseph K. Young

    2014-04-01

    Full Text Available Why do terrorist groups endure? This question is relevant to scholars and policy makers alike. In the past, this issue was not been addressed in a systematic fashion. Recent work investigates this question using data on transnational groups and finds that factors associated with the home country can influence the duration the group endures. Applying the theory of outbidding to terrorist group survival, we argue that strategic competition among groups predicts group duration. Using the Global Terrorism Database, we develop a dataset using the terrorist group as the unit of analysis to model the duration of group activity and thus include the largest sample of groups yet. Controlling for previous explanations of both group duration and terrorism, we find a robust effect for the impact that group competition has on terrorist group survival.

  7. Designating Domestic Terrorist Individuals or Groups

    Science.gov (United States)

    2010-09-01

    These individuals and groups include the Black Panther Party, Weather Underground, Covenant Sword and the Arm of the Lord, Ku Klux Klan, Earth...based and left wing and right wing groups such as the Covenant Sword and the Arm of the Lord, Ku Klux Klan, Black Panther Party, and the Weather...TERMS Watch list, domestic terrorism, validation, designation, domestic terrorism organization, material support, domestic surveillance, SHAC, animal

  8. The Lord’s Resistance Army: an African Terrorist Group?

    Directory of Open Access Journals (Sweden)

    Emma Leonard

    2011-01-01

    Full Text Available The years since 9/11 have been characterised by the increasing threat of terrorist action in the  Middle East and South Asia. Yet Sub-Saharan Africa was has also become a region of concern. In 1998, it had been the scene of two Al-Qaeda attacks against US embassies; besides Africa is home to large Muslim populations. Since 9/11 African violent non-state groups unrelated to Al- Qaeda or to the wider Islamist movement have been recast as terrorist organisations. These groups primarily operate in conflict zones, an area of research that traditionally has not been the main focus of Terrorism Studies. Protagonists have at various times been called freedom fighters, rebels, warlords, insurgents or simply violent gangs. This article looks at the most notorious of African groups – the Lord’s Resistance Army (LRA. It argues that some groups like the LRA have been recast as terrorist organisations not because of a change in their activities but due to a change in the geo-strategic environment they found themselves in the post-9/11 period. The LRA’s ideology and tactics will be judged against a broad definition of terrorism in order to test whether the group can, in an objective way, be called a terrorist organisation. It is concluded that the LRA is too ambiguous an organisation to be simply labelled in such a way. It is also suggested that the terrorism label has in fact been an obstacle to attempts to end successfully a confrontation that is now going into its 24th year. 

  9. Kidnapping by Terrorist Groups, 1970-2010: Is Ideological Orientation Relevant?

    Science.gov (United States)

    Forest, James J. F.

    2012-01-01

    This article examines whether a terrorist group's ideology has a meaningful impact on its involvement in kidnapping. On a global level, incident data (1970-2010) indicate that in the past decade the number of kidnappings by terrorist groups has increased, while Muslim extremists have replaced left-wing/Marxist revolutionaries as the world's…

  10. Changing the story the role of the narrative in the success or failure of terrorist groups

    OpenAIRE

    Mellen, Brian C.

    2009-01-01

    Approved for public release, distribution unlimited This thesis focuses on the nexus between a terrorist group's narrative and the group's success or failure in achieving its strategic goals. This work theorizes that the interaction of competing narratives exerts a systematic impact on the ability of the terrorist group to achieve its strategic goals through the influence that the narratives have over a group's members, the group's adversary, and the affected population. Although a te...

  11. We Bomb, Therefore We Are: The Evolution of Terrorist Group Life Cycles

    Science.gov (United States)

    1994-03-24

    34 Political Socialization in Left-Wing Underground Organizations: Biographies of Italian and German Militants," International Social Movement Research... Political Socialization of Terrorist Groups in West Germany," Journal of Political and Military Sociology, v. 11, n. 2, Fall 1983, 236. See also Giorgio...Love?, 30-31. 7 Quoted in Wasmund, " Political Socialization ," 236. 88Irving L. Horowitz, "The Routinization of Terrorism and Its Unanticipated

  12. An Estimation of a Nonlinear Dynamic Process Using Latent Class Extended Mixed Models: Affect Profiles After Terrorist Attacks.

    Science.gov (United States)

    Burro, Roberto; Raccanello, Daniela; Pasini, Margherita; Brondino, Margherita

    2018-01-01

    Conceptualizing affect as a complex nonlinear dynamic process, we used latent class extended mixed models (LCMM) to understand whether there were unobserved groupings in a dataset including longitudinal measures. Our aim was to identify affect profiles over time in people vicariously exposed to terrorism, studying their relations with personality traits. The participants were 193 university students who completed online measures of affect during the seven days following two terrorist attacks (Paris, November 13, 2015; Brussels, March 22, 2016); Big Five personality traits; and antecedents of affect. After selecting students whose negative affect was influenced by the two attacks (33%), we analysed the data with the LCMM package of R. We identified two affect profiles, characterized by different trends over time: The first profile comprised students with lower positive affect and higher negative affect compared to the second profile. Concerning personality traits, conscientious-ness was lower for the first profile compared to the second profile, and vice versa for neuroticism. Findings are discussed for both their theoretical and applied relevance.

  13. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... From that, it is further possible to use the resulting social profile to compare terrorist groups against each other in order to develop predictive models as to the propensity of violence of a particular group...

  14. 40 years of terrorist bombings - A meta-analysis of the casualty and injury profile.

    Science.gov (United States)

    Edwards, D S; McMenemy, L; Stapley, S A; Patel, H D L; Clasper, J C

    2016-03-01

    Terrorists have used the explosive device successfully globally, with their effects extending beyond the resulting injuries. Suicide bombings, in particular, are being increasingly deployed due to the devastating effect of a combination of high lethality and target accuracy. The aim of this study was to identify trends and analyse the demographics and casualty figures of terrorist bombings worldwide. Analysis of the Global Terrorism Database (GTD) and a PubMed/Embase literature search (keywords "terrorist", and/or "suicide", and/or "bombing") from 1970 to 2014 was performed. 58,095 terrorist explosions worldwide were identified in the GTD. 5.08% were suicide bombings. Incidents per year are increasing (Pprofile of survivors to guide the immediate response by the medical services and the workload in the coming days. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. The personality profile of terrorist leaders: theoretical aspects and ways of measuring

    OpenAIRE

    Dimitrovska, Aleksandra; Dojcinovski, Metodija

    2015-01-01

    The main task of the psychology of terrorism is to explain the psychological aspects of terrorism, trying to provide answers about the behavior of the persons involved in terrorist activities. The literature suggests that there is no a single theory that explains the reasons and the way of "making the terrorists." While the first generation of research have viewed on terrorism as a pathology, explaining it predominantly through mental illness and psychopathic personality, th...

  16. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ercan, Tuncay

    2008-07-25

    Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  17. Detection of Hidden Hostile/Terrorist Groups in Harsh Territories by Using Animals as Mobile Biological Sensors

    Directory of Open Access Journals (Sweden)

    Tuncay Ercan

    2008-07-01

    Full Text Available Terrorism is the greatest threat to national security and cannot be defeated by conventional military force alone. In critical areas such as Iraq, Afghanistan and Turkey, regular forces cannot reach these hostile/terrorist groups, the instigators of terrorism. These groups have a clear understanding of the relative ineffectiveness of counter-guerrilla operations and rely on guerrilla warfare to avoid major combat as their primary means of continuing the conflict with the governmental structures. In Internal Security Operations, detection of terrorist and hostile groups in their hiding places such as caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or intelligence units with the necessary experience and tools suitable for collecting accurate information in these often harsh, rugged and mountainous countries. To assist these forces, commercial micro-sensors with wireless interfaces could be utilized to study and monitor a variety of phenomena and environments from a certain distance for military purposes. In order to locate hidden terrorist groups and enable more effective use of conventional military resources, this paper proposes an active remote sensing model implanted into animals capable of living in these environments. By using these mobile sensor devices, improving communications for data transfer from the source, and developing better ways to monitor and detect threats, terrorist ability to carry out attacks can be severely disrupted.

  18. Profiles of referrals to a psychiatric service: a descriptive study of survivors of the Nairobi US Embassy terrorist bomb blast.

    Science.gov (United States)

    Ndetei, D M; Omar, A; Mutiso, V N; Ongecha, F A; Kokonya, D A

    2009-11-01

    To document the socio-demographic characteristics and psychiatric profiles of the survivors of the Nairobi United States Embassy terrorist bomb blast referred to a psychiatric and psychotherapy (counselling) service. This was a descriptive cross-sectional study. Clinical interviews and structured questionnaires for post-traumatic stress disorder (PTSD) and stress were administered. Survivors of the bomb blast referred to a psychiatric and psychotherapy service one year or more after the bombing were included in the study. These survivors had been treated using psychopharmacotherapy and individualised (not group) therapy/counselling. Eighty-three consecutive referrals to a psychiatric service participated in this study. There were more males and the sample was generally well educated. The referrals made contact with the referring agency for a number of reasons including seeking psychological, financial and medical assistance. All the patients reported varying degrees of psychiatric symptoms and functional impairment on various aspects of social occupational functioning. High scores for PTSD and other related stress were recorded one or more years after the bombing. Although the survivors indicated that initial counselling following the blast had helped them, they still scored high on PTSD suggesting that clinically, the initial counselling had little, if any impact on the development of PTSD. There is need for a holistic approach to the management of psychotrauma in individuals.

  19. Closing the Gap: Measuring the Social Identity of Terrorists

    National Research Council Canada - National Science Library

    Ludwick, Keith W

    2008-01-01

    .... However, using two well-established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group...

  20. The Use of Structures in Communication Networks to Track Membership in Terrorist Groups

    Directory of Open Access Journals (Sweden)

    H.A Eiselt

    2015-02-01

    Full Text Available This concept paper investigates possibilities to detect terrorist cells based on communications between individuals without the need for wiretapping. The advantages of such procedure are apparent: fewer (if any legal requirements, and, most importantly, the possibility to automate the surveillance. After a brief review of the pertinent literature, we offer three approaches that are designed to aid in the detection of not only terrorist cells, but also the command structures within the cells. The techniques are demonstrated by using a small illustration. The paper concludes by outlining limitations of the procedures described here.

  1. Closing the gap : measuring the social identity of terrorists

    OpenAIRE

    Ludwick, Keith W.

    2008-01-01

    CHDS State/Local Studies of terrorism today focus on psychological and behavioral aspects of individuals. Most research shows that using a single model in an attempt to profile terrorists psychologically is problematic, if not impossible. However, using two well established theories from social psychology, Social Identity Theory and Social Distance Theory, allows the development of a practical model to develop a social profile of a terrorist group. From that, it is further possible to...

  2. Colombian Army Transformation and the Inflection Point of the Terrorist Groups

    Science.gov (United States)

    2011-03-30

    Prince (Cambridge: Cambridge University Press, 1988), 24. 2 James D Henderson, La Modernizacion en Colombia: Los años de Laureano Gomez, 1889-1965...prime factor that permits the terrorist´s isolation from the social base, as well as the legitimate use of force by the State. In summary, the FARC...his dismissal, for alleged meddling in political affairs. 23 3 Francisco Leal Buitrago, La Inseguridad de la Seguridad. Colombia 1958-2005

  3. International legal problem in combating 'Islamic State' terrorist group in Syria

    Directory of Open Access Journals (Sweden)

    Stevanović Miroslav

    2015-01-01

    Full Text Available 'Islamic State of Iraq and Syria' (ISIS has occupied parts of internationally recognized states and exerts further territorial pretensions. ISIS, also, implements a repressive rule, through violations of human rights and humanitarian law, which may constitute international crimes. In facing the threat od ISIS, the perception of international terrorism is important since this group has the features of a territorial entity. So far, facing with the threat of ISIS has been reduced to a model that is adopted by the UN Security Council against the terrorist network Al-Qaida. An international coalition of states, led by the United States, has undertaken air strikes on positions ISIS, on several grounds: the responsibility to protect, the protection of national security, and at the request of Iraq. At the same time, the strikes are applied in Syria, which can not be accountable for the actions of ISIS and has not requested international assistance. International law does not allow actions which would aim to destroy or jeopardize the territorial integrity or political independence of any sovereign and independent state, which is acting in accordance with the principle of equal rights and self-determination of peoples, and is hence governed by a representative government. The UNSC resolution 2249 remains short of recommending international armed action under the aegis of UNSC, but represents a step forward in recognizing the responsibility of this body in facing ISIS, at least as far as the 'destruction of refuge' is concerned. The use of force in the territory of Syria, without the express authorization of the UNSC is illegal, because terrorism does not constitute grounds for the use of force against countries. But, it opens broader issues of responsibility for the development of ISIS and the humanitarian crisis in the Middle East, as well as the functioning of the system of collective security. Overcoming the current crisis UNSC implies not just a

  4. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  5. On Terrorists and Terrorism

    National Research Council Canada - National Science Library

    Kellen, Konrad

    1982-01-01

    ...; it examines their socioeconomic backgrounds and their driving ideologies; and it probes into elements that may aid the cohesion of terrorist groups, as well as at elements that drive toward disintegration...

  6. Motives of terrorist acts

    Directory of Open Access Journals (Sweden)

    Krstić Marko

    2015-01-01

    Full Text Available Terrorism is a relatively new phenomenon, and data on terrorist motivations and psychological profiles of terrorists are fairly scarce and limited. In theory, there is a large number of quantitative analyses of collective violence, murder, and crime, however, none of these can be identified with terrorism. Most current studies do not consider a great heterogeneity of terrorists, and numerous practical, conceptual, and psychological barriers slow down the science of learning about terrorism. Psychology, as a science of behavior, certainly makes a great contribution to the study of terrorism as a very complex phenomenon. The aim of this paper is to analyze and synthesize social and psychological determinants which contribute to the development of terrorist motives, and to elaborate on those facts which have been discussed in scientific and professional literature so far.

  7. Combatting the Terrorist Threat.

    Science.gov (United States)

    1985-05-22

    have supplied many terrorist groups with plastique and other explosives to build bombs. 3 Using these explosives they have produced vehicle bombs which...deceptive, if not dangerously naive.1 5 State Supported Terrorism State supported terrorism is not a new concept , however, it has only recently been...terrorist incidents. The product of that study was the tri-level US anti- terrorism program concept . 3 The program structure is shown in Figure 11. President

  8. Exploring the Iran-Hezbollah Relationship: A Case Study of how State Sponsorship affects Terrorist Group Decision-Making

    Directory of Open Access Journals (Sweden)

    Marc R. DeVore

    2012-10-01

    Full Text Available Understanding the impact of state sponsorship on the decision-making of violent non-state actors is among the more important issues to scholars of security studies. This article addresses the issue by examining the relationship between Iran and Lebanon’s Hezbollah. To preview its conclusions, there are two main perspectives to consider with regard to the terrorist group – state sponsor relationship. First, state support has a powerful, yet indirect effect on violent non-state actor decision-making by shaping the options available to groups’ leaders.  Second, state sponsors can also directly leverage their aid to shape the strategic decisions of armed non-state actors, forcing their clients to either expand or restrict their activities. Because of inevitable lacunae and contradictions amongst published accounts, this study relies heavily upon primary sources and data collected during field research in Lebanon, including interviews with leaders from Hezbollah, the Lebanese Army, the United Nations' Peacekeeping Mission in Southern Lebanon (UNIFIL and the rival Shia organization, Amal.

  9. Aptitude for Destruction. Volume 1: Organizational Learning in Terrorist Groups and Its Implications for Combating Terrorism

    Science.gov (United States)

    2005-01-01

    jihad in Af- ghanistan. Over its history, the group has had active cells in several different coun- tries, including Indonesia, Malaysia , the...and South Armagh, London, UK: Coronet Books, LIR, 2000. Hedberg, Bo, "How Organizations Learn and Unlearn?" in Paul C. Nystrim and William H. Starbuck

  10. Geographic Trajectories of Al-Qaida and Taliban Terrorist Groups in Pakistan

    Directory of Open Access Journals (Sweden)

    Syed Manzar Abbas Zaidi

    2010-01-01

    Full Text Available Though Western analysts tend to mention al-Qaida and Taliban in Pakistan in the same context, the dynamics of their relationship are far more complex than a cursory examination would reveal. The context of this relationship is best understood within the overarching paradigm of militant activities of post 9/11 Taliban and al-Qaida remnants in Pakistan's tribal areas, where these groups flourish. The military struggle in Afghanistan has significantly influenced the formation of a loosely structured alQaida/Taliban "nexus" that was forged in Pakistan's Federally Administered Tribal Areas (FATA, particularly Waziristan. In order to survive the ongoing North Atlantic Treaty Organization (NATO military operations to flush them out, these groups rapidly devised a symbiotic strategy that characterizes al-Qaida's ability to subsume itself within the ranks of different militant organizations in Pakistan.

  11. Saudi Arabia: Terrorist Financing Issues

    National Research Council Canada - National Science Library

    Blanchard, Christoper M; Prados, Alfred B

    2007-01-01

    According to the U.S. State Department 2007 International Narcotics Control Strategy Report, Saudi donors and unregulated charities have been a major source of financing to extremist and terrorist groups over the past 25 years...

  12. Terrorist targeting and energy security

    Energy Technology Data Exchange (ETDEWEB)

    Toft, Peter; Duero, Arash; Bieliauskas, Arunas [Institute of Energy, Joint Research Center of the European Commission, P.O. Box 2, 1755 ZG Petten (Netherlands)

    2010-08-15

    Sudden, short-term disruptions seriously endangering energy security can be triggered by a variety of events - among them attacks by terrorists. This study investigates terrorist attack practices against energy infrastructures and discusses how we may understand them. Our results indicate that attacks against energy infrastructures are comparatively few. Also, we find no strong connection between the ideologies of various terrorist groups and their proclivity to attack. In addition, the highly disproportionate number of attacks in a handful of countries highlights the strong geographic concentration of attacks. To explain these findings, we analyze terrorist targeting incentives including intimidation levels, symbolism, attack feasibility, and concerns for stakeholders. We argue that terrorists in general have comparatively few incentives to attack energy supply infrastructures based on our assessment of these factors. Moreover, higher levels of terrorist incidents in states more prone to internal violent conflict may suggest stronger incentives to attack energy infrastructures. When outlining energy security policies, the low frequency of worldwide attacks coupled with the high concentration of attacks in certain unstable countries should be taken into consideration. Energy importing countries could benefit from developing strategies to increase stability in key energy supply and/or transit countries facing risks of internal instability. (author)

  13. The Decision Calculus of Terrorist Leaders

    OpenAIRE

    J. Tyson Chatagnier; Alex Mintz; Yair Samban

    2012-01-01

    This article contributes to the literature on terrorist group decision-making by introducing a new procedure, Applied Decision Analysis, in an attempt to understand how leaders of terrorist organizations make decisions. We examine twenty-three decisions taken by leaders of three terrorist organizations: Al-Qaeda, Hamas, and Hizballah. We also demonstrate the use of the Applied Decision Analysis procedure to uncover the "Decision DNA" or “decision code” of leaders of such organizat...

  14. Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists,.

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-03-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender's grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors' plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. © 2013 American Academy of Forensic Sciences.

  15. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡

    Science.gov (United States)

    Gill, Paul; Horgan, John; Deckert, Paige

    2014-01-01

    This article analyzes the sociodemographic network characteristics and antecedent behaviors of 119 lone-actor terrorists. This marks a departure from existing analyses by largely focusing upon behavioral aspects of each offender. This article also examines whether lone-actor terrorists differ based on their ideologies or network connectivity. The analysis leads to seven conclusions. There was no uniform profile identified. In the time leading up to most lone-actor terrorist events, other people generally knew about the offender’s grievance, extremist ideology, views, and/or intent to engage in violence. A wide range of activities and experiences preceded lone actors’ plots or events. Many but not all lone-actor terrorists were socially isolated. Lone-actor terrorists regularly engaged in a detectable and observable range of activities with a wider pressure group, social movement, or terrorist organization. Lone-actor terrorist events were rarely sudden and impulsive. There were distinguishable behavioral differences between subgroups. The implications for policy conclude this article. PMID:24313297

  16. Real Time Big Data Analytics for Predicting Terrorist Incidents

    Science.gov (United States)

    Toure, Ibrahim

    2017-01-01

    Terrorism is a complex and evolving phenomenon. In the past few decades, we have witnessed an increase in the number of terrorist incidents in the world. The security and stability of many countries is threatened by terrorist groups. Perpetrators now use sophisticated weapons and the attacks are more and more lethal. Currently, terrorist incidents…

  17. Understanding Terrorist Ideology

    National Research Council Canada - National Science Library

    Cragin, Kim

    2007-01-01

    This variation, by its very nature, makes it somewhat difficult to identify overarching patterns in how terrorist ideologies might motivate individuals and sympathetic communities on a global level...

  18. Involvement of Russian Organized Crime Syndicates, Criminal Elements in the Russian Military, and Regional Terrorist Groups in Narcotics Trafficking in Central Asia, the Caucasus, and Chechnya

    National Research Council Canada - National Science Library

    Curtis, Glenn E

    2002-01-01

    ... (Armenia, Azerbaijan, and Georgia), and in Chechnya. The purpose of the report is to reveal the role of Russian organized crime and Central Asian terrorist organizations in narcotics trafficking in those areas...

  19. Company profile: QuantuMDx group limited.

    Science.gov (United States)

    Burn, Jamie

    2013-07-01

    QuantuMDx Group Ltd (QMDx) is a group of companies based in the International Centre for Life, Newcastle upon Tyne, UK. The Group owns the founding patent and the exclusive worldwide license for, among others, the use of nanowires and nanotubes in DNA detection. It has further developed a patent estate around the functionalization of nanowires for DNA detection, and is working with commercial partners globally to produce the Q-POC™, a handheld point-of-care genetic testing device. This novel lab-on-a-chip technology integrates and automates the sample-to-result genetic testing process in a single microfluidic channel, incorporating novel lysis technologies, the filtration of cellular constituents to achieve DNA extraction and fractionation, a rapid, thermal PCR system, and nanowires functionalized with nucleic acid probes to capture targeted sequences of genetic material. The device further makes use of novel chemistries to boost the charge of nucleotides binding to the isolated material, increasing the sensitivity and read length of the device and making it capable of robust SNP and pathogen detection. Complete with a sophisticated software package, the Q-POC™ can detect binding events through changes in resistance and effectively convert genetic code into binary code, providing a simple display of the results, complete with treatment options. The competitive advantages of this system are the sensitivity and specificity of the nanowire detection system, the extremely low cost profile of the technology, and the speed of the process, which will allow the sample-to-result detection of targeted genetic material in less than 15 min.

  20. Terrorists and Suicide Attacks

    National Research Council Canada - National Science Library

    Cronin, Audrey K

    2003-01-01

    Suicide attacks by terrorist organizations have become more prevalent globally, and assessing the threat of suicide attacks against the United States and its interests at home and abroad has therefore...

  1. Terrorist Group Brands: Understanding Terrorist Group Strategies Through Brand Exposure

    Science.gov (United States)

    2016-06-01

    in the minds of targeted consumers, so they remember the product at the right time to maximize the benefit of the brand. This is done by...Beverland, “Crafting Brand Authenticity: The Case of Luxury Wines ,” Journal of Management Studies 42, no. 5 (07, 2005): 1003–1029. doi:10.1111/j.1467...recognition and recall 20 Beverland, Crafting Brand Authenticity: The Case of Luxury Wines , 1003–1029

  2. Identifying User Profiles from Statistical Grouping Methods

    Directory of Open Access Journals (Sweden)

    Francisco Kelsen de Oliveira

    2018-02-01

    Full Text Available This research aimed to group users into subgroups according to their levels of knowledge about technology. Statistical hierarchical and non-hierarchical clustering methods were studied, compared and used in the creations of the subgroups from the similarities of the skill levels with these users’ technology. The research sample consisted of teachers who answered online questionnaires about their skills with the use of software and hardware with educational bias. The statistical methods of grouping were performed and showed the possibilities of groupings of the users. The analyses of these groups allowed to identify the common characteristics among the individuals of each subgroup. Therefore, it was possible to define two subgroups of users, one with skill in technology and another with skill with technology, so that the partial results of the research showed two main algorithms for grouping with 92% similarity in the formation of groups of users with skill with technology and the other with little skill, confirming the accuracy of the techniques of discrimination against individuals.

  3. On Deceiving Terrorists

    Science.gov (United States)

    2001-12-01

    developed. By way of contrast, the last two categories—theoretical works and doctrine—attempt to transcend the contextual limits of the first two... Busqueda , the Colombian National Police “Search Bloc,” which was tasked with apprehending Escobar (Bowden, 2001). Deceiving Terrorists Chain Network

  4. Countering the Nuclear Terrorist Threat

    International Nuclear Information System (INIS)

    Vantine, H C

    2002-01-01

    The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant

  5. Religious cover to terrorist movement

    International Nuclear Information System (INIS)

    Zaidi, M.K.

    2005-01-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  6. Religious cover to terrorist movement

    Energy Technology Data Exchange (ETDEWEB)

    Zaidi, M K [US Department of Energy, Idaho Radiological and Environmental Sciences Laboratory (RESL), Idaho Falls (United States)

    2005-07-01

    Full text: Terrorism is the use of force or the threat of force against civilian populations to achieve political objectives. The terrorists create fear, response and disruption. People fighting for freedom who have no bombs - no airplanes would resort to such atrocities as beheading even though killing of innocent people is strictly prohibited in all the religions practiced on this earth. It is done out of political madness and not religious fervor so it was said that the fight against terrorism is not a military problem, nor is it a diplomatic one, but a cultural one. Terrorism is not associated to any particular faith or discipline but it is rooted deeply in poor education and resource system. Some frustrated individuals with no employment seek easy ways to form groups and cause harassment in neighborhoods and it expands to the local and national level. The scientific community must now resolve to confront the dangers facing civilized countries through employing the scientific culture, which means scientific excellence and solidarity, to overcome ignorance in the face of global terrorism. The developed nations have adopted to collect information, do research, have tools to act and take action. States must improve the timely cross-border sharing of national security intelligence information, under appropriate circumstances, between intelligence and law enforcement agencies to better prevent and disrupt terrorist activities and to prosecute terrorists. Some world's leaders have agreed to use the national security intelligence information in investigation and prosecution process as a vital component in the battle against terrorism. Political leaders, rulers, administrator, school counselors and teachers should think of how the problems could be solved if they meet the needs and hopes of their inhabitants, provide proper education to build good moral values and also address their concerns. (author)

  7. Reducing the attractiveness of chemical plants to terrorist attacks: dehorning rhinos

    NARCIS (Netherlands)

    Khakzad Rostami, N.

    2017-01-01

    The terrorist attacks to two French chemical facilities in June and July 2015 raised the flag about the attractiveness of chemical plants to terrorist groups and the imminent risk of similar attacks in western countries. Although the 9/11 terrorist attacks in the US put the security of chemical

  8. Underfunding in Terrorist Organizations

    Science.gov (United States)

    Shapiro, Jacob N.; Siegel, David A.

    A review of international terrorist activity reveals a pattern of financially strapped operatives working for organizations that seem to have plenty of money. To explain this observation, and to examine when restricting terrorists’ funds will reduce their lethality, we model a hierarchical terror organization in which leaders delegate financial and logistical tasks to middlemen, but cannot perfectly monitor them for security reasons. These middlemen do not always share their leaders’ interests: the temptation exists to skim funds from financial transactions. When middlemen are sufficiently greedy and organizations suffer from sufficiently strong budget constraints, leaders will not fund attacks because the costs of skimming are too great. Using general functional forms, we find important nonlinearities in terrorists’ responses to government counter-terrorism. Restricting terrorists’ funds may be ineffective until a critical threshold is reached, at which point cooperation within terrorist organizations begins to break down and further government actions have a disproportionately large impact.

  9. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    OpenAIRE

    Diane M. Zierhoffer

    2014-01-01

    This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999) poses ten questions about t...

  10. Threat Assessment: Do Lone Terrorists Differ from Other Lone Offenders?

    Directory of Open Access Journals (Sweden)

    Diane M. Zierhoffer

    2014-10-01

    Full Text Available This study evaluates the viability of a threat assessment model developed to calculate the risk of targeted violence as a predictor of violence by potential lone terrorists. There is no profile, to date, which would assist in the identification of a lone terrorist prior to an attack. The threat assessment model developed by Borum, Fein, Vossekuil, and Berglund and described in “Threat Assessment: Defining an approach for evaluating risk of targeted violence” (1999 poses ten questions about the patterns of thinking and behaviors that may precipitate an attack of targeted violence. Three terrorists are studied to assess the model’s value as a predictor of terrorism. It is assessed for its use within law enforcement, during an investigation of someone brought to attention as a possible terrorist and for family members or friends who suspect potential terrorist behavior. Would these questions encourage someone to report a friend to prevent a possible attack? This threat assessment model provides a foundation for future research focused on developing a structured risk assessment for lone terrorists. In its present form, the questions can assist both citizens and law enforcement personnel in identifying the patterns of thought and behavior potentially indicative of a lone terrorist.

  11. Quantifying and Interpreting Group Differences in Interest Profiles

    Science.gov (United States)

    Armstrong, Patrick Ian; Fouad, Nadya A.; Rounds, James; Hubert, Lawrence

    2010-01-01

    Research on group differences in interests has often focused on structural hypotheses and mean-score differences in Holland's (1997) theory, with comparatively little research on basic interest measures. Group differences in interest profiles were examined using statistical methods for matching individuals with occupations, the C-index, Q…

  12. The Development of Decision Aids for Counter-Terrorist Applications

    Science.gov (United States)

    1980-12-01

    I.D. AM OLT of PLO A14YOLP of PLO Agua Sandinist TPLF of Turkey 0 TERORISTS 3 4 25 2 GROUP CAPABILITY Unknown Unknown Auto Weapons Sten Gun "DEADLINE...of any terrorist group to different situ - ations are not independent, but reflect a coherent policy regarding violence and willingness to negotiate...importance in this stage is the need to deter future terrorist activities with- out jeopardizing our credibility in future negotiation situ - ations. I8

  13. Malevolent Creativity in Terrorist Organizations

    Science.gov (United States)

    Gill, Paul; Horgan, John; Hunter, Samuel T.; Cushenbery, Lily D.

    2013-01-01

    Terrorist organizations are both imitative and innovative in character. While the drivers of imitation have been extensively modeled using concepts such as contagion and diffusion, creativity and innovation remain relatively underdeveloped ideas in the context of terrorist behavior. This article seeks to redress this deficiency by presenting a…

  14. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    The Greek government unsuccessfully battled leftist terrorist groups from 1975 to 2002, The two most notorious terrorist organizations during this period were the "November 17" group and another group...

  15. Political terrorism and affective polarization in "black" and "red" terrorists in Italy during the years 1968-1988.

    Science.gov (United States)

    Pacini, Matteo; Maremmani, Icro

    2018-04-01

    Psychiatric evaluations of violent political crime were mostly performed on a case-by-case basis in a forensic environment, which made them unduly dependent on categories of presumed dangerousness and legal responsibility, rather than on a clinical definition of their mental status. In referring to such "clinical" definitions, the disorder we have in mind is not limited to the major, agitated psychotic manias or mixed states. The presence of a dominant temperament, or protracted hypomania, is enough by itself to explain an individual's engagement in a wide range of activities, not necessarily sociopathic or violent. We put forward the hypothesis that formal and transpolitical radical choices, either in favor of an illegal lifestyle or of activities involving a high level of risk, may be linked with certain mental states, especially when considering small clandestine groups showing a high level of internal ideological consensus, and a no-return attitude toward a commitment to radical choices. Available data about the psycho(patho)logical profile of terrorists are still hard to come by. The only available studies are those on identified living terrorists (judging by the trials of those who personally admitted to having been terrorists), and statistical data imply a number of documented cases belonging to the same terrorist organization. In Italy, the period often called the "years of lead [bullets]" displays an interesting viewpoint for the study of terrorist psychology, for two main reasons: first of all, it is a historically defined period (1968-1988), and second, the number of ascertained participants in terrorist activities was quite large.

  16. When Do Governments Concede to Terrorists

    Science.gov (United States)

    2014-06-01

    crisis, 146 people were taken hostage by the terrorist group Tupac Amaru (MRTA) at the Japanese Embassy in Peru . Six of those were American...hispanic_heritage/article-9475994 FARC-EP. (2009). Chronology of resistance: FARC-EP, a history of struggle. Retrieved from http://resistencia- colombia.org...index.php?option=com_content&view=article&id=463: chronology - of-resistance-farc-ep-a-history-of-struggle&catid=50&Itemid=85 Gladwell, M. (2000). The

  17. Professional Group Development Trainers’ Personality Characteristics and Affective Profiles

    Directory of Open Access Journals (Sweden)

    Max eRapp Ricciardi

    2014-10-01

    Full Text Available Background: The Development of Groups and Leaders (UGL, provided by the Swedish National Defence College and mentored by UGL-trainers, is one of the most popular management programs among civilians in Sweden. However, there is a lack of scientific evidence regarding the training. We used the affective profile model (i.e., the combination of positive, PA, and negative affect, NA to mapp important markers of empowerment, self-awareness, adaptive coping skills, and maturity among the UGL-trainers. The aims were: (1 to compare profiles between UGL-trainers and managers/supervisors and (2 to investigate differences in personal characteristics.Method: UGL-trainers (N = 153 and the comparison group (104 Swedish Chiefs of Police completed an online survey on optimism, self-esteem, locus of control, and affect. The four profiles are: self-fulfilling (high PA, low NA, high affective (high PA, high NA, low affective (high PA, low NA, and self-destructive (low PA, high NA,Results: The self-fulfilling profile was more common among UGL-trainers (25.70% than among Chiefs of Police (19.20%. UGL-trainers, compared to Chiefs of Police, were more likely to express a self-fulling than a low affective profile (OR=2.22, p < .05 and a high affective than a low affective profile (OR=1.43, p <.001. UGL-trainers with a self-fulfilling profile, compared to those with a self-destructive profile, scored higher in optimism, higher in self-esteem, and lower in external locus of control. Conclusions: The probability of self-fulfilment rather than low affectivity was higher among UGL-trainers. Self-fulfilment was associated to markers of self-awareness and adaptive coping skills. However, the most common profile was the low affective, which is associated to low performance during stress, low degree of personal development, low degree of purpose in life, and low resilience. Hence, it might be important for UGL-trainers to have a continuos training in awareness after

  18. Categorizing terrorist entities listed by the European Union according to terrorist groups’ underlying motives

    Directory of Open Access Journals (Sweden)

    Liane Rothenberger

    2015-10-01

    Full Text Available States and international organizations have compiled lists of a great variety of terrorist groups. The current European Union list includes 44 entities. This study analyzes the underlying motives of the terrorist organizations named in this list. In order to understand the groups’ motivations and consequently be able to advise on methods of countering them with communication strategies, we employ a three-item typology provided by Waldmann (2001. The results show that only five of the 44 groups were religiously motivated to commit terrorism. Most of the groups (n=20 had nationalist-separatist motives, and 19 groups displayed social-revolutionary motives. Based on the respective motives, differing counter-terrorism strategies are proposed, e.g., developing rhetorical counter-narratives that address and reduce the groups’ motivational and identity-generating characteristics.

  19. Terrorist use of the Internet: exploitation and support through ICT infrastructure

    CSIR Research Space (South Africa)

    Veerasamy, N

    2011-03-01

    Full Text Available methods of fundraising are also possible. Electronic money transfer, laundering and generating support through front organisations are all fundraising methods used by terrorists (Goodman, Kirk & Kirk 2007). According to the Financial Action Task Force... agent. This allows terrorist groups to move money around without actually delivering the auctioned goods or services. Online casinos can be used for both laundering and storing money. When dealing with large sums of money, terrorists can place...

  20. The Social Profiles of Occupational Therapy Students’ Educational Groups

    Directory of Open Access Journals (Sweden)

    Tore Bonsaksen

    2015-07-01

    Full Text Available Background: Today’s occupational therapy models emphasize that a person’s choice of, satisfaction with, and performance in occupations are markedly influenced by the context. For students undergoing a group-based study module, the group is an important context factor. Until recently, there has been a lack of instruments available for the assessment of functioning and participation at the group level. This mixed methods pilot study aimed to examine occupational therapy students’ perceptions of their group’s level of functioning and course of development during one study module. Methods: The students’ perceptions of their group’s functioning were assessed in two ways: by examining their scores on the Social Profile (SP, a new instrument, and by examining their qualitative descriptions of the groups and how the groups developed over time. The sample consisted of four occupational therapy students. Results: Two students perceived their group functioning as stable over time. One student’s scores indicated an increase in group functioning over time, whereas one student’s showed a decrease. The interview statements showed varying degrees of connectedness with the SP items. Conclusions: Descriptions of stability and change corresponded very well with the students’ SP trajectories, indicating content validity of the assessment as a whole.

  1. INTERNATIONALLY LEGAL MEASURES TO COMBAT TERRORIST FINANCING

    Directory of Open Access Journals (Sweden)

    Yuniarti Yuniarti

    2014-09-01

    Full Text Available Following the terrorist attacks in the USA on September 11th, 2001, it was discovered that money laundering was a significant source of finance for terrorists. Although, the amount of money that involve is not as involve as in drug and gun trafficking, terrorist financing had been the most important substance to be monitor. Further, various legal measures have been taken internationally in order to combat terrorist financing. This research analyses the legal measures that have been taken internationally and at EU level to combat terrorist financing. Key words: Money Laundering, Terrorist Financing, International Legal measures, EU.

  2. Group-decoupled multi-group pin power reconstruction utilizing nodal solution 1D flux profiles

    International Nuclear Information System (INIS)

    Yu, Lulin; Lu, Dong; Zhang, Shaohong; Wang, Dezhong

    2014-01-01

    Highlights: • A direct fitting multi-group pin power reconstruction method is developed. • The 1D nodal solution flux profiles are used as the condition. • The least square fit problem is analytically solved. • A slowing down source improvement method is applied. • The method shows good accuracy for even challenging problems. - Abstract: A group-decoupled direct fitting method is developed for multi-group pin power reconstruction, which avoids both the complication of obtaining 2D analytic multi-group flux solution and any group-coupled iteration. A unique feature of the method is that in addition to nodal volume and surface average fluxes and corner fluxes, transversely-integrated 1D nodal solution flux profiles are also used as the condition to determine the 2D intra-nodal flux distribution. For each energy group, a two-dimensional expansion with a nine-term polynomial and eight hyperbolic functions is used to perform a constrained least square fit to the 1D intra-nodal flux solution profiles. The constraints are on the conservation of nodal volume and surface average fluxes and corner fluxes. Instead of solving the constrained least square fit problem numerically, we solve it analytically by fully utilizing the symmetry property of the expansion functions. Each of the 17 unknown expansion coefficients is expressed in terms of nodal volume and surface average fluxes, corner fluxes and transversely-integrated flux values. To determine the unknown corner fluxes, a set of linear algebraic equations involving corner fluxes is established via using the current conservation condition on all corners. Moreover, an optional slowing down source improvement method is also developed to further enhance the accuracy of the reconstructed flux distribution if needed. Two test examples are shown with very good results. One is a four-group BWR mini-core problem with all control blades inserted and the other is the seven-group OECD NEA MOX benchmark, C5G7

  3. Understanding public confidence in government to prevent terrorist attacks.

    Energy Technology Data Exchange (ETDEWEB)

    Baldwin, T. E.; Ramaprasad, A,; Samsa, M. E.; Decision and Information Sciences; Univ. of Illinois at Chicago

    2008-04-02

    A primary goal of terrorism is to instill a sense of fear and vulnerability in a population and to erode its confidence in government and law enforcement agencies to protect citizens against future attacks. In recognition of its importance, the Department of Homeland Security includes public confidence as one of the principal metrics used to assess the consequences of terrorist attacks. Hence, a detailed understanding of the variations in public confidence among individuals, terrorist event types, and as a function of time is critical to developing this metric. In this exploratory study, a questionnaire was designed, tested, and administered to small groups of individuals to measure public confidence in the ability of federal, state, and local governments and their public safety agencies to prevent acts of terrorism. Data was collected from three groups before and after they watched mock television news broadcasts portraying a smallpox attack, a series of suicide bomber attacks, a refinery explosion attack, and cyber intrusions on financial institutions, resulting in identity theft. Our findings are: (a) although the aggregate confidence level is low, there are optimists and pessimists; (b) the subjects are discriminating in interpreting the nature of a terrorist attack, the time horizon, and its impact; (c) confidence recovery after a terrorist event has an incubation period; and (d) the patterns of recovery of confidence of the optimists and the pessimists are different. These findings can affect the strategy and policies to manage public confidence after a terrorist event.

  4. Nosographic profile of soccer injuries according to the age group

    Directory of Open Access Journals (Sweden)

    Karoline Pegoraro Silveira

    2013-05-01

    Full Text Available Soccer is one of the world’s most popular team sports and corresponds to one ofthe leading causes of sports injuries (SI. This study aimed to analyze the nosographic profile of the sports injuries common to soccer, according to theage group: childhood, youth and adulthood. We selected 209 soccer players, from amateurs to professional players of a sports club from Campo Grande/MS.Participants were divided into four age groups: G1 (childhood, G2 (juvenile,G3 (teenagers and G4 (adults. To obtain information about the injuries, we used a morbidity survey. Generally, 74 athletes reported sports injuries, with register of 92 SI. Concerning injury types, muscle injuries totalized 43.47%, followed by joint damage (34.78% and tendon injury (14.13%, respectively (p 0.05. A higher proportion of registers involved medical-therapeutic approach and asymptomatic return. The evidence shows a higher rate of muscle and joint injuries by contact in the lower limbs in soccer practitioners, regardless of age group. The practice of training seemsto be the main cause of injuries in adolescents and adults.

  5. Nosographic profile of soccer injuries according to the age group

    Directory of Open Access Journals (Sweden)

    Karoline Pegoraro Silveira

    2013-04-01

    Full Text Available DOI: http://dx.doi.org/10.5007/1980-0037.2013v15n4p476 Soccer is one of the world’s most popular team sports and corresponds to one ofthe leading causes of sports injuries (SI. This study aimed to analyze the nosographic profile of the sports injuries common to soccer, according to the age group: childhood, youth and adulthood. We selected 209 soccer players, from amateurs to professional players of a sports club from Campo Grande/MS. Participants were divided into four age groups: G1 (childhood, G2 (juvenile,G3 (teenagers and G4 (adults. To obtain information about the injuries, we used a morbidity survey. Generally, 74 athletes reported sports injuries, with register of 92 SI. Concerning injury types, muscle injuries totalized 43.47%, followed by joint damage (34.78% and tendon injury (14.13%, respectively (p 0.05. A higher proportion of registers involved medical-therapeutic approach and asymptomatic return. The evidence shows ahigher rate of muscle and joint injuries by contact in the lower limbs in soccer practitioners, regardless of age group. The practice of training seems to be the main cause of injuries in adolescents and adults.

  6. `Googling' Terrorists: Are Northern Irish Terrorists Visible on Internet Search Engines?

    Science.gov (United States)

    Reilly, P.

    In this chapter, the analysis suggests that Northern Irish terrorists are not visible on Web search engines when net users employ conventional Internet search techniques. Editors of mass media organisations traditionally have had the ability to decide whether a terrorist atrocity is `newsworthy,' controlling the `oxygen' supply that sustains all forms of terrorism. This process, also known as `gatekeeping,' is often influenced by the norms of social responsibility, or alternatively, with regard to the interests of the advertisers and corporate sponsors that sustain mass media organisations. The analysis presented in this chapter suggests that Internet search engines can also be characterised as `gatekeepers,' albeit without the ability to shape the content of Websites before it reaches net users. Instead, Internet search engines give priority retrieval to certain Websites within their directory, pointing net users towards these Websites rather than others on the Internet. Net users are more likely to click on links to the more `visible' Websites on Internet search engine directories, these sites invariably being the highest `ranked' in response to a particular search query. A number of factors including the design of the Website and the number of links to external sites determine the `visibility' of a Website on Internet search engines. The study suggests that Northern Irish terrorists and their sympathisers are unlikely to achieve a greater degree of `visibility' online than they enjoy in the conventional mass media through the perpetration of atrocities. Although these groups may have a greater degree of freedom on the Internet to publicise their ideologies, they are still likely to be speaking to the converted or members of the press. Although it is easier to locate Northern Irish terrorist organisations on Internet search engines by linking in via ideology, ideological description searches, such as `Irish Republican' and `Ulster Loyalist,' are more likely to

  7. You Are the Real Terrorist and We Are Just Your Puppet: Using Individual and Group Factors to Explain Indonesian Muslims’ Attributions of Causes of Terrorism

    Science.gov (United States)

    Mashuri, Ali; Akhrani, Lusy Asa; Zaduqisti, Esti

    2016-01-01

    The current study investigates the role of individual and intergroup factors in predicting Muslims’ tendency to attribute domestic terrorism in Indonesia to an external cause (i.e., The West) or an internal cause (i.e., radical Islamist groups). The results (N = 308) showed that intergroup factors of symbolic threat and realistic threat directly increased the external attribution and conversely decreased the internal attribution. Within the context of the current research, symbolic threat refers to Muslims’ perception that the norms and values of the West undermine Islamic identity. Realistic threat denotes Muslims’ perception that the economy and technology of the West undermine Islamic power. The individual factor of Islamic fundamentalism, which has to do with Muslims’ belief in the literal interpretation of and strict guidelines to Islamic doctrines, indirectly predicted both external attribution and internal attribution of terrorism as hypothesized, via the extent to which Muslims perceived the West as posing a symbolic threat, but not a realistic threat to Islamic existence. Uncertainty avoidance, a cultural dimension that describes the extent to which people view clear instructions as a pivotal source of concern to deal with societal problems, also significantly increased perceived symbolic threat and realistic threat, and this cultural dimension mediated the effect of Islamic fundamentalism on each of the intergroup threats. Finally, we found that the level of Islamic fundamentalism was dependent upon cognitive response, but not emotional response to mortality salience. The cognitive response to mortality salience denotes what Muslims are thinking about in coping with their own death whereas the emotional response denotes what Muslims are feeling about such issue. In particular, we found the cognitive response, but not the emotional response to mortality salience significantly gave rise to Muslims’ Islamic fundamentalism. These findings shed light

  8. Sub Saharan African Terrorist Groups’ use of the Internet

    Directory of Open Access Journals (Sweden)

    Stewart Bertram

    2014-02-01

    Full Text Available Recent actions by French military forces in Niger and the global prominence of terrorist groups such as Al Shabaab and Boko Haram, have highlighted the growing counter terrorist focus on the countries of Sub Saharan Africa. Additionally in a post Bin Laden world and with the immanent withdrawal of coalition combat troops from Afghanistan, there is the possibility of Africa as a continent becoming the new front in the Global War on Terror ('Mben' et al., 2013. However, it is a mistake to assume that Africa’s story is uniformly one of violence and death. Vibrant cultures and a rugged entrepreneurial spirit have combined with a robust Internet backbone, to create the embryonic emergence of high tech hotspots across Africa. With rising IT literacy levels, more and more Africans are becoming connected to the information super highway on a daily basis (Graham, 2010. A tiny minority of these Africans are terrorists.

  9. Foreign Terrorist Organizations

    Science.gov (United States)

    2004-02-06

    Familiar Road Map to Terror,” Associated Press, Dec. 18, 2001. Armed Islamic Group (GIA) Name(s). Armed Islamic Group, GIA Goals and Objectives. GIA...known as La Violencia (1948-1958).390 The violence ended in 1958 with a reconciliation between key parties in the government. Meanwhile, landless

  10. Freed: Ripples of the Convicted and Released Terrorist in America

    Science.gov (United States)

    2011-03-01

    Singapore, Malaysia , Indonesia, Thailand, and the Philippines (The International Conference on Terrorist Rehabilitation, 2009). No single methodology to...2009, p. 16). Care Rehabilitation Centers include group meals, art therapy, recreation and other leisure activity to “build teamwork but also

  11. Terrorist threats of nuclear facilities

    International Nuclear Information System (INIS)

    Jozsef Solymosi; Jozser Ronaky; Zoltan Levai; Arpad Vincze; Laszlo Foldi

    2004-01-01

    More than one year has passed since the terrible terrorist attacks against the United States. The tragic event fundamentally restructured our security policy approach and made requirements of countering terrorism a top priority of the 21st century. In one year a lot of studies were published and the majority of them analyses primarily the beginnings of terrorism then focus on the interrelations of causes and consequences of the attacks against the WTC. In most of the cases the authors can only put their questions most of which have remained unanswered to date. Meanwhile, in a short while after the attacks the secret assessments of threat levels of potential targets and areas were also prepared. One of the high priority fields is the issue of nuclear, biological, and chemical security, in short NBC-security. Here and now we focus on component N, that is the assessment techniques of nuclear security in short, without aiming at completeness. Our definite objective is to make non-expert readers understand - and present a concrete example as it is done in risk analysis - the real danger-level of nuclear facilities and especially the terrorist threat. Our objective is not to give tips to terrorists but to provide them with deterring arguments and at the same time calm worried people. In our communique we give an overview of international practice of nuclear antiterrorism and of preventive nuclear protection in Hungary. (author)

  12. Relationship between ABO Blood Groups and Lipid Profile Level in ...

    African Journals Online (AJOL)

    Journal of Applied Sciences and Environmental Management ... and Lipid Profile Level in Healthy Adult Residents in Port Harcourt Metropolis, Nigeria ... diseases (CVDs) and association of cardiovascular disease risk factors with the ABO ...

  13. Profile of ocular injury in pediatric age group

    Directory of Open Access Journals (Sweden)

    Kanishk Singh

    2017-03-01

    Full Text Available AIM: To study the clinical profile of ocular injuries in children in a tertiary care center in Northern India.METHODS: This was a hospital based descriptive study. All children of ocular injuries up to 16y of age were included. Data regarding the socio-economic status, medical/surgical treatment, and condition at discharge were recorded. Follow-up to 3mo was done in the study. Initial and final visual acuity was recorded. Ocular Trauma Classification Group guidelines and Birmingham Eye Trauma Terminology were used for the definitions and classifications of ocular trauma. Socio-economic status grading is done according to modified B.G. Prasad classification and Kuppuswamy's socio-economic scale.RESULTS: Out of 42 children, male to female ratio was 3.6:1.Maximum number(50%of injuries occurred between 11-16y of age. Most of the children(59.52%belonged to lower socio-economic class and were from arural background. Ocular injuries occurred at home in 20(47.61%children followed by 6(14.28%each in school, playground, and street. Open globe injuries were seen in 19(45.24%children and 23(54.75%children had closed globe injuries. Injuries by wooden stick, stone, firework, fall, toy were 12(28.57%, 5(11.90%, 3(7.14%, 3(7.14%, and 2(4.76%. Seventeen(40.47%children required medical management and 25(59.53%were treated surgically.CONCLUSION:Male children in rural regions and of lower socio-economic background were more prone to ocular injuries. Children were more risk of ocular injuries at home. Wooden sticks and stone were the commonest cause of ocular injuries. Ocular morbidity and poor visual outcome were seen more in open globe injuries. Further population-based studies are required to reinforce findings of present study. Based on this, a long term strategy can be planned to prevent ocular injuries in children in this region.

  14. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    National Research Council Canada - National Science Library

    Hudson, Rex A

    1999-01-01

    ...) and the new recruitment patterns of some groups, such as recruiting suicide commandos, female and child terrorists, and scientists capable of developing weapons of mass destruction, provide a measure...

  15. Defender's Edge: Utilizing Intelligent Agent Technology to Anticipate Terrorist Acts

    National Research Council Canada - National Science Library

    Scheiber, Lane

    2003-01-01

    ...), to the problem of anticipating terrorist acts. Two areas in which IAs could play a significant role are in the development and maintenance of a real-time picture of terrorist activity, and in predicting potential occurrences of terrorist acts...

  16. Terrorists on Trial: A Performative Perspective

    Directory of Open Access Journals (Sweden)

    Beatrice de Graaf

    2011-03-01

    Full Text Available On 30 March 2011, ICCT organised an Expert Meeting entitled “Terrorism Trials as Theatre: A Performative Perspective”. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group, the Mumbai 2008 Terrorist Attack Trial and the Guantanamo Military Tribunals. As such, the Expert Meeting did not concentrate solely on the immediate judicial performance of the magistrates and/or the defence; instead, the trials were put in their wider sociological context, adopting notions of social drama and communication sciences. This Expert Meeting Paper is a further adaptation of the Discussion Paper that was used as basis for debate during the Meeting.

  17. Surgical resource utilization in urban terrorist bombing: a computer simulation.

    Science.gov (United States)

    Hirshberg, A; Stein, M; Walden, R

    1999-09-01

    The objective of this study was to analyze the utilization of surgical staff and facilities during an urban terrorist bombing incident. A discrete-event computer model of the emergency room and related hospital facilities was constructed and implemented, based on cumulated data from 12 urban terrorist bombing incidents in Israel. The simulation predicts that the admitting capacity of the hospital depends primarily on the number of available surgeons and defines an optimal staff profile for surgeons, residents, and trauma nurses. The major bottlenecks in the flow of critical casualties are the shock rooms and the computed tomographic scanner but not the operating rooms. The simulation also defines the number of reinforcement staff needed to treat noncritical casualties and shows that radiology is the major obstacle to the flow of these patients. Computer simulation is an important new tool for the optimization of surgical service elements for a multiple-casualty situation.

  18. Risk profiles and corporate social responsibility for socially disadvantaged groups

    Directory of Open Access Journals (Sweden)

    Serbanescu Cosmin

    2017-07-01

    Full Text Available Developing a suitable mechanism to stimulate the effective redeployment of capital to social activities can be designed using the corporate social responsibility (CSR concept. Informational asymmetry about the real state of social risks influences the effectiveness of allocations in social protection. Reducing information asymmetries can be achieved by providing the corporations with socially determined risk profiles based on predetermined patterns. Offering concrete lines of action following the risk profiles approach which to base investment decisions of companies in CSR can maximize the results of such a mechanism. In a previous study the authors have developed a theoretical model for determining the poverty risk profile. This study aims to present the practical application of the theoretical model and to provide comments on some errors. Hence, the authors analyzed Buzau county municipalities in presenting the highest risk level determined by the theoretical model and related causes and performed an impact assessment of an investment in CSR based on a model. Specifically, the authors evaluated the impact of reducing the risk of poverty for a suitable investment in CSR. In the second part of the study, the authors analyzed the types of errors that can be found in the municipalities risk profile model due to the granularity of the data. Thus, for the error of over-inclusion, the authors assessed social allocative efficiency at the community level using benchmarking analysis, Data Envelopment respectively and analyzed the data of the under-inclusion error in Buzau county villages. The paper aims to analyze the relative limits on quantitative models and risk of poverty and the practical implementation of these types of models in the development of corporate social responsibility. The study provides also a useful tool which can be made available to companies in order to increase the vulnerable groups’ life quality and the satisfaction of

  19. Plutonium - how great is the terrorist threat

    International Nuclear Information System (INIS)

    Cohen, B.L.

    1977-01-01

    The terrorists' problems in stealing the plutonium and fabricating the device are measured against the likely effects of its explosion. Alternatives are discussed and it is concluded that there are many easier ways of killing a large number of people. It is considered impossible to guard absolutely against all possible terrorist threats of mass murder. (U.K.)

  20. The Current Legal Framework of the Use of Force against Terrorist Organizations

    Directory of Open Access Journals (Sweden)

    Petra PERISIC

    2013-11-01

    Full Text Available Events that took place on 9/11, when symbols of American nation were destroyed by hijacked civilian airplanes, raised the issue of the effectiveness of the currently existing legal framework which regulates terrorist activities. Prior to that event, dealing with terrorist activities was mostly regulated by conventions, many of which were ratified by no more than couple of states. However, it became questionable whether these instruments are sufficient to fight terrorists who are not only immune to a threat of sanctions, but are even ready to sacrifice their lives. After the attacks took place, the United States launched against Afghanistan an armed action, ending up in a more than a decade long occupation, holding Taliban regime responsible for the attacks undertaken by Al-Qaida. The United States response to the 9/11 raised an important question: what is the legal response to terrorist attacks? This article explores the current legal framework of the use of force in response to terrorist attacks, especially with regard to distinguishing terrorist acts which are attributable to a certain state, from those which are undertaken by a terrorist group, not associated with any particular state.

  1. Radical Islam as a Means of Self-Realization for the North Caucasian Youth: From the Terrorist-Criminal Groups to the Beginnings of the Creation of a New, Less Controlled Subculture

    Directory of Open Access Journals (Sweden)

    Nikoloz Janelidze

    2015-11-01

    Full Text Available Radical Islam with its various types of manifestations is one of the significant challenges facing the modern world. This problem has also affected the societies of autonomous republics bordering Georgia to the north. In today’s North Caucasus, the activity of radical Islam followers has reached beyond the political (in many cases terrorist niche and has acquired quasi-social characteristics. Furthermore, the facts and tendencies indicate that this part of the society (in this case youth purposefully or unintentionally creates the so-called uncontrolled and/or less controlled subculture with different opinions, views, ideology, behaviors, in many cases clothes, hairstyle, etc. Radical Islam (in this case as a doctrine regulates human conduct – provides advice, dictates how to act, and in fact it sets a dogma how to dress, how to behave in public, how to live, etc. Wahhabis/Salafis are forbidden to smoke tobacco, hashish, to use beads, sing loudly, dance, etc. It is worth to separately note the so-called aggressive wing of Wahhabism/Salafism or the terrorists, field commanders, etc.One of the motives for writing the article is to show readers the fact that radical Islam in North Caucasus is not solely a terrorist activity. It encompasses a much broader spectrum of the society, and at the same time it is much more than a religion. It sets the norms of social behavior and thinking, which in itself limits the formation of subjective attitudes. Exactly the lack of the latter generates the negative trend of their activities, which quite often are used for political actions by the respective forces.

  2. TXTGate: profiling gene groups with text-based information

    DEFF Research Database (Denmark)

    Glenisson, P.; Coessens, B.; Van Vooren, S.

    2004-01-01

    We implemented a framework called TXTGate that combines literature indices of selected public biological resources in a flexible text-mining system designed towards the analysis of groups of genes. By means of tailored vocabularies, term-as well as gene-centric views are offered on selected textual...

  3. Neuropsychological profile in a large group of heart transplant candidates.

    Directory of Open Access Journals (Sweden)

    Daniela Mapelli

    Full Text Available BACKGROUND: Recent studies have reported that patients with end-stage heart disease can have cognitive deficits ranging from mild to severe. Little is known, however, about the relationship between cognitive performance, neurophysiological characteristics and relevant clinical and instrumental indexes for an extensive evaluation of patients with heart failure, such as: left ventricular ejection fraction (LVEF and other haemodynamic measures, maximum oxygen uptake during cardiopulmonary exercise testing, comorbidities, major cardiovascular risk factors and disease duration. Our purpose was to outline the cognitive profiles of end-stage heart disease patients in order to identify the cognitive deficits that could compromise the quality of life and the therapeutic adherence in end-stage heart disease patients, and to identify the variables associated with an increased risk of cognitive deficits in these patients. METHODS: 207 patients with end-stage cardiac disease, candidates for heart transplant, were assessed by complete neuropsychological evaluation and by electroencephalographic recording with EEG spectral analysis. RESULTS: Pathological scores in one or more of the cognitive tests were obtained by 86% of the patients, while 36% performed within the impaired range on five or more tests, indicating poor performance across a broad range of cognitive domains. The executive functions were the cognitive domain most impaired (70%. Poor performances were not related to the aetiology of heart disease, but rather to cerebral dysfunction secondary to haemodynamic impairment and to comorbidities. CONCLUSIONS: Severe heart failure induces significant neurophysiological and neuropsychological alterations, which may produce an impairment of cognitive functioning and possibly compromise the quality of life of patients and the therapeutic adherence.

  4. The Nation That Cried Lone Wolf : A Data-Driven Analysis of Individual Terrorists in the United States Since 9/11

    OpenAIRE

    Eby, Charles A.

    2012-01-01

    Approved for public release; distribution is unlimited Lone-wolf terrorist attacks have occurred in the United States throughout the countrys history. Attempted attacks from individual terrorists unaffiliated with terrorist groups may be becoming more prevalent. Both the general public and government officials acknowledge the presence and importance of these attacks; however, relatively little literature exists on the subject compared to group terrorism. Much of the information on lone wol...

  5. 25 CFR 11.402 - Terroristic threats.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Criminal Offenses § 11.402 Terroristic threats. A person is guilty of a misdemeanor if he or she threatens to commit any crime of violence with purpose to terrorize another or to cause evacuation...

  6. Cohort Profile: The Applied Research Group for Kids (TARGet Kids!).

    Science.gov (United States)

    Carsley, Sarah; Borkhoff, Cornelia M; Maguire, Jonathon L; Birken, Catherine S; Khovratovich, Marina; McCrindle, Brian; Macarthur, Colin; Parkin, Patricia C

    2015-06-01

    The Applied Research Group for Kids (TARGet Kids!) is an ongoing open longitudinal cohort study enrolling healthy children (from birth to 5 years of age) and following them into adolescence. The aim of the TARGet Kids! cohort is to link early life exposures to health problems including obesity, micronutrient deficiencies and developmental problems. The overarching goal is to improve the health of Canadians by optimizing growth and developmental trajectories through preventive interventions in early childhood. TARGet Kids!, the only child health research network embedded in primary care practices in Canada, leverages the unique relationship between children and families and their trusted primary care practitioners, with whom they have at least seven health supervision visits in the first 5 years of life. Children are enrolled during regularly scheduled well-child visits. To date, we have enrolled 5062 children. In addition to demographic information, we collect physical measurements (e.g. height, weight), lifestyle factors (nutrition, screen time and physical activity), child behaviour and developmental screening and a blood sample (providing measures of cardiometabolic, iron and vitamin D status, and trace metals). All data are collected at each well-child visit: twice a year until age 2 and every year until age 10. Information can be found at: http://www.targetkids.ca/contact-us/. © The Author 2014; all rights reserved. Published by Oxford University Press on behalf of the International Epidemiological Association.

  7. Australian Correctional Management Practices for Terrorist Prisoners

    Directory of Open Access Journals (Sweden)

    Nathan Tompson

    2018-03-01

    Full Text Available Management practices for incarcerated terrorists is an important counterterrorism policy consideration. Moreover, there is a misconception that once incarcerated, terrorists cease to be a risk. If correctional management regimes are implemented poorly, terrorist prisoners may be afforded the opportunity to remain active while incarcerated, including the recruitment of other prisoners, and the planning of future attacks. Equally, they may be viewed as role models or martyrs for sympathisers to aspire to. Despite the magnitude of the consequences, there is no agreed approach to managing Australian terrorist prisoners. As such, a dichotomy of dominant models has emerged; that is, to either segregate terrorist prisoners, or conversely, to disperse them throughout the wider prisoner population. Each strategy presents its own set of benefits and risks. This paper compares the management practices for terrorist prisoners in the states of New South Wales and Victoria to determine the strengths and vulnerabilities of each of these approaches. The paper concludes that policy-makers should consider reassessing current strategies. It suggests that a focus that extends the immediate containment considerations to encompass post-release factors would bring benefits for society.

  8. PROSECUTING SOMALIA PIRATES AS TERRORISTS

    Directory of Open Access Journals (Sweden)

    ODHIAMBO E.O.S., ONKWARE K., KASSILLY J., NTABO O. M.

    2011-01-01

    Full Text Available This article starts from the assumption that piracy resembles terrorism in many aspects and attempts to support it through both a theoretical investigation and practical examples. The argument it makes is that Somali pirates should be prosecuted as terrorists. Moreover, it emphasizes the idea that for Somalia’s neighboring countries and not only the implementation of such an approach consists in resorting to the antiterrorist conventions already in place. Thus, for example, Kenya Navy as a piracyfi ghting agency should rely on these conventions to justify the capture and prosecution of pirates in Kenyan courts. In this respect, we emphasize the idea that only by resorting to an established international legal framework can Kenya identify the tools to counter pirates’ actions within legal limits. Moreover, this should be paralleled by efforts towards rebuilding Somalia and its institutions if long-term solutions are to be envisaged in the eradication of piracy in the Indian Ocean. In conclusion, the article looks at the concepts of piracy, terrorism and development in the Horn of Africa, suggests that piracy is a form of Terrorism and, makes a series of recommendations.

  9. A New Forensic Picture Polygraph Technique for Terrorist and Crime Deception System

    Science.gov (United States)

    Costello, R. H. Brian; Axton, JoAnn; Gold, Karen L.

    2006-01-01

    The Forensic Terrorist Detection System called Pinocchio Assessment Profile (PAP) employs standard issue polygraphs for a non-verbal picture technique originated as a biofeedback careers interest instrument. The system can be integrated readily into airport screening protocols. However, the method does not rely on questioning or foreign language…

  10. Preventing nuclear terrorism: responses to terrorist grievances

    International Nuclear Information System (INIS)

    Beres, L.R.

    1987-01-01

    The US is vulnerable to nuclear terrorism, despite the presence of physical security and other measures. Although these measures are important, they are insufficient to prevent or deter terrorism. What, then, is the answer? The author feels it lies in a hitherto neglected dimension of terrorism: its underlying political grievances. The principal grievance that potential terrorists have against the US concerns misguided elements of US foreign policy. These elements are moving the US on a seemingly inexorable collision course with terrorism and, more than likely, with nuclear terrorism. The US represents a serious threat to many people and groups who feel directly the effects of a foreign policy mired in strident anti-Sovietism: opponents of the US-NATO Euromissile deployments, populations seeking to secure their human rights from repressive regimes supported by the US, and governments seeking self-determination but embattled by insurgents backed by US arms, equipment, and advisers. In many cases, the US foreign policy stance in one country has aroused suspicion and anger within the region as a whole. The collision course need not be inevitable. The US can take a number of steps in the political arena that would greatly reduce the threat of nuclear terrorism

  11. Summary of a joint US-Japan study of potential approaches to reduce the attractiveness of various nuclear materials for use in a nuclear explosive device by a terrorist group

    Energy Technology Data Exchange (ETDEWEB)

    Bathke, C.G. [Los Alamos National Laboratory, P.O. Box 1663, Los Alamos, NM (United States); Inoue, N.; Kuno, Y.; Mihara, T.; Sagara, H. [Japan Atomic Energy Agency, 4-49 Muramatsu, Tokai-mura, Naka-gun, Ibaraki 319-1184 (Japan); Ebbinghaus, B.B. [Lawrence Livermore National Laboratory, P.O. Box L-168, Livermore, CA 94551 (United States); Murphy, J.; Dalton, D. [National Nuclear Security Administration, Department of Energy, 1000 Independence Ave, SW, Washington, DC 20585 (United States); Nagayama, Y. [Ministry of Education, Culture, Sports, Science and Technology, 3-2-2 Kasumigaseki, Chiyoda-ku, Tokyo 100-8959 (Japan)

    2013-07-01

    This paper summarizes the results of a joint US-Japan study to establish a mutual understanding, through scientific-based study, of potential approaches to reduce the attractiveness of various nuclear materials for use in a terrorist nuclear explosive device (NED). 4 approaches that can reduce materials attractiveness with a very high degree of effectiveness are: -) diluting HEU with natural or depleted U to an enrichment of less than 10% U-235; -) storing Pu in nuclear fuel that is not man portable and with a dose rate greater or equal to 10 Gy/h at 1 m; -) storing Pu or HEU in heavy items, i.e. not transportable, provided the removal of the Pu or HEU from the item requires a purification/processing capability; and -) converting Pu and HEU to very dilute forms (such as wastes) that, without any security barriers, would require very long acquisition times to acquire a Category I quantity of Pu or of HEU. 2 approaches that can reduce materials attractiveness with a high degree of effectiveness are: -) converting HEU-fueled research reactors into LEU-fueled research reactors or dilute HEU with natural or depleted U to an enrichment of less than 20% U-235; -) converting U/Al reactor fuel into U/Si reactor fuel. Other approaches have been assessed as moderately or totally inefficient to reduce the attractiveness of nuclear materials.

  12. SCL-90-R Symptom Profiles and Outcome of Short-Term Psychodynamic Group Therapy

    DEFF Research Database (Denmark)

    Jensen, Hans Henrik; Mortensen, Erik Lykke; Lotz, Martin

    2013-01-01

    Abstract Background. Psychodynamic group psychotherapy may not be an optimal treatment for anxiety and agoraphobic symptoms. We explore remission of SCL-90-R Global Severity Index (GSI) and target symptoms in 39 sessions of psychodynamic group therapy. Methods. SCL-90-R “target symptom” profile a...

  13. Intelligence Constraints on Terrorist Network Plots

    Science.gov (United States)

    Woo, Gordon

    Since 9/11, the western intelligence and law enforcement services have managed to interdict the great majority of planned attacks against their home countries. Network analysis shows that there are important intelligence constraints on the number and complexity of terrorist plots. If two many terrorists are involved in plots at a given time, a tipping point is reached whereby it becomes progressively easier for the dots to be joined and for the conspirators to be arrested, and for the aggregate evidence to secure convictions. Implications of this analysis are presented for the campaign to win hearts and minds.

  14. Terrorist Financing: The 9/11 Commission Recommendation

    National Research Council Canada - National Science Library

    Weiss, Martin A

    2005-01-01

    .... The Commission recommended that the U.S. government shift the focus of its efforts to counter terrorist financing from a strategy based on seizing terrorist assets to a strategy based on exploiting intelligence gathered from financial investigations...

  15. 31 CFR 595.311 - Specially designated terrorist.

    Science.gov (United States)

    2010-07-01

    ...) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY TERRORISM SANCTIONS REGULATIONS General Definitions § 595.311 Specially designated terrorist. (a) The term specially designated terrorist means: (1...

  16. Immigration: Terrorist Grounds for Exclusion and Removal Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2008-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  17. Immigration: Terrorist Grounds for Exclusion and Removal of Aliens

    National Research Council Canada - National Science Library

    Garcia, Michael J; Wasem, Ruth E

    2007-01-01

    ...., legal permanent residents) or temporarily as nonimmigrants. Notably, any alien who engages in terrorist activity, or is a representative or member of a designated foreign terrorist organization, is generally inadmissible...

  18. 31 CFR 597.309 - Foreign terrorist organization.

    Science.gov (United States)

    2010-07-01

    ... REGULATIONS General Definitions § 597.309 Foreign terrorist organization. The term foreign terrorist... respect to which the Secretary of State has notified Congress of the intention to designate as a foreign...

  19. Globus Nexus: A Platform-as-a-Service Provider of Research Identity, Profile, and Group Management.

    Science.gov (United States)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  20. Globus Nexus: A Platform-as-a-Service provider of research identity, profile, and group management

    Energy Technology Data Exchange (ETDEWEB)

    Chard, Kyle; Lidman, Mattias; McCollam, Brendan; Bryan, Josh; Ananthakrishnan, Rachana; Tuecke, Steven; Foster, Ian

    2016-03-01

    Globus Nexus is a professionally hosted Platform-as-a-Service that provides identity, profile and group management functionality for the research community. Many collaborative e-Science applications need to manage large numbers of user identities, profiles, and groups. However, developing and maintaining such capabilities is often challenging given the complexity of modern security protocols and requirements for scalable, robust, and highly available implementations. By outsourcing this functionality to Globus Nexus, developers can leverage best-practice implementations without incurring development and operations overhead. Users benefit from enhanced capabilities such as identity federation, flexible profile management, and user-oriented group management. In this paper we present Globus Nexus, describe its capabilities and architecture, summarize how several e-Science applications leverage these capabilities, and present results that characterize its scalability, reliability, and availability.

  1. Dynamical Adaptation in Terrorist Cells/Networks

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar; Ahmed, Zaki

    2010-01-01

    Typical terrorist cells/networks have dynamical structure as they evolve or adapt to changes which may occur due to capturing or killing of a member of the cell/network. Analytical measures in graph theory like degree centrality, betweenness and closeness centralities are very common and have long...

  2. Combatting Commercial Terrorists: The PKK Case

    Science.gov (United States)

    2015-12-01

    Kurdistan Workers’ Party, drug trafficking, human trafficking, cigarette smuggling, prostitution, extortion, money laundering , Turkey 15. NUMBER OF...91 F. MONEY LAUNDERING ............................................................... 93 G. CONCLUSION...opportunity to launder illegal money . Also, donations from a sympathetic population is another source of money and legitimacy for terrorist

  3. Antibiotic susceptibility profiles for group B streptococci isolated from neonates, 1995-1998

    NARCIS (Netherlands)

    Lin, FYC; Azimi, PH; Weisman, LE; Philips, JB; Regan, J; Clark, P; Rhoads, GG; Clemens, J; Troendle, J; Pratt, E; Brenner, RA; Gill, [No Value

    Antibiotic susceptibility profiles were analyzed for 119 invasive and 227 colonizing strains of group B streptococci isolated from neonates at 6 US academic centers, All strains were susceptible to penicillin, vancomycin, chloramphenicol, and cefotaxime, The rate of resistance to erythromycin was

  4. [Psychiatric, Cognitive and Emotional Profile in Ex-combatants of Illegal Armed Groups in Colombia].

    Science.gov (United States)

    Tobón, Carlos; Aguirre-Acevedo, Daniel Camilo; Velilla, Lina; Duque, Jon; Ramos, Claudia Patricia; Pineda, David

    2016-01-01

    Exposure to armed conflict produces biological adaptations oriented to handle the highly stressful conditions in war environments. The special features of The Colombian armed create a special scenario to evaluate the human behavior. In this study, psychiatric, cognitive and emotional processing characteristics of a group of Colombian armed illegal forces of ex-combatants are described. Sixty-three ex combatants and 22 controls were assessed with WAIS (IQ), INECO frontal screening (executive functions), Interpersonal Reactivity Index (empathy), emotional features recognition and MINI (psychiatric profile). When compared to the control group, ex-combatants showed higher frequency of antisocial personality disorder (P=.031) and behavioral dissocial disorder (P=.017). In cognitive profile, the ex-combatants showed a lower score in the executive function test (Me=18.50; RQ=4.00), control (Me=23.00; RQ=5.25), with a poor personal distress in emphatic profile (Me=10.00; RQ=5.00) compared to control group (Me=37.00; RQ=7.25). We found differences in cognitive and psychiatric profile in ex-combatants in comparison with controls. Copyright © 2015 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  5. Clinical and psychological aspects of adolescent involvement in extremist and terrorist activities

    Directory of Open Access Journals (Sweden)

    Oshevsky D.S.

    2017-07-01

    Full Text Available The article deals with the clinical and psychological aspects of including minors in terrorist and extremist activities. In the historical perspective, it was traced how the views on the role of mental disorders in the genesis of such crimes changed. It is shown that terrorist and extremist activity must be viewed as a complex multi-factor phenomenon, in which socio-psychological components play a leading role. It is noted that the psychopathological process can act as a prerequisite for inclusion in such radical groups. Psychoanalytic, sociological, cognitive approaches, theories of social learning and the concept of diffuse ego-identity making attempts to explain the mechanisms of terrorist and extremist activity in minors are analyzed. The problem of insufficient study of the influence of the Internet and social networks on the formation of readiness for admission to adolescents in radical organizations is posed.

  6. Brazilian research groups in nursing: comparison of 2006 and 2016 profiles.

    Science.gov (United States)

    Erdmann, Alacoque Lorenzini; Peiter, Caroline Cechinel; Lanzoni, Gabriela Marcellino de Melo

    2017-07-13

    To compare the profile of nursing research groups registered at the CNPq Research Groups Directory in 2006 and 2016. Descriptive and documentary analysis, The data has been collected in 2006 and in 2016, with parameterized search with the term "nursing" at the CNPq Research Groups Directory. The selected variables have been organized in a Microsoft Office Exce spreadsheetl. The research groups have increased from 251 in 2006 to 617 in 2016, with important increase of the number of participants, among students and researchers. There was a decrease of the number of groups without students. However, 22% remain without undergraduate students' participation. It has been observed an important increase regarding the interest on research activities, when comparing both scenarios. The nursing research groups reflect structural and political advances in generation of science, technology and innovation, however, the undergraduate students' and the foreign researchers' participation should still be encouraged.

  7. Who Gets Designated a Terrorist and Why?

    Science.gov (United States)

    Beck, Colin J.; Miner, Emily

    2013-01-01

    This study examines formal terrorism designations by governments through the lens of organization studies research on categorization processes. It is argued that designations hinge on markers from the organizational profile of a militant group. Using cross-sectional data on militant organizations and designations by the United States, the United…

  8. Hidden profiles and concealed information: strategic information sharing and use in group decision making.

    Science.gov (United States)

    Toma, Claudia; Butera, Fabrizio

    2009-06-01

    Two experiments investigated the differential impact of cooperation and competition on strategic information sharing and use in a three-person group decision-making task. Information was distributed in order to create a hidden profile so that disconfirmation of group members' initial preferences was required to solve the task. Experiment 1 revealed that competition, compared to cooperation, led group members to withhold unshared information, a difference that was not significant for shared information. In competition, compared to cooperation, group members were also more reluctant to disconfirm their initial preferences. Decision quality was lower in competition than in cooperation, this effect being mediated by disconfirmation use and not by information sharing. Experiment 2 replicated these findings and revealed the role of mistrust in predicting strategic information sharing and use in competition. These results support a motivated information processing approach of group decision making.

  9. Empathy in children with autism and conduct disorder: group-specific profiles and developmental aspects.

    Science.gov (United States)

    Schwenck, Christina; Mergenthaler, Julia; Keller, Katharina; Zech, Julie; Salehi, Sarah; Taurines, Regina; Romanos, Marcel; Schecklmann, Martin; Schneider, Wolfgang; Warnke, Andreas; Freitag, Christine M

    2012-06-01

      A deficit in empathy is discussed to underlie difficulties in social interaction of children with autism spectrum disorder (ASD) and conduct disorder (CD). To date, no study has compared children with ASD and different subtypes of CD to describe disorder-specific empathy profiles in clinical samples. Furthermore, little is known about age influences on the development of empathic skills. The aim of the current study was to compare cognitive and emotional empathy in different age groups of children with ASD, CD with elevated or low callous-unemotional-traits (CU+ vs. CU-) and a matched control group (CG).   Fifty-five boys with ASD, 36 boys with CD-CU+, 34 boys with CD-CU- and 67 controls were included. The study implemented three tasks on emotion recognition, perspective taking and emotional affection induced by another person's situation. Multivariate Analysis of variance with the factors group and age (median split) including their interaction term was performed to describe disorder-specific profiles.   Empathy profiles showed differential impairment in children with ASD and CD-CU+. Boys with ASD were impaired in cognitive empathy while participants with CD-CU+ were impaired in emotional empathy. Children with CD-CU- did not differ from the CG. However, boys with CD-CU- were less emotionally reactive in response to film stimuli than children with ASD. Furthermore, we found strong age effects indicating an increase in cognitive and affective empathic skills beyond early infancy in all groups.   In this study, distinct empathic profiles in children with ASD and CD-CU+ were found. Furthermore, the work demonstrates improvement of empathic skills throughout childhood and adolescence, which is comparable for individuals with psychiatric disorders and control children. These results yield implications for further research as well as for therapeutic interventions. © 2011 The Authors. Journal of Child Psychology and Psychiatry © 2011 Association for Child and

  10. Terrorist Approach to Information Operations

    Science.gov (United States)

    2003-06-01

    its fold; they also represent an understanding of the value of the information medium by setting the group up as the underdog against the large...up and organized street demonstrations to lobby for civil rights. The Stormont (Irish) government branded the movement a front for the IRA and

  11. Latex allergy: new insights to explain different sensitization profiles in different risk groups.

    Science.gov (United States)

    Peixinho, C; Tavares-Ratado, P; Tomás, M R; Taborda-Barata, L; Tomaz, C T

    2008-07-01

    Differences in latex allergen sensitization profiles have been described between children subjected to repetitive surgical interventions and health care workers (HCW). 'Major' allergens for patients with spina bifida are Hev b 1, 3 and 7, while for HCW, 'major' allergens are Hev b 2, 5, 6.01 and 13. The reason for these differential sensitization profiles is currently unknown. To investigate latex allergen profiles on internal and external surfaces of natural rubber latex gloves. Eighty-two samples of commonly used surgical gloves (41 glove brands) were used for analysis. Specific allergen levels of Hev b 1, 3, 5 and 6.02 on both surfaces of the gloves were quantified using an enzyme immunometric assay, a FITkit (FIT Biotech, Tampere, Finland). Differences in allergen levels were observed between internal and external surfaces of all glove types. Concentrations of Hev b 1 and Hev b 3 were significantly higher on external surfaces, while internal surfaces had higher allergen levels of Hev b 5 and Hev b 6.02. Analysis of surgical and examination gloves, powdered and nonpowdered gloves also showed that the content of Hev b 5 and Hev b 6.02 was significantly higher on internal surfaces while that of Hev b 1 and Hev b 3 was higher on external surfaces. Our study showed different allergen profiles on internal and external surfaces of natural rubber latex gloves. These results may suggest a relationship between latex allergen localization and sensitization routes in different risk groups.

  12. Genetic profile based upon 15 microsatellites of four caste groups of the eastern Indian state, Bihar.

    Science.gov (United States)

    Ashma, R; Kashyap, V K

    2003-01-01

    The formation of caste groups among the Hindu community and the practice of endogamy exert a great impact on the genetic structure and diversity of the Indian population. Allele frequency data of 15 microsatellite loci clearly portray the genetic diversity and relatedness among four socio-culturally advanced caste groups: Brahmin, Bhumihar, Rajput and Kayasth of Caucasoid ethnicity of Bihar. The study seeks to understand the impact of the man-made caste system on the genetic profile of the four major caste groups of Bihar. Computation of average heterozygosity, most frequent allele, allele diversity and coefficient of gene differentiation (Gst), along with genetic distance (DA)and principal coordinate analysis were performed to assess intra-population and inter-population diversity. The average Gst value for all the loci was 0.012 +/- 0.0033, and the level of average heterozygosity was approximately 75.5%, indicating genetic similarity and intra-population diversity. Genetic distance (DA) values and the phylogenetic tree along with other higher caste groups of India indicate the relative distance between them. The present study clearly depicts the genetic profile of these caste groups, their inherent closeness in the past, and the impact of the imposed caste system that later restricted the gene flow. The study highlights the status of Bhumihar and Kayasth in the Hindu caste system. The former was found clustering with the Brahmin group (as expected, since Bhumihar is known to be a subclass of Brahmin), whereas the distance between the Brahmin and Kayasth caste groups was found to be large. North-eastern Indian Mongoloids form a separate cluster.

  13. Seasonal variations in monoterpene profiles and ecophysiological traits in Mediterranean pine species of group halepensis

    Directory of Open Access Journals (Sweden)

    Michelozzi M

    2004-01-01

    Full Text Available Foliar and cortical terpene profile, and needle gas exchange and water potential of P. halepensis, P. brutia and P. eldarica were compared over three consecutive seasons (1996-1998 in an experimental plantation nearby Firenze (Italy. Terpene percentages in mature tissue (cortex and needle did not change in response to water stress during summer period and remained stable through seasons and years. Terpene profiles were not affected by seasonal drought, and are thus valuable to characterize Mediterranean pine species of the group “halepensis”. There was a threshold-type response of maximum daily gas exchange to decreasing predawn water potential in all pines. Net photosynthesis and needle conductance were linearly related, regardless of the species.

  14. Detecting Hidden Hierarchy of Non Hierarchical Terrorist Networks

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    measures (and combinations of them) to identify key players (important nodes) in terrorist networks. Our recently introduced techniques and algorithms (which are also implemented in the investigative data mining toolkit known as iMiner) will be particularly useful for law enforcement agencies that need...... to analyze terrorist networks and prioritize their targets. Applying recently introduced mathematical methods for constructing the hidden hierarchy of "nonhierarchical" terrorist networks; we present case studies of the terrorist attacks occurred / planned in the past, in order to identify hidden hierarchy...

  15. 31 CFR 594.310 - Specially designated global terrorist; SDGT.

    Science.gov (United States)

    2010-07-01

    ... (Continued) OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY GLOBAL TERRORISM SANCTIONS REGULATIONS General Definitions § 594.310 Specially designated global terrorist; SDGT. The term specially...

  16. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    .... Persistent Internet and computer security vulnerabilities, which have been widely publicized, may gradually encourage terrorists to develop new computer skills, or develop alliances with criminal...

  17. Ensemble attribute profile clustering: discovering and characterizing groups of genes with similar patterns of biological features

    Directory of Open Access Journals (Sweden)

    Bissell MJ

    2006-03-01

    contained groups of genes with the functional properties of membrane receptor biology/signal transduction and nucleic acid binding/transcription. A subset of the luminal markers was associated with metabolic and oxidoreductase activities, whereas a subset of myoepithelial markers was associated with protein hydrolase activity. Conclusion Given a set of genes and/or proteins associated with a phenomenon, process or system of interest, ensemble attribute profile clustering provides a simple method for collating and sythesizing the annotation data pertaining to them that are present in text-based, gene-centered corpora. The results provide information about properties common and unique to subsets of the list and hence insights into the biology of the problem under investigation.

  18. Effect of Age Group on Technical-Tactical Performance Profile of the Serve in Men's Volleyball.

    Science.gov (United States)

    García-de-Alcaraz, Antonio; Ortega, Enrique; Palao, José M

    2016-10-01

    The aim of this study was to analyze the technical-tactical performance profile of the serve for various age groups and categories of competition in men's volleyball. The sample comprised 13,262 serves performed by 986 players in 299 sets observed in various categories of competition (U-14, U-16, U-19, national senior, and international senior). An observational design was used. The variables studied were category of competition, type of execution, and serve performance. The results showed that for higher age groups (senior categories), there were significantly fewer jump serves and poorer serve performance, regardless of players' maturity and training development. The use of the jump serves increased the serve risk while attempting to hinder the organization of the opponent attack. This paper discusses the serve evolution and the implications on the training process at the different age groups in men's volleyball. © The Author(s) 2016.

  19. [Emotional Profile of a Group of Colombian Military Victims of Landmines or Improvised Explosive Devices].

    Science.gov (United States)

    Restrepo, Jorge Emiro; Yara, Eduardo Alfonso; Cano Betancur, Jessica; Tavera, Luz Navia

    2014-01-01

    Antipersonnel Mines (MAP) and Improvised Explosive Devices (IEDs) are frequently used in Colombia as an armed resource without the need for direct combat. The Department of Antioquia has the highest number of events associated with the detonation of such battle techniques. There are no studies on the psychological effects that appear as a result of accidents with Antipersonnel Mines and IEDs in the military population. To establish the psychological profile of a group of military victims of MAP and AEI, and a control group of soldiers who were not victims from the analysis of four emotional variables (depression, anxiety, anger and stress). The research was conducted using a case-control design in a .quantitative, comparative, descriptive and cross-sectional study. A sample of 80 soldiers assigned to the Seventh Division of the National Army of Colombia at Medellin, Antioquia. The sample included a group of 30 military cases and 50 soldiers as controls. The anxiety state, trait anxiety, state anger, and trait anger variables showed statistically significant differences between groups. There were no significant differences in the variables depression and stress between groups variables. There was no depression, anxiety, or stress in either of the two groups, but there were clinically significant levels of anger in both groups. Copyright © 2013 Asociación Colombiana de Psiquiatría. Publicado por Elsevier España. All rights reserved.

  20. Thermogravimetric Analysis (TGA) Profile of Modified Sba-15 at Different Amount of Alkoxy silane Group

    International Nuclear Information System (INIS)

    Norhasyimi Rahmat; Nur Fathilah Mohd Yusof; Ezani Hafiza

    2014-01-01

    This study focused on meso porous silica SBA-15 modified with alkoxy silane functional group; phenyltriethoxysilane (PTES) and vinyltriethoxysilane (VTES) using direct synthesis and post-grafting methods. By direct synthesis method, SBA-15 template by triblock copolymer (P123) and functionalized with alkoxy silane groups at different amount of loadings were co-condensed with tetraethyl orthosilicate (TEOS) under acidic conditions. As for post-grafting method, different loadings of alkoxy silane groups were added after co-condensation of TEOS with P123 template. Both synthesis methods used calcination process to remove surfactant template at 550 degree Celsius for 5 hours. The derivatized SBA-15 was characterized by thermogravimetric analysis to evaluate the profile at different loadings of alkoxy silane groups with different synthesis method. At temperature range of 300-800 degree Celsius, post-grafting method displayed the highest weight loss of phenyl and vinyl groups. However, there was no significant difference of weight loss for different amount of organo silane groups. In this study, TGA has shown to be significant characterization means to determine the effects of different method used in synthesizing modified SBA-15. It was shown that different loading of phenyl and vinyl groups did not affect the efficiency of surfactant removal. (author)

  1. Abundance profiling of specific gene groups using precomputed gut metagenomes yields novel biological hypotheses.

    Directory of Open Access Journals (Sweden)

    Konstantin Yarygin

    Full Text Available The gut microbiota is essentially a multifunctional bioreactor within a human being. The exploration of its enormous metabolic potential provides insights into the mechanisms underlying microbial ecology and interactions with the host. The data obtained using "shotgun" metagenomics capture information about the whole spectrum of microbial functions. However, each new study presenting new sequencing data tends to extract only a little of the information concerning the metabolic potential and often omits specific functions. A meta-analysis of the available data with an emphasis on biomedically relevant gene groups can unveil new global trends in the gut microbiota. As a step toward the reuse of metagenomic data, we developed a method for the quantitative profiling of user-defined groups of genes in human gut metagenomes. This method is based on the quick analysis of a gene coverage matrix obtained by pre-mapping the metagenomic reads to a global gut microbial catalogue. The method was applied to profile the abundance of several gene groups related to antibiotic resistance, phages, biosynthesis clusters and carbohydrate degradation in 784 metagenomes from healthy populations worldwide and patients with inflammatory bowel diseases and obesity. We discovered country-wise functional specifics in gut resistome and virome compositions. The most distinct features of the disease microbiota were found for Crohn's disease, followed by ulcerative colitis and obesity. Profiling of the genes belonging to crAssphage showed that its abundance varied across the world populations and was not associated with clinical status. We demonstrated temporal resilience of crAssphage and the influence of the sample preparation protocol on its detected abundance. Our approach offers a convenient method to add value to accumulated "shotgun" metagenomic data by helping researchers state and assess novel biological hypotheses.

  2. The Hampstead Clinic at work. Discussions in the Diagnostic Profile Research Group.

    Science.gov (United States)

    Koch, Ehud

    2012-01-01

    Minutes of the Hampstead Clinic's Diagnostic Profile Research Group during a fifteen-month period (1964-1965) are reviewed and discussed. A wide range of topics were considered and discussed, with a special focus on the affective life, object relations, and ego function of atypical children in comparison to the early ego functions and differentiation of normal and neurotic children. These lively clinical and theoretical discussions and their implications for therapeutic work with a wide range of children, demonstrate the multifaceted leadership and contributions of Anna Freud as teacher, clinician, and thinker, and of the Hampstead Clinic as a major center for psychoanalytic studies.

  3. The Rise and the Fall of Terrorist Organizations in Post-Dictatorial Greece: The Role and the Lessons for the Intelligence Services

    National Research Council Canada - National Science Library

    Fakitsas, Miltiadis

    2003-01-01

    ... and business elite, The government's failure to curtail these groups resulted from the enormous belief that these terrorists were not a direct threat to Greek's democracy Fortunately, in June of 2002...

  4. Somatic, Endurance Performance and Heart Rate Variability Profiles of Professional Soccer Players Grouped According to Age

    Directory of Open Access Journals (Sweden)

    Botek Michal

    2016-12-01

    Full Text Available This cross-sectional study compared somatic, endurance performance determinants and heart rate variability (HRV profiles of professional soccer players divided into different age groups: GI (17–19.9 years; n = 23, GII (20–24.9 years; n = 45, GIII (25–29.9 years; n = 30, and GIV (30–39 years; n = 26. Players underwent somatic and HRV assessment and maximal exercise testing. HRV was analyzed by spectral analysis of HRV, and high (HF and low (LF frequency power was transformed by a natural logarithm (Ln. Players in GIV (83 ± 7 kg were heavier (p 25 years showed negligible differences in Pmax unlike the age group differences demonstrated in VO2max. A shift towards relative sympathetic dominance, particularly due to reduced vagal activity, was apparent after approximately 8 years of competing at the professional level.

  5. Demographic Recommendation by means of Group Profile Elicitation Using Speaker Age and Gender Recognition

    DEFF Research Database (Denmark)

    Shepstone, Sven Ewan; Tan, Zheng-Hua; Jensen, Søren Holdt

    2013-01-01

    , which itself is the input to a recommender system. The recommender system finds the content items whose demographics best match the group profile. We tested the effectiveness of the system for several typical home audience configurations. In a survey, users were given a configuration and asked to rate......In this paper we show a new method of using automatic age and gender recognition to recommend a sequence of multimedia items to a home TV audience comprising multiple viewers. Instead of relying on explicitly provided demographic data for each user, we define an audio-based demographic group...... a set of advertisements on how well each advertisement matched the configuration. Unbeknown to the subjects, half of the adverts were recommended using the derived audio demographics and the other half were randomly chosen. The recommended adverts received a significantly higher median rating of 7...

  6. Profiling of Junior College Football Players and Differences between Position Groups

    Directory of Open Access Journals (Sweden)

    Robert G. Lockie

    2016-08-01

    Full Text Available This study profiled junior college football players. Sixty-two subjects completed vertical jump (VJ; height and peak power, standing broad jump (SBJ, 36.58 m sprint, pro-agility shuttle, three-cone drill, and maximal-repetition bench press and front squat. The sample included 2 quarterbacks (QB, 7 running backs (RB, 13 wide receivers (WR, 1 tight end (TE, 18 defensive backs (DB, 8 linebackers (LB, and 13 offensive and defensive linemen (LM. To investigate positional differences, subjects were split into skill (SK; WR, DB, big skill (BSK; QB, RB, TE, LB, and LM groups. A one-way ANOVA determined between-group differences. LM were taller and heavier than SK and BSK players. The SK and BSK groups were faster than LM in the 0–36.58 m sprint, pro-agility shuttle, and three-cone drill (p ≤ 0.009. The SK group had greater VJ height and SBJ distance; LM generated greater VJ peak power (p ≤ 0.022. There were no between-group differences in the strength endurance tests. Compared to Division I data, junior college players were smaller, slower, and performed worse in jump tests. Positional differences in junior college football are typical to that of established research. Junior college players should attempt to increase body mass, and improve speed and lower-body power.

  7. Personality and Fear of Terrorist attacks in Ghana: The mediating ...

    African Journals Online (AJOL)

    The study aimed at determining whether or not neuroticism would account for more variance in predicting risk perception and fear of terrorist attack in Ghana compared to conscientiousness. Moreover, it sought to examine the mediating effect of risk perception on the relationship between neuroticism and fear of terrorist ...

  8. Family Therapy of Terroristic Trauma: Psychological Syndromes and Treatment Strategies.

    Science.gov (United States)

    Miller, Laurence

    2003-01-01

    Reviews pertinent literature on terroristic trauma and combines this information with the author's experience in treating adults, children, and family victims and survivors of recent terrorist attacks. Describes the psychological syndromes resulting from terrorism and discusses the relevant individual and family therapy modalities for treating…

  9. Israeli Adolescents' Coping Strategies in Relation to Terrorist Attacks

    Science.gov (United States)

    Tatar, Moshe; Amram, Sima

    2007-01-01

    Exposure to terrorism seriously threatens the well-being of children and adolescents. Israeli citizens have witnessed massive ongoing terrorist attacks during the last few years. The present research, conducted among 330 Israeli adolescents, examined coping strategies in relation to terrorist attacks. We found that adolescents utilize more…

  10. Money, media and the anti-politics of terrorist finance

    NARCIS (Netherlands)

    de Goede, M.

    2008-01-01

    This article offers a critical analysis of the anti-politics of terrorist finance, understood as the particularly depoliticized governing practices enabled in its name. The article conceptualizes 'terrorist finance' not as an unproblematic reality which has elicited a state response, but as a

  11. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    Directory of Open Access Journals (Sweden)

    Bo Li

    2015-01-01

    Full Text Available Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model are developed for modeling the hybrid relational structure and complex operational processes, respectively. To intuitively elucidate this method, the agent based modeling is used to simulate the terrorist network and test the performance in diverse scenarios. Based on the experimental results, we show how the changes of operational environments affect the development of terrorist organization in terms of its recovery and capacity to perform future tasks. The potential strategies are also discussed, which can be used to restrain the activities of terrorists.

  12. Cognitive profile of patients with rotated drawing at copy or recall: a controlled group study.

    Science.gov (United States)

    Molteni, Federica; Traficante, Debora; Ferri, Francesca; Isella, Valeria

    2014-03-01

    When copying or recalling a figure from memory, some patient with dementia or focal brain lesions may rotate the drawing through ±90° or 180°. We have tried to clarify the nature of this phenomenon by investigating the cognitive profile of 22 patients who rotated the copy of the Rey-Osterrieth Complex Figure and 27 who rotated (only) the recall, and two control groups of cases with the same neuropsychiatric diagnoses, but no misorientation deficit. Brain MRI and FDG-PET images were also analysed. Predictor of rotation at the copy versus rotation at the recall was visuospatial impairment as measured by the copy of the Rey Figure; predictors of rotation at the copy versus no rotation were, again, visuospatial deficits, in addition to an abnormal performance at the task of selective attention. No specific profile of cognitive impairment distinguished patients with and without rotation at the recall. Disproportionate temporo-parieto-occipital atrophy or hypometabolism were evident in cases with misorientation of the copy, while predominant frontal abnormalities were found in cases of rotated recall. Based on these findings, rotated drawing at the copy is interpreted as a dorsal visual stream deficit, whose occurrence is more probable when attentional control is impaired. Rotation at recall seems to have a distinct, more anterior, neural substrate, but its dysexecutive nature has yet to be demonstrated. Copyright © 2014 Elsevier Inc. All rights reserved.

  13. [MMPI-2 profiles in groups of systemic autoimmune disease - rheumatoid arthritis and systemic lupus erythematosus - patients].

    Science.gov (United States)

    Csókási, Krisztina; Hargitai, Rita; Járai, Róbert; Nagy, László; Czirják, László; Kiss, Enikö Csilla

    2015-01-01

    Systemic autoimmune diseases like rheumatoid arthritis (RA) and systemic lupus erythematosus (SLE) are characterized by the alteration of immunological response, which can damage many organs and systems and result in a wide variety of clinical presentations. In addition to physical symptoms, psychiatric disorders are also common to many autoimmune diseases. Anxiety, depression, psychosis and cognitive deficits have the highest prevalence. The aim of this study was to display the degree of psychopathological symptoms in patients with RA and SLE. Female inpatients with RA (N=68) and SLE (N=78) were recruited from the Rheumatology and Immunology Clinic of the University of Pecs and were asked to complete the Minnesota Multiphasic Personality Inventory-2 (MMPI-2) and a short demografical form. The clinical personality profiles of the patient groups were explored and compared with each other. High scores (above 64T) were detected on the Hypochondriasis (Hs), Depression (D) and Hysteria (Hy) scales in both groups. Besides, the participants performed elevated scores on the Masculinity-Feminity (Mf), Psychasthenia (Pt) and Social Introversion (Si) clinical scales. They scored in the elevated range on the Physical Malfunctioning, Subjective Depression, Lassitude-Malaise and Somatic Complaints subscales of the neurotic triad. No significant difference was found on the ten clinical scales between the SLE and RA patients. Characteristics of MMPI-2 profiles in SLE and RA patients seem to be the consequence of the disease and a common feature of chronic conditions. High scores on the neurotic triad scales may reflect the comorbid psychiatric disorders and the somatic symptoms alike, so further investigations with the revised Hungarian MMPI-2 are needed.

  14. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  15. Conceptualizing Terrorist Violence and Suicide Bombing

    Directory of Open Access Journals (Sweden)

    Murad Ismayilov

    2010-01-01

    Full Text Available This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly, this article attempts to address the question of whether suicide terrorism represents a "coherent phenomenon," and whether there is, or may be, a generalized pattern which could account for all possible causes of martyrdom operations.

  16. Near-space airships against terrorist activities

    Science.gov (United States)

    Kesenek, Ceylan

    2014-06-01

    Near-space is a region surrounding the earth which is too dense for a satellite to fly and also too thin for air breathing vehicles to fly. The near-space region which is located between 65,000 and 325,000 feet is really underutilized despite its unique potential. Near-Space airships can be used to exploit the potential of near space. Such a system can supply not only a great deal of information using ISR (Intelligence Surveillance Reconnaissance) sensors on board but also serve as a communication/data relay. Airships used in near space can cover a very wide footprint area for surveillance missions. Free of orbital mechanics these near-space assets can continue its mission for long period of time with a persistence of days and months. These assets can provide persistent intelligence for fight against terrorist activities. Terrorism is a non-state threat and doesn't have a static hierarchical structure. To fight against such an adversary an overwhelming intelligence activity must be applied. Therefore, intelligence collection and surveillance missions play a vital role in counter terrorism. Terrorists use asymmetric means of threat that require information superiority. In this study exploitation of near space by airships is analyzed for fight against terrorism. Near-space airships are analyzed according to the operational effectiveness, logistic structure and cost. Advantages and disadvantages of airships are argued in comparison with satellites and airplanes. As a result, by bridging the gap between the air and space, nearspace airships are considered to be the most important asset of warfighter especially with its operational effectiveness.

  17. Wrestling the Hydra: Exploiting Organizational Evolution in Terrorist Groups

    Science.gov (United States)

    2013-05-02

    outside that come from the competition for scarce resources.28 25 Aldrich, 22. The 26...forced to rebuild following the employment of over 250,000 Turkish troops and security forces.39 The Zapatitstas sit on the other end of the spectrum...consistency has and will continue to be tested. Al-Qaeda and its franchises fall far short of presenting a monolithic front. In fact, if this look at

  18. How Terrorist Groups End: Studies of the Twentieth Century

    Science.gov (United States)

    2010-01-01

    efforts to compete in political elections to Japan’s Diet in February 1990 brought in few votes. Humiliation set arrogance and self- interest together on...a hospital. 45. By contrast, Malaysian communists were pushed out without surrendering. Chin Peng and some remnants held out for decades in Thai

  19. CHANDRA observations of the NGC 1550 galaxy group: Implication for the temperature and entropy profiles of 1 keV galaxy groups

    DEFF Research Database (Denmark)

    Sun, M.; Forman, W.; Vikhlinin, A.

    2003-01-01

    is remarkably similar to those of two other 1 keV groups with accurate temperature determination. The temperature begins to decline at 0.07r(vir) - 0.1r(vir), while in hot clusters the decline begins at or beyond 0.2rvir. Thus, there are at least some 1 keV groups that have temperature profiles significantly...... different from those of hot clusters, which may reflect the role of nongravitational processes in intracluster medium/intergalactic medium evolution. NGC 1550 has no isentropic core in its entropy pro. le, in contrast to the predictions of "entropy floor'' simulations. We compare the scaled entropy profiles...

  20. Whole-genome phylogeny of Escherichia coli/Shigella group by feature frequency profiles (FFPs)

    Science.gov (United States)

    Sims, Gregory E.; Kim, Sung-Hou

    2011-01-01

    A whole-genome phylogeny of the Escherichia coli/Shigella group was constructed by using the feature frequency profile (FFP) method. This alignment-free approach uses the frequencies of l-mer features of whole genomes to infer phylogenic distances. We present two phylogenies that accentuate different aspects of E. coli/Shigella genomic evolution: (i) one based on the compositions of all possible features of length l = 24 (∼8.4 million features), which are likely to reveal the phenetic grouping and relationship among the organisms and (ii) the other based on the compositions of core features with low frequency and low variability (∼0.56 million features), which account for ∼69% of all commonly shared features among 38 taxa examined and are likely to have genome-wide lineal evolutionary signal. Shigella appears as a single clade when all possible features are used without filtering of noncore features. However, results using core features show that Shigella consists of at least two distantly related subclades, implying that the subclades evolved into a single clade because of a high degree of convergence influenced by mobile genetic elements and niche adaptation. In both FFP trees, the basal group of the E. coli/Shigella phylogeny is the B2 phylogroup, which contains primarily uropathogenic strains, suggesting that the E. coli/Shigella ancestor was likely a facultative or opportunistic pathogen. The extant commensal strains diverged relatively late and appear to be the result of reductive evolution of genomes. We also identify clade distinguishing features and their associated genomic regions within each phylogroup. Such features may provide useful information for understanding evolution of the groups and for quick diagnostic identification of each phylogroup. PMID:21536867

  1. Physical fitness profile of professional Italian firefighters: differences among age groups.

    Science.gov (United States)

    Perroni, Fabrizio; Cignitti, Lamberto; Cortis, Cristina; Capranica, Laura

    2014-05-01

    Firefighters perform many tasks which require a high level of fitness and their personal safety may be compromised by the physiological aging process. The aim of the study was to evaluate strength (bench-press), power (countermovement jump), sprint (20 m) and endurance (with and without Self Contained Breathing Apparatus - S.C.B.A.) of 161 Italian firefighters recruits in relation to age groups (profile for each parameter and to assess differences (p < 0.05) among age groups. Anthropometric values showed an age-effect for height and BMI, while performances values showed statistical differences for strength, power, sprint tests and endurance test with S.C.B.A. Wearing the S.C.B.A., 14% of all recruits failed to complete the endurance test. We propose that the firefighters should participate in an assessment of work capacity and specific fitness programs aimed to maintain an optimal fitness level for all ages. Copyright © 2013 Elsevier Ltd and The Ergonomics Society. All rights reserved.

  2. Morphological, Physiological and Skating Performance Profiles of Male Age-Group Elite Ice Hockey Players.

    Science.gov (United States)

    Allisse, Maxime; Sercia, Pierre; Comtois, Alain-Steve; Leone, Mario

    2017-09-01

    The purpose of this study was to describe the evolution of morphological, physiological and skating performance profiles of elite age-group ice hockey players based on repeated measures spread over one season. In addition, the results of fitness tests and training programs performed in off-ice conditions and their relationship with skating performance were analyzed. Eighteen high level age-group ice hockey players (13.1 ± 0.6 years) were assessed off and on-ice at the beginning and at the end of the hockey season. A third evaluation was also conducted at the beginning of the following hockey season. The players were taller, heavier, and showed bone breadths and muscle girths above the reference population of the same age. Muscular variables improved significantly during and between the two hockey seasons (p skating performance tests exhibited significant enhancements during the hockey season, but not during the off-season where some degradation was observed. Finally, weak observed variances (generally skating performance tests indicated important gaps, both in the choice of the off-ice assessment tools as well as in training methods conventionally used. The reflection on the best way to assess and train hockey players certainly deserves to be continued.

  3. Morphological, Physiological and Skating Performance Profiles of Male Age-Group Elite Ice Hockey Players

    Directory of Open Access Journals (Sweden)

    Allisse Maxime

    2017-08-01

    Full Text Available The purpose of this study was to describe the evolution of morphological, physiological and skating performance profiles of elite age-group ice hockey players based on repeated measures spread over one season. In addition, the results of fitness tests and training programs performed in off-ice conditions and their relationship with skating performance were analyzed. Eighteen high level age-group ice hockey players (13.1 ± 0.6 years were assessed off and on-ice at the beginning and at the end of the hockey season. A third evaluation was also conducted at the beginning of the following hockey season. The players were taller, heavier, and showed bone breadths and muscle girths above the reference population of the same age. Muscular variables improved significantly during and between the two hockey seasons (p < 0.05. However, maximal aerobic power improved only during the off-season. All skating performance tests exhibited significant enhancements during the hockey season, but not during the off-season where some degradation was observed. Finally, weak observed variances (generally <20% of the explained variance between physiological variables measured off-ice and on-ice skating performance tests indicated important gaps, both in the choice of the off-ice assessment tools as well as in training methods conventionally used. The reflection on the best way to assess and train hockey players certainly deserves to be continued.

  4. Learning from history: The Glasgow Airport terrorist attack.

    Science.gov (United States)

    Crichton, Gillies

    Glasgow Airport was the target of a terrorist attack on 30th June, 2007. Many people within Scotland had come to believe that Scotland was immune from terrorism. This perception was in large part informed by Scotland's experience during the protracted Troubles in Northern Ireland, during which the Provisional Irish Republican Army's mainland bombing campaign focused on targets in England, sparing both Scotland and Wales. While Glasgow Airport did not expect such an attack to take place, meticulous planning, organising and testing of plans had taken place to mitigate the unlikely event of such an attack. The attack stands up as a shining example of robust business continuity management, where the airport reopened for business as usual in less than 24 hours from the time of the attack. Little is known about how the airport handled the situation in conjunction with other responding agencies as people tend to want to focus on high-profile disasters only. Yet countless such incidents are happening worldwide on a daily basis, in which there are excellent learning opportunities, and, taken in the spirit of converting hindsight into foresight, the likelihood of similar incidents could potentially be reduced in the future.

  5. Lipid profiles and ischemic stroke risk: variations by sex within racial/ethnic groups.

    Science.gov (United States)

    Gezmu, Tefera; Schneider, Dona; Demissie, Kitaw; Lin, Yong; Giordano, Christine; Gizzi, Martin S

    2014-01-01

    Evidence implicates lipid abnormalities as important but modifiable risk factors for stroke. This study assesses whether hypercholesterolemia can be used to predict the risk for etiologic subtypes of ischemic stroke between sexes within racial/ethnic groups. Data elements related to stroke risk, diagnosis, and outcomes were abstracted from the medical records of 3,290 acute stroke admissions between 2006 and 2010 at a regional stroke center. Sex comparison within racial/ethnic groups revealed that South Asian and Hispanic men had a higher proportion of ischemic stroke than women, while the inverse was true for Whites and African Americans (P=0.0014). All women, except South Asian women, had higher mean plasma total cholesterol and higher blood circulating low-density lipoprotein levels (≥100 mg/dL) than men at the time of their admissions. The incidence of large-artery atherosclerosis (LAA) was more common among women than men, except among Hispanics, where men tended to have higher incidences. A regression analysis that considered patients diagnosed with either LAA or small-artery occlusion etiologic subtype as the outcomes and high-density lipoproteins and triglycerides as predictors showed inconsistent associations between lipid profiles and the incidence of these subtypes between the sexes within racial/ethnic groups. In conclusion, our investigation suggests that women stroke patients may be at increased risk for stroke etiologic subtype LAA than men. Although the higher prevalence of stroke risk factors examined in this study predicts the increase in the incidence of the disease, lack of knowledge/awareness and lack of affordable treatments for stroke risk factors among women and immigrants/non-US-born subpopulations may explain the observed associations.

  6. Utility of microbiological profile of symptomatic vaginal discharge in rural women of reproductive age group.

    Science.gov (United States)

    Masand, Deepa Lokwani; Patel, Jaya; Gupta, Sweta

    2015-03-01

    Symptomatic vaginal discharge is the most frequent symptom in women of reproductive age group. Owing to social stigma majority of affected women hesitate to seek medical consultation. Therefore the actual incidence of vaginal discharge is much more than what is reported. The aim of the study is to determine the microbiological profile of symptomatic vaginal discharge in rural area and its utility in the management of genital tract infection. This was a descriptive type of observational study, conducted in sexually active women of reproductive age group (18-45 years) attending the OPD/IPD of Obstetrics and Gynaecology Department of National Institute of Medical Sciences, Shobhanagar, Jaipur (Rajasthan), over a period of 18 months from June 2012 to December 2013. Hundred sexually active non pregnant women of reproductive age group (18-45 years) were included in the study. After taking consent general physical examination along with pelvic examination was performed. Two high vaginal swabs and blood sample were collected for various tests. Hanging drop preparation was immediately made. This was followed by gram staining and culture. Chlamydia trachomatis IgM antibody was detected by ELISA method. Out of 100 women with symptomatic vaginal discharge, specific diagnosis was obtained in 89% of cases whereas no specific aetiology was found in 11% cases. Mean age was 32.60 years. Fifty-three percent patient had Bacterial vaginosis, candidiasis was found in 14% cases, 16% had Chlamydia trachomatis infection while Trichomonas vaginalis infection was detected in 6% cases. Homogenous discharge was most prevalent (52%), followed by mucopurulant discharge in 23% of women. Patient with symptomatic vaginal discharge need to be actively managed with appropriate antimicrobial agents. Judicious management may be helpful in prevention of HIV, HPV, CIN and post infection sequelae.

  7. Profiles

    International Nuclear Information System (INIS)

    2004-01-01

    Profiles is a synthetic overview of more than 100 national energy markets in the world, providing insightful facts and key energy statistics. A Profile is structured around 6 main items and completed by key statistics: Ministries, public agencies, energy policy are concerned; main companies in the oil, gas, electricity and coal sectors, status, shareholders; reserve, production, imports and exports, electricity and refining capacities; deregulation of prices, subsidies, taxes; consumption trends by sector, energy market shares; main energy projects, production and consumption prospects. Statistical Profiles are present in about 3 pages the main data and indicators on oil, gas, coal and electricity. (A.L.B.)

  8. Optimal counterterrorism and the recruitment effect of large terrorist attacks

    DEFF Research Database (Denmark)

    Jensen, Thomas

    2011-01-01

    We analyze a simple dynamic model of the interaction between terrorists and authorities. Our primary aim is to study optimal counterterrorism and its consequences when large terrorist attacks lead to a temporary increase in terrorist recruitment. First, we show that an increase in counterterrorism...... makes it more likely that terrorist cells plan small rather than large attacks and therefore may increase the probability of a successful attack. Analyzing optimal counterterrorism we see that the recruitment effect makes authorities increase the level of counterterrorism after large attacks. Therefore......, in periods following large attacks a new attack is more likely to be small compared to other periods. Finally, we analyze the long-run consequences of the recruitment effect. We show that it leads to more counterterrorism, more small attacks, and a higher sum of terrorism damage and counterterrorism costs...

  9. Suits Against Terrorist States by Victims of Terrorism

    National Research Council Canada - National Science Library

    Elsea, Jennifer K

    2008-01-01

    ... assets to satisfy judgments. After a court ruled that Congress never created a cause of action against terrorist States themselves, but only against their officials, employees, and agents, plaintiffs have based claims on state law...

  10. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    National Research Council Canada - National Science Library

    Rollins, John; Wilson, Clay

    2005-01-01

    ... organizations and consider attempting a cyberattack against the critical infrastructure. Cybercrime increased dramatically between 2004 and 2005, and several recent terrorist events appear to have been funded partially through online credit card fraud...

  11. Terrorists and Sponsors. An Inquiry into Trust and Double-Crossing

    Science.gov (United States)

    McCormick, Gordon H.; Owen, Guillermo

    We consider the conditions that lead to the dissolution of state-terrorist coalitions. While such coalitions have well known advantages, they also have structural weaknesses that are largely ignored in the literature on the state sponsorship of terrorism. Each player in the coalition has interests that are only partially shared and, in some cases, at odds with those of its partner. Long term cooperation must be based on mutual advantage and mutual trust, both of which are subject to change over time.We examine the conditions that are needed to begin and maintain a cooperative strategy and the circumstances that lead a state and a terrorist group to leave the coalition and double-cross its partner. Equilibrium strategies for both players are defined and interpreted.

  12. Offensive Counterterrorism Targeted killing in eliminating terrorist target: the case of the USA and Israel

    Directory of Open Access Journals (Sweden)

    Hermínio Matos

    2012-01-01

    Full Text Available Due to the "global terrorism project", some States have adopted offensive counterterrorism measures which, though within national strategies on security and defense, contemplate the use of military power and the use of lethal force against non-state actors - individuals, groups or terrorist organizations - beyond their national borders. Reformulating the security paradigm has led, in these cases, to policies against terrorism. This is the case of targeted killing - the killing of selected targets - by the USA and Israel. Targeted killing actions - using essentially but not only drones - in Pakistan and Yemen by the American administration, a well as the Israeli response to Palestinian terrorism, are under heated debate in terms of their efficiency and legality. Thus, this paper aims to not only provide an analytical framework on this theme but also analyze the scope and impact of these counter terrorist strategies by the two countries.

  13. FINANCIAL INSTRUMENTS OF THE STATE POLICY FOR THE PREVENTION OF TERRORIST ACTS IN UKRAINE

    Directory of Open Access Journals (Sweden)

    Mykola Bunchuk

    2017-11-01

    Full Text Available The article’s objective is to determine the mechanism for implementing the financial instruments of the state policy to counter terrorist acts in the territory not controlled by Ukrainian authorities in Donetsk and Luhansk regions. Methodology. Within the scientific research, for the most effective approaches at the national level to prevent the threat of international terrorism, under the conditions of the deep internal political crisis and extremely difficult economic situation, in order to improve the efficiency of public administration in developing and implementing the anti-terrorism state policies in Ukraine, the paper analyses international and domestic regulations on preventing the terrorist financing, considers factors that affect the deterioration of the social and economic situation of the temporarily occupied parts of Donbas. Results of the research allow formulating the definition of financial instruments of antiterrorist policies, the paper develops and proposes a series of organizational measures in order to prevent the terrorist financing in Ukraine. Practical implications. Based on the above, we propose an option of classification of main illegal mechanisms that may be used to finance terrorist activities in the territories of Donetsk and Luhansk regions uncontrolled by Ukrainian authorities, dividing them into internal and external. Given the above studied factors and classification of financing of terrorist acts in eastern Ukraine, we can assume that for the purpose of evading duty payable to relevant state bodies of Ukraine, external supplies of inventories in the uncontrolled areas of the Donetsk region, which are later obtained by illegal armed groups, are possibly carried out as follows: on behalf of a commercial entity registered in a foreign country for the Ukrainian commercial entity, registered in settlements located in the uncontrolled territory; crossing of international transit traffic that moves through the

  14. Agent Based Modeling on Organizational Dynamics of Terrorist Network

    OpenAIRE

    Bo Li; Duoyong Sun; Renqi Zhu; Ze Li

    2015-01-01

    Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. In this paper, we investigate the organizational dynamics by employing a computational experimentation methodology. The hierarchical cellular network model and the organizational dynamics model ...

  15. Understanding Xeroderma Pigmentosum Complementation Groups Using Gene Expression Profiling after UV-Light Exposure.

    Science.gov (United States)

    Bowden, Nikola A; Beveridge, Natalie J; Ashton, Katie A; Baines, Katherine J; Scott, Rodney J

    2015-07-14

    Children with the recessive genetic disorder Xeroderma Pigmentosum (XP) have extreme sensitivity to UV-light, a 10,000-fold increase in skin cancers from age 2 and rarely live beyond 30 years. There are seven genetic subgroups of XP, which are all resultant of pathogenic mutations in genes in the nucleotide excision repair (NER) pathway and a XP variant resultant of a mutation in translesion synthesis, POLH. The clinical symptoms and severity of the disease is varied across the subgroups, which does not correlate with the functional position of the affected protein in the NER pathway. The aim of this study was to further understand the biology of XP subgroups, particularly those that manifest with neurological symptoms. Whole genome gene expression profiling of fibroblasts from each XP complementation group was assessed before and after UV-light exposure. The biological pathways with altered gene expression after UV-light exposure were distinct for each subtype and contained oncogenic related functions such as perturbation of cell cycle, apoptosis, proliferation and differentiation. Patients from the subgroups XP-B and XP-F were the only subgroups to have transcripts associated with neuronal activity altered after UV-light exposure. This study will assist in furthering our understanding of the different subtypes of XP which will lead to better diagnosis, treatment and management of the disease.

  16. Authoritarian reactions to terrorist threat: who is being threatened, the Me or the We?

    Science.gov (United States)

    Asbrock, Frank; Fritsche, Immo

    2013-01-01

    Endorsement of authoritarian attitudes has been observed to increase under conditions of terrorist threat. However, it is not clear whether this effect is a genuine response to perceptions of personal or collective threat. We investigated this question in two experiments using German samples. In the first experiment (N = 144), both general and specific authoritarian tendencies increased after asking people to imagine that they were personally affected by terrorism. No such effect occurred when they were made to think about Germany as a whole being affected by terrorism. This finding was replicated and extended in a second experiment (N = 99), in which personal and collective threat were manipulated orthogonally. Authoritarian and ethnocentric (ingroup bias) reactions occurred only for people highly identified with their national ingroup under personal threat, indicating that authoritarian responses may operate as a group-level coping strategy for a threat to the personal self. Again, we found no effects for collective threat. In both studies, authoritarianism mediated the effects of personal threat on more specific authoritarian and ethnocentric reactions. These results suggest that the effects of terrorist threat on authoritarianism can, at least in part, be attributed to a sense of personal insecurity, raised under conditions of terrorist threat. We discuss the present findings with regard to basic sociomotivational processes (e.g., group-based control restoration, terror management) and how these may relate to recent models of authoritarianism.

  17. Cross-Milieu Terrorist Collaboration: Using Game Theory to Assess the Risk of a Novel Threat.

    Science.gov (United States)

    Ackerman, Gary A; Zhuang, Jun; Weerasuriya, Sitara

    2017-02-01

    This article uses a game-theoretic approach to analyze the risk of cross-milieu terrorist collaboration-the possibility that, despite marked ideological differences, extremist groups from very different milieus might align to a degree where operational collaboration against Western societies becomes possible. Based upon theoretical insights drawn from a variety of literatures, a bargaining model is constructed that reflects the various benefits and costs for terrorists' collaboration across ideological milieus. Analyzed in both sequential and simultaneous decision-making contexts and through numerical simulations, the model confirms several theoretical arguments. The most important of these is that although likely to be quite rare, successful collaboration across terrorist milieus is indeed feasible in certain circumstances. The model also highlights several structural elements that might play a larger role than previously recognized in the collaboration decision, including that the prospect of nonmaterial gains (amplification of terror and reputational boost) plays at least as important a role in the decision to collaborate as potential increased capabilities does. Numerical simulation further suggests that prospects for successful collaboration over most scenarios (including operational) increase when a large, effective Islamist terrorist organization initiates collaboration with a smaller right-wing group, as compared with the other scenarios considered. Although the small number of historical cases precludes robust statistical validation, the simulation results are supported by existing empirical evidence of collaboration between Islamists and right- or left-wing extremists. The game-theoretic approach, therefore, provides guidance regarding the circumstances under which such an unholy alliance of violent actors is likely to succeed. © 2016 Society for Risk Analysis.

  18. Threat Assessment of Potential Terrorist Attacks to the Transport Infrastructure

    Directory of Open Access Journals (Sweden)

    Gabriel Nowacki

    2014-06-01

    Full Text Available The paper presents threat assessment of potential terrorist attacks to the transport infrastructure. The range of transportation infrastructure has spread and includes railway, inland waterways, road, maritime, air, intermodal transport infrastructure and intelligent transport systems (ITS. ITS service is the provision of an ITS application through a well-defined organisational and operational framework with the aim of contributing to the user safety, efficiency, comfort and/or to facilitate or support transport and travel operations. Terrorism means acts of violence committed by groups that view themselves as victimized by some notable historical wrong. Although these groups have no formal connection with governments, they usually have the financial and moral backing of sympathetic governments. Typically, they stage unexpected attacks on civilian targets, including transport infrastructure, with the aim of sowing fear and confusion. Based on the analyses, transportation infrastructure is potentially threatened with terrorism attacks, especially road and rail infrastructure (about 23 %, and to a smaller degree the maritime and air transport infrastructure (about 2 %. There were 90,3% of incidents involve land transport (74,5% – vehicles, 9,5% – buses, 6,3% - rail covered the 41-year period 1967-2007 in the USA. Legal steps to fight terrorism have been taken on the international level, furthermore, some institutions have been established for this purpose.

  19. Lipid profiles and ischemic stroke risk: variations by sex within racial/ethnic groups

    Directory of Open Access Journals (Sweden)

    Gezmu T

    2014-05-01

    Full Text Available Tefera Gezmu,1 Dona Schneider,1 Kitaw Demissie,2 Yong Lin,2 Christine Giordano,3 Martin S Gizzi4 1Edward J. Bloustein School of Planning and Public Policy, Rutgers, the State University of New Jersey, New Brunswick, NJ, 2Rutgers School of Public Health, Department of Epidemiology, Piscataway, NJ, 3Rutgers New Jersey Medical School, Newark, NJ, 4New Jersey Neuroscience Institute at JFK Medical Center and Seton Hall University, Edison, NJ, USA Abstract: Evidence implicates lipid abnormalities as important but modifiable risk factors for stroke. This study assesses whether hypercholesterolemia can be used to predict the risk for etiologic subtypes of ischemic stroke between sexes within racial/ethnic groups. Data elements related to stroke risk, diagnosis, and outcomes were abstracted from the medical records of 3,290 acute stroke admissions between 2006 and 2010 at a regional stroke center. Sex comparison within racial/ethnic groups revealed that South Asian and Hispanic men had a higher proportion of ischemic stroke than women, while the inverse was true for Whites and African Americans (P=0.0014. All women, except South Asian women, had higher mean plasma total cholesterol and higher blood circulating low-density lipoprotein levels (≥100 mg/dL than men at the time of their admissions. The incidence of large-artery atherosclerosis (LAA was more common among women than men, except among Hispanics, where men tended to have higher incidences. A regression analysis that considered patients diagnosed with either LAA or small-artery occlusion etiologic subtype as the outcomes and high-density lipoproteins and triglycerides as predictors showed inconsistent associations between lipid profiles and the incidence of these subtypes between the sexes within racial/ethnic groups. In conclusion, our investigation suggests that women stroke patients may be at increased risk for stroke etiologic subtype LAA than men. Although the higher prevalence of stroke

  20. Organizational change in the Ministry of Justice and Public Security after the terrorist attacks on 22 July 2011

    OpenAIRE

    Jensen, Susan Bahia

    2016-01-01

    This paper examines changes in the Ministry of Justice and Public Security (MJ) after the terrorist attacks in Norway 22 July 2011 until 2016. The focus is on the MJ’s internal and external formal organization, internal and external procedures, and demographic profile. A main finding is that the MJ has been subject to several small incremental changes, which collectively have resulted in a considerable development of the Ministry’s governance capacity in the field of societal s...

  1. Use of a physiological profile to document motor impairment in ageing and in clinical groups.

    Science.gov (United States)

    Lord, S R; Delbaere, K; Gandevia, S C

    2016-08-15

    Ageing decreases exercise performance and is frequently accompanied by reductions in cognitive performance. Deterioration in the physiological capacity to stand, locomote and exercise can manifest itself as falling over and represents a significant deterioration in sensorimotor control. In the elderly, falling leads to serious morbidity and mortality with major societal costs. Measurement of a suite of physiological capacities that are required for successful motor performance (including vision, muscle strength, proprioception and balance) has been used to produce a physiological profile assessment (PPA) which has been tracked over the age spectrum and in different diseases (e.g. multiple sclerosis, Parkinson's disease). As well as measures of specific physiological capacities, the PPA generates an overall 'score' which quantitatively measures an individual's cumulative risk of falling. The present review collates data from the PPA (and the physiological capacities it measures) as well as its use in strategies to reduce falls in the elderly and those with different diseases. We emphasise that (i) motor impairment arises via reductions in a wide range of sensorimotor abilities; (ii) the PPA approach not only gives a snapshot of the physiological capacity of an individual, but it also gives insight into the deficits among groups of individuals with particular diseases; and (iii) deficits in seemingly restricted and disparate physiological domains (e.g. vision, strength, cognition) are funnelled into impairments in tasks requiring upright balance. Motor impairments become more prevalent with ageing but careful physiological measurement and appropriate interventions offer a way to maximise health across the lifespan. © 2015 The Authors. The Journal of Physiology © 2015 The Physiological Society.

  2. CAROLIN GOERZIG. TALKING TO TERRORISTS: CONCESSIONS AND THE RENUNCIATION OF VIOLENCE. REVIEWED BY: SCOTT NICHOLAS ROMANIUK

    Directory of Open Access Journals (Sweden)

    Scott Nicholas Romaniuk

    2016-03-01

    Full Text Available “Talking to terrorists remains a taboo” (Goerzig, 2010: p. 125. The adoption and reinforcement of such a moral position by many Western and non-Western governments alike has played no small role in, to a large extent, states to contain the violence and insecurity bred by terror activist in the post-Cold war and post-9/11 periods. Yet, few policymakers seem to recognize the danger in building political and social environments in which dialogue between states and terrorist groups and organizations is little more than depravity or even a betrayal to entire populations. To be sure, the protection of civilian populations has been entrusted to states that might otherwise learn better means of terrorism deterrence if lines of communication between states and terrorists were less constrained. The taboo of which Carolin Goerzig speaks, is one that “has been institutionalized in a legal framework in which … academics are being asked to report on their students and in which attempting to understand the subjectivities of ‘terrorist’ suspects could be interpreted as a ‘glorification of terrorism’” (Jackson quoted in Goerzig, 2010: p. 125.

  3. Guerilla Warfare & Law Enforcement: Combating the 21st Century Terrorist Cell within the U.S.

    Directory of Open Access Journals (Sweden)

    Major Richard Hughbank

    2009-01-01

    Full Text Available Both domestic and international terrorist organizations employ guerrilla warfare tactics, techniques, and procedures. Thus, the ability to identify and defeat the members of these organizations, cripple their infrastructures, and disrupt their financial resources lies in the understanding of modern guerrilla warfare as it develops in the twenty-first century within the United States.3 The forms of asymmetric warfare4 adopted by domestic and international terrorist groups alike is no longer intended to gain simple media exposure or governmental manipulation; they want to make an overpowering impact by causing massive loss of life and severe damage to infrastructure and are often motivated by religious imperatives and political goals. As terrorism analyst Stephen Flynn has observed, "Throughout the 20th century [Americans] were able to treat national security as essentially an out-of-body experience. When confronted by threats, [America] dealt with them on the turf of our allies or our adversaries. Aside from the occasional disaster and heinous crime, civilian life [in the United States] has been virtually terror-free." With the turn of the twenty-first century, terrorist operations have become more prevalent in the United States and are taking shape in the form of modern guerrilla warfare, thus creating new challenges for federal, state, and local law enforcement agencies. After reviewing the origin and nature of these challenges, this article will offer some suggestions for countering guerilla warfare in the United States.

  4. An Overview of NCRP Report No. 138 on Terrorist Activities

    Science.gov (United States)

    Poston, John, Sr.

    2005-04-01

    In late 1998, the National Council on Radiation Protection and Measurements (NCRP) convened Scientific Committee 46-14 to prepare a report on the radiological safety aspects of terrorist activities involving radioactivity. The work of this committee was funded through a contract with the Planning and Preparedness Division of the Office of Emergency Management of the Department of Energy. The committee was composed of a diverse group of individuals with expertise in many areas in addition to radiation safety and emergency response. These areas included law (both federal and state), public communications, and psychosocial aspects of such incidents. The statement of work focused the work of the committee, and the resulting report did not necessarily address all issues of such activities. One of the charges of the committee was to provide guidance as to necessary research and make recommendations regarding the present infrastructure with the responsibility for responding to such incidents. This presentation will provide an overview of NCRP Report No. 138 and focus on some of the critical issues raised in the report. These issues include recognition of the event, the interface between federal, state, and local authorities, exposure limits for the first-responders, clean-up criteria, training and resources, the psychosocial aspects of such events, and communications with the media and the public. This report represented the ``beginning'' of such considerations. It pointed the way for additional studies and research in this very important area.

  5. Foreign (Terrorist Fighter Estimates: Conceptual and Data Issues

    Directory of Open Access Journals (Sweden)

    Alex P. Schmid

    2015-10-01

    Full Text Available This Policy Brief – a short version of a larger Research Paper to be released by ICCT in late 2015 – focuses on the phenomenon of foreign (terrorist fighters (FTFs as it relates to Syria and Iraq. It concentrates on recruits to jihad and the astonishing growth in numbers from less than 1,000 in 2011 to more than 3,500 in 2012, 8,500+ in 2013, 18,000+ in 2014 to more than 25,000 by fall 2015. By October 2015, nearly 30,000 militants from more than 100 countries had become foreign fighters with the so-called “Islamic State” (IS in Syria and Iraq and other militant groups. This Policy Brief first discusses various definitions of FTFs by disaggregating the “foreign”, “terrorist” and “fighters” elements of FTFs of the UN Security Council definition in resolution 2178 (2014. Subsequently, an attempt is made to bring some structure and order to the widely diverging estimates of the numbers of foreign fighters and their origins, with tables presenting the best available estimates for different sides of the conflict at different moments in time since 2011. UN estimates on foreign fighters are juxtaposed with estimates from other sources. The biggest uncertainty is the ratio of foreign fighters to IS own core manpower. It is likely that at least 40 percent of the fighters of IS are foreigners and many more if Iraqis in Syria are counted as such.

  6. Analytical expressions for group delay in the far field from an optical fiber having an arbitrary index profile

    OpenAIRE

    Danielsen, Per Lander

    1981-01-01

    A general and efficient model for optical fibers with a few modes and arbitrary index profiles is established. The model yields a solution of the vectorial wave equation and analytical expressions for the group delay and the far field. Convergence tests have shown that the dispersion can be calculated with an accuracy better than 0.2 ps/(km . nm).

  7. Analytical expressions for group delay in the far field from an optical fiber having an arbitrary index profile

    DEFF Research Database (Denmark)

    Danielsen, Per Lander

    1981-01-01

    A general and efficient model for optical fibers with a few modes and arbitrary index profiles is established. The model yields a solution of the vectorial wave equation and analytical expressions for the group delay and the far field. Convergence tests have shown that the dispersion can...

  8. Encouraging Students with Different Profiles of Perceptions to Pursue Science by Choosing Appropriate Teaching Methods for Each Age Group

    Science.gov (United States)

    Potvin, Patrice; Hasni, Abdelkrim

    2017-06-01

    This research aimed at identifying student profiles of perceptions by means of a clustering method using a validated questionnaire. These profiles describe students' attraction to science and technology (S&T) studies and careers as a variable driven by school S&T self-concept and interest in school S&T. In addition to three rather predictable student profiles (confident enthusiast, average ambitious, and pessimistic dropout), the fourth fairly well-populated profile called confident indifferent was produced. Our second and third research questions allowed us to describe each profile in terms of the instructional methods to which their population was exposed (including the degree to which they were actively involved) and the instructional methods to which they would like more exposure. An analysis of the evolution of the profiles' population over time is also presented. The results suggest that pedagogical variety and active involvement in the decision to pursue S&T are important. The perception of the utility and importance of S&T both in and out of school may also play an important role in these decisions. Minor pedagogical preferences were also found in certain age groups.

  9. The Personality Profile of Tinnitus Sufferers and a Nontinnitus Control Group.

    Science.gov (United States)

    Durai, Mithila; O'Keeffe, Mary G; Searchfield, Grant D

    2017-04-01

    Chronic tinnitus (phantom perception of sound) significantly disrupts quality of life in 15-20% of those who experience it. Understanding how certain personality traits impact tinnitus perception and distress can be beneficial for the development of interventions to improve the lives of tinnitus sufferers. Four key self-reported personality traits (social closeness, stress reaction, alienation, and self-control) were identified from previous research as being associated with tinnitus. These were compared between tinnitus and age-, gender-, and hearing level-matched nontinnitus controls to see whether underlying profile differences exist, and if personality traits levels correlate with various tinnitus characteristics assessed in typical clinical questionnaires. A Web-based personality survey was administered comprising of self-control, stress reaction, alienation, and social closeness subscale questions of the Multidimensional Personality Questionnaire, the Hearing Handicap Inventory-Screening Version, TFI, and the Tinnitus Case History Questionnaire. A total of 154 participants with tinnitus (81 males, 73 females, mean age = 62.6 yr) and 61 control (32 males, 29 females, mean age = 59.62 yr) participants were recruited via e-mail invitations to a tinnitus research clinic database, poster, and social media Web site advertising. Statistical analysis was conducted using parametric statistics and IBM SPSS ® Version 22 software. Tinnitus sufferers displayed higher levels of stress reaction, lower social closeness, lower self-control, and higher alienation than the control group (p Alienation was related to tinnitus pitch and self-reported hyperacusis measured using the Tinnitus Case History Questionnaire (p < 0.05). Stress reaction correlated with self-reported hyperacusis, whether tinnitus sufferers had sought other treatments, and whether loud sounds make the tinnitus worse (p < 0.05). The four personality traits examined in this study exhibited a consistent

  10. Is ALARP applicable to the management of terrorist risks?

    International Nuclear Information System (INIS)

    Guikema, S.D.; Aven, T.

    2010-01-01

    In this paper, we discuss the applicability of the as low as reasonable practicable (ALARP) principle to terrorist risk management. ALARP is a commonly used framework for managing risk due to non-intelligent threats, but terrorism introduces difficult issues, both technically and socially. In particular, the probability of a terrorist attack is difficult to define, terrorist threats are adaptive, and some terrorist risk management actions raise issues of loss of civil liberties not raised by risk management measures for other types of risk. We discuss these issues and their implications for risk management. After showing how ALARP is used to manage the risk from other hazards in different economic sectors, we discuss both the benefits and difficulties associated with extending the ALARP framework for terrorist risk analysis. We conclude that the ALARP framework can be modified to make it appropriate for risk management for adaptive risks, provided that care is taken to explicitly consider adaptive reallocation of risk in response to risk management actions, to account for perceived or actual loss of civil liberties resulting from risk management actions, and to consider the difficulties associated with using probability to measure uncertainty in adversary actions.

  11. Cyberspace as a new arena for terroristic propaganda: an updated examination.

    Science.gov (United States)

    Minei, Elizabeth; Matusitz, Jonathan

    2012-11-01

    This paper analyzes the role of propaganda use in cyberterrorism. The main premise is that cyberterrorists display various semiotic gestures (e.g., the use of images and Internet videos) to communicate their intents to the public at large. In doing so, they communicate themes-these themes range from hate to anger. Cyberterrorism, then, is a form of theater or spectacle in which terrorists exploit cyberspace to trigger feelings of panic and overreaction in the target population. In many cases, this form of propaganda is the primary means of communication for various cyberterrorist groups to convey their intents. Internet sites also produce numerous opportunities for in-group communication and publicity.

  12. Empathy in Children with Autism and Conduct Disorder: Group-Specific Profiles and Developmental Aspects

    Science.gov (United States)

    Schwenck, Christina; Mergenthaler, Julia; Keller, Katharina; Zech, Julie; Salehi, Sarah; Taurines, Regina; Romanos, Marcel; Schecklmann, Martin; Schneider, Wolfgang; Warnke, Andreas; Freitag, Christine M.

    2012-01-01

    Background: A deficit in empathy is discussed to underlie difficulties in social interaction of children with autism spectrum disorder (ASD) and conduct disorder (CD). To date, no study has compared children with ASD and different subtypes of CD to describe disorder-specific empathy profiles in clinical samples. Furthermore, little is known about…

  13. The masses of local group dwarf spheroidal galaxies: The death of the universal mass profile

    International Nuclear Information System (INIS)

    Collins, Michelle L. M.; Martin, Nicolas F.; Chapman, Scott C.; Irwin, Michael J.; Rich, R. M.; Ibata, Rodrigo A.; Bate, Nicholas F.; Lewis, Geraint F.; Peñarrubia, Jorge; Arimoto, Nobuo; Casey, Caitlin M.; Ferguson, Annette M. N.; Koch, Andreas; McConnachie, Alan W.; Tanvir, Nial

    2014-01-01

    We investigate the claim that all dwarf spheroidal galaxies (dSphs) reside within halos that share a common, universal mass profile as has been derived for dSphs of the galaxy. By folding in kinematic information for 25 Andromeda dSphs, more than doubling the previous sample size, we find that a singular mass profile cannot be found to fit all of the observations well. Further, the best-fit dark matter density profile measured solely for the Milky Way dSphs is marginally discrepant with that of the Andromeda dSphs (at just beyond the 1σ level), where a profile with lower maximum circular velocity, and hence mass, is preferred. The agreement is significantly better when three extreme Andromeda outliers, And XIX, XXI, and XXV, all of which have large half-light radii (≳ 600 pc) and low-velocity dispersions (σ v < 5 km s –1 ), are omitted from the sample. We argue that the unusual properties of these outliers are likely caused by tidal interactions with the host galaxy.

  14. The masses of local group dwarf spheroidal galaxies: The death of the universal mass profile

    Energy Technology Data Exchange (ETDEWEB)

    Collins, Michelle L. M.; Martin, Nicolas F. [Max-Planck-Institut für Astronomie, Königstuhl 17, D-69117 Heidelberg (Germany); Chapman, Scott C.; Irwin, Michael J. [Institute of Astronomy, Madingley Rise, Cambridge, CB3 0HA (United Kingdom); Rich, R. M. [Department of Physics and Astronomy, University of California, Los Angeles, CA 90095-1547 (United States); Ibata, Rodrigo A. [Observatoire de Strasbourg, 11 rue de l' Université, F-67000, Strasbourg (France); Bate, Nicholas F.; Lewis, Geraint F. [Sydney Institute for Astronomy, School of Physics, A28, University of Sydney, NSW 2006 (Australia); Peñarrubia, Jorge [Instituto de Astrofísica de Andalucia-CSIC, Glorieta de la Astronomía s/n, E-18008, Granada (Spain); Arimoto, Nobuo [Subaru Telescope, National Astronomical Observatory of Japan, 650 North A' ohoku Place, Hilo, HI 96720 (United States); Casey, Caitlin M. [Institute for Astronomy, 2680 Woodlawn Drive, Honolulu, HI 96822-1839 (United States); Ferguson, Annette M. N. [Institute for Astronomy, University of Edinburgh, Royal Observatory, Blackford Hill, Edinburgh, EH9 3HJ (United Kingdom); Koch, Andreas [Zentrum für Astronomie der Universität Heidelberg, Landessternwarte, Königstuhl 12, D-69117 Heidelberg (Germany); McConnachie, Alan W. [NRC Herzberg Institute of Astrophysics, 5071 West Saanich Road, British Columbia, Victoria V9E 2E7 (Canada); Tanvir, Nial [Department of Physics and Astronomy, University of Leicester, University Road, Leicester LE1 7RH (United Kingdom)

    2014-03-01

    We investigate the claim that all dwarf spheroidal galaxies (dSphs) reside within halos that share a common, universal mass profile as has been derived for dSphs of the galaxy. By folding in kinematic information for 25 Andromeda dSphs, more than doubling the previous sample size, we find that a singular mass profile cannot be found to fit all of the observations well. Further, the best-fit dark matter density profile measured solely for the Milky Way dSphs is marginally discrepant with that of the Andromeda dSphs (at just beyond the 1σ level), where a profile with lower maximum circular velocity, and hence mass, is preferred. The agreement is significantly better when three extreme Andromeda outliers, And XIX, XXI, and XXV, all of which have large half-light radii (≳ 600 pc) and low-velocity dispersions (σ {sub v} < 5 km s{sup –1}), are omitted from the sample. We argue that the unusual properties of these outliers are likely caused by tidal interactions with the host galaxy.

  15. EWAS: Modeling Application for Early Detection of Terrorist Threats

    Science.gov (United States)

    Qureshi, Pir Abdul Rasool; Memon, Nasrullah; Wiil, Uffe Kock

    This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state-of-the-art systems and outlines the functional requirements that must to be met by an ideal system working in the counterterrorism domain. The concept of generation of early warnings to predict terrorist threats is presented. The model relies on data collection from open data sources, information retrieval, information extraction for preparing structured workable data sets from available unstructured data, and finally detailed investigation. The conducted investigation includes social network analysis, investigative data mining, and heuristic rules for the study of complex covert networks for terrorist threat indication. The presented model and system architecture can be used as a core framework for an early warning system.

  16. Correlation between Group B Streptococcal Genotypes, Their Antimicrobial Resistance Profiles, and Virulence Genes among Pregnant Women in Lebanon

    Directory of Open Access Journals (Sweden)

    Antoine Hannoun

    2009-01-01

    Full Text Available The antimicrobial susceptibility profiles of 76 Streptococcus agalactiae (Group B Streptococci [GBS] isolates from vaginal specimens of pregnant women near term were correlated to their genotypes generated by Random Amplified Polymorphic DNA analysis and their virulence factors encoding genes cylE, lmb, scpB, rib, and bca by PCR. Based on the distribution of the susceptibility patterns, six profiles were generated. RAPD analysis detected 7 clusters of genotypes. The cylE gene was present in 99% of the isolates, the lmb in 96%, scpB in 94.7%, rib in 33%, and bca in 56.5% of isolates. The isolates demonstrated a significant correlation between antimicrobial resistance and genotype clusters denoting the distribution of particular clones with different antimicrobial resistance profiles, entailing the practice of caution in therapeutic options. All virulence factors encoding genes were detected in all seven genotypic clusters with rib and bca not coexisting in the same genome.

  17. Defense against terroristic hazards and risk by building planning law

    International Nuclear Information System (INIS)

    Hopkins, Richard

    2012-01-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  18. Who sets the Agenda: The Author or the Terrorist?

    DEFF Research Database (Denmark)

    Søndergaard, Leif

    2012-01-01

    Definitions of terrorism. Terorism in the 1980s, i.e. taking hostages and exploding bombs outside the US. UNA-bomber and Oklahoma bomber. Relations between author and terrorist in and outside USA before 9/11. Relations between terrorist and press. President Bush's rhetoric and various reactions t...... to 9/11. Novels by Safran Foer (Extremely Loud and Incredibly Close) and Don DeLillo (Falling Man) focus on the personal and private consequences whereas Mohsin Hamid (The Reluctant Fundamentalist) includes the other side....

  19. Leading Players of the Global Petrochemical Industry. Overview of Groups - SWOTs - Benchmarking - Company Profiles and Financials

    International Nuclear Information System (INIS)

    2017-02-01

    This study presents: The medium-term and mega trends of the industry market developments and geographical segments; The competitive landscape and the main corporate rankings; The main conclusions of the report, summarised in 10 analytical slides. Content: 1. Overview: The Sector, Ranking, Performance Analysis; 2. Company Profiles: ExxonMobil, Total, BASF, Dow Chemical, Reliance Industries, Sabic, LyondellBasell, Mitsubishi Chemical, LG Chem, Sumitomo Chemical; 3. Sources; 4. Annexes

  20. Relationship between Serum Iron Profile and Blood Groups among the Voluntary Blood Donors of Bangladesh.

    Science.gov (United States)

    Hoque, M M; Adnan, S D; Karim, S; Al-Mamun, M A; Faruki, M A; Islam, K; Nandy, S

    2016-04-01

    Blood donation results in a substantial iron loss and subsequent mobilization from body stores. Chronic iron deficiency is a well-recognized complication of regular blood donation. The present study conducted to compare the level of serum ferritin, serum iron, total iron binding capacity (TIBC) and percentage transferrin saturation in different ABO and Rhesus type blood groups among the voluntary blood donors of Bangladesh. The present prospective study included 100 healthy voluntary donors attending at Department of Blood Transfusion, Dhaka Medical College, Dhaka between the periods of July 2013 to Jun 2014. From each donor 10mL venous blood sample was taken and divided into heparinized and non-heparinized tubes for determination of hemoglobin (Hb), hematocrit (Hct), serum iron (SI), total iron binding capacity (TIBC) and serum ferritin by standard laboratory methods. Percentage of transferrin saturation (TS) calculated from serum iron and TIBC. Data were analyzed with SPSS (version 16) software and comparisons between groups were made using student's t-test and one way ANOVA. In the present study mean±SD of age of the respondents was 27.2±6.5 years with a range of 18 to 49 years and 81.0% were male and 19.0% were female. Among the donors 18.0% had blood group A, 35.0% had blood group B, 14.0% had blood group AB and 33.0% had blood group O. Among the donors 91.0% had rhesus positive and 9.0% had rhesus negative. Donors with blood group O had lowest haemoglobin, serum iron and transferring saturation levels. Donors with blood group A had highest TIBC level. Donors with blood group B had lowest serum ferritin level. An independent samples 't' test showed statistically significant difference in serum ferritin and percentage transferrin saturation between blood group AB and blood group O and in percentage transferrin saturation between blood group B and blood group O. One way ANOVA showed that there is no significant difference in haemoglobin, serum iron, serum

  1. How and Why Do Terrorist Organizations Use the Internet?

    Directory of Open Access Journals (Sweden)

    Karolina Wojtasik

    2017-12-01

    Full Text Available The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula and ISIS (the so-called Islamic State. While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

  2. The Counter Terrorist Classroom: Religion, Education, and Security

    Science.gov (United States)

    Gearon, Liam

    2013-01-01

    The article identifies international cases--from the United States, Europe, and the United Nations--of an emergent interface of religion, education, and security. This is manifest in the uses of religion in education to counter religious extremism, the notional "counter terrorist classroom." To avoid an over-association of extremism with…

  3. Protecting chemical plants against terrorist attacks: a review

    NARCIS (Netherlands)

    Khakzad Rostami, N.; Reniers, G.L.L.M.E.

    2015-01-01

    Protection of hazardous establishments such as chemical plants intentional incidents has drawn attention from safety and security experts since 9/11 terrorist attacks in the U.S. Although major steps have been taken since, the recent intentional incidents in two chemical plants in France in June and

  4. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    NARCIS (Netherlands)

    Farnham, N.T.; Liem, M.C.A.

    2017-01-01

    The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research.

  5. The Terrorist War against Islam: Clarifying Academic Confusions

    Science.gov (United States)

    Schwartz, Stephen

    2011-01-01

    Since the terrorist atrocities of September 11, 2001, Westerners have been challenged to understand the ideological and theological concepts, derived from Islam, that motivated the actions of Al-Qaida on that day and in other attacks before and since. Differences in taxonomy have proven to be a major issue. In the author's view, it is insufficient…

  6. Exploitation of Free Markets and Globalization to Finance Terrorists

    Science.gov (United States)

    2008-09-01

    is their capability to exploit the black market peso exchange or the international foreign exchange arbitrage . Under the scenario of a weak U.S...appears legitimate. By using intermediaries or legitimate businesses, the financial markets are wide open for terrorists to hedge funds and

  7. Terrorist Capabilities for Cyberattack: Overview and Policy Issues

    Science.gov (United States)

    2007-01-22

    called “Digital Pearl Harbor” (DPH), with the result that 79% of the gamers said that a strategic cyberattack against the United States was likely...terrorist sponsors, five of them — North Korea , Sudan, Syria, Libya, and Cuba — are described as a diminishing concern for terrorism. Only Iran remains

  8. TERRITORIAL RISK ASSESMENT AFTER TERRORIST ACT: EXPRESS MODEL

    Directory of Open Access Journals (Sweden)

    M. M. Biliaiev

    2018-02-01

    Full Text Available Purpose. The paper involves the development of a method to assess the territorial risk in the event of a terrorist attack using a chemical agent. Methodology. To describe the process of chemical agent scattering in the atmosphere, ejected in the event of a terrorist attack, the equation of mass transfer of an impurity in atmospheric air is used. The equation takes into account the velocity of the wind flow, atmospheric diffusion, the intensity of chemical agent emission, the presence of buildings near the site of the emission of a chemically hazardous substance. For numerical integration of the modeling equation, a finite difference method is used. A feature of the developed numerical model is the possibility of assessing the territorial risk in the event of a terrorist attack under different weather conditions and the presence of buildings. Findings. A specialized numerical model and software package has been developed that can be used to assess the territorial risk, both in the case of terrorist attacks, with the use of chemical agents, and in case of extreme situations at chemically hazardous facilities and transport. The method can be implemented on small and medium-sized computers, which allows it to be widely used for solving the problems of the class under consideration. The results of a computational experiment are presented that allow estimating possibilities of the proposed method for assessing the territorial risk in the event of a terrorist attack using a chemical agent. Originality. An effective method of assessing the territorial risk in the event of a terrorist attack using a chemically hazardous substance is proposed. The method can be used to assess the territorial risk in an urban environment, which allows you to obtain adequate data on possible damage areas. The method is based on the numerical integration of the fundamental mass transfer equation, which expresses the law of conservation of mass in a liquid medium. Practical

  9. A three year profile comparison of a group of Special Operations candidates

    CSIR Research Space (South Africa)

    Van Heerden, Adelai

    2015-09-01

    Full Text Available examined, from a Positive Psychology perspective, candidates’ enlistment motivation in addition to their coping strategies. The qualitative results revealed that, despite candidates’ various reasons for enlisting, all three year groups were motivated...

  10. Profiles of orofacial dysfunction in different diagnostic groups using the Nordic Orofacial Test (NOT-S)--a review.

    Science.gov (United States)

    Bergendal, Birgitta; Bakke, Merete; McAllister, Anita; Sjögreen, Lotta; Åsten, Pamela

    2014-11-01

    The Nordic Orofacial Test-Screening (NOT-S) was developed as a comprehensive method to assess orofacial function. Results from the screening protocol have been presented in 11 international publications to date. This study reviewed these publications in order to compile NOT-S screening data and create profiles of orofacial dysfunction that characterize various age groups and disorders. NOT-S results of nine reports meeting the inclusion criteria were reviewed. Seven of these studies not only provided data on the mean and range of total NOT-S scores, but also on the most common domains of orofacial dysfunction (highest rate of individuals with dysfunction scores), allowing the construction of orofacial dysfunction profiles based on the prevalence of dysfunction in each domain of NOT-S. The compiled data comprised 669 individuals, which included healthy control subjects (n = 333) and various patient groups (n = 336). All studies reported differences between individuals with diagnosed disorders and healthy control subjects. The NOT-S data could measure treatment effects and provided dysfunction profiles characterizing the patterns of orofacial dysfunction in various diagnoses. This review corroborates previous results that the NOT-S differentiates well between patients and healthy controls and can also show changes in individuals after treatment. NOT-S could be used as a standard instrument to assess orofacial dysfunction, evaluate the outcomes of oral habilitation and rehabilitation and improve comparability in clinical practice and research.

  11. Sudden Cardiac arrest Risk profile in a group of amateur level ...

    African Journals Online (AJOL)

    ... males and females in this group of university basketball players showed varying signs of SCA risk, with the overall risk being reasonably low, albeit abnormalities were highlighted in some and Marfanoid characteristics were clearly evident in others. Key words: Sudden cardiac arrest; Basketball players, Marfan syndrome; ...

  12. Toxigenic profile of methicillin-sensitive and resistant Staphylococcus aureus isolated from special groups.

    Science.gov (United States)

    de Souza, Camila Sena Martins; Fortaleza, Carlos Magno Castelo Branco; Witzel, Claudia Lima; Silveira, Mônica; Bonesso, Mariana Fávero; Marques, Silvio Alencar; Cunha, Maria de Lourdes Ribeiro de Souza da

    2016-02-16

    Staphylococcus aureus is characterized by its pathogenicity and high prevalence, causing disease in both healthy and immunocompromised individuals due to its easy dissemination. This fact is aggravated by the widespread dissemination of S. aureus carrying toxigenic genes. The objective of this study was to determine the toxigenic profile of methicillin-sensitive S. aureus (MSSA) and methicillin-resistant S. aureus (MRSA) in patients with purulent skin and/or soft tissue infections seen at the Dermatology Department of the University Hospital of the Botucatu Medical School, asymptomatic adults older than 60 years living in nursing homes, and prison inmates of the Avaré Detention Center. PCR was used for the detection of the mecA gene, enterotoxin genes (sea, seb, and sec), exfoliative toxins A and B (eta and etb), toxic shock syndrome toxin 1 (tst), panton-valentine leukocidin (lukS-PV and lukF-PV), and alpha- and delta-hemolysins or cytotoxins (hla and hld). The results showed a significant prevalence of toxigenic genes among S. aureus isolates from asymptomatic individuals, with the observation of a higher prevalence of cytotoxin genes. However, the panton-valentine leukocidin gene was only detected in MSSA isolated from patients with skin infections and the tst gene was exclusively found in MSSA isolated from prison inmates. The present study demonstrated a significant prevalence of toxigenic genes in MSSA and MRSA strains isolated from asymptomatic S. aureus carriers. There was a higher prevalence of cytotoxin genes.

  13. Characteristics and practice profiles of migrant dentist groups in Australia: implications for dental workforce policy and planning.

    Science.gov (United States)

    Balasubramanian, Madhan; Spencer, A John; Short, Stephanie D; Watkins, Keith; Chrisopoulos, Sergio; Brennan, David S

    2015-06-01

    Migrants comprise a growing proportion of the dental workforce in Australia. To date, research on migrant dentists is limited, raising policy questions regarding the motivations for migration, demographic profiles and work patterns. The purpose of this paper was to present findings from the first national survey of migrant dentists in Australia. All dentists with a primary dental qualification from an overseas institution and registered with the Australian Dental Association (n=1,872) or enrolled as a graduate student in any of the nine dental schools in Australia (n=105) were surveyed between January and May 2013. A total of 1,022 participants (response rate=54.5%) were classifiable into three migrant dentist groups: direct recognition (n=491); Australian Dental Council (ADC) (n=411); and alternative pathway (n=120). Overall, 41.8% of migrant dentists were female. More than half of the ADC group (54.1%) were from lower middle income countries. The most frequent motivation for migration according to the direct recognition group (21.1%) was 'adventure', whereas other groups migrated for 'better opportunity'. The majority of ADC respondents (65%) were under 45 years of age, and a larger proportion worked in the most disadvantaged areas (12.4%), compared with other groups. Gender, marital status, years since arrival in Australia and having children varied between the groups (chi square; Pmigrate to Australia for different reasons. The large proportion of the migrant dentist workforce sourced from lower middle income countries points towards deficiencies in oral health systems both for these countries and for Australia. The feminisation of the migrant dentist profile could in future affect dentist-practice activity patterns in Australia. Further research, especially on the settlement experiences of these dentists, can provide better insights into issues faced by these dentists, the nature of support that migrant dentists receive in Australia, the probable future

  14. Interpersonal Circumplex Profiles Of Persistent Depression: Goals, Self-Efficacy, Problems, And Effects Of Group Therapy.

    Science.gov (United States)

    Locke, Kenneth D; Sayegh, Liliane; Penberthy, J Kim; Weber, Charlotte; Haentjens, Katherine; Turecki, Gustavo

    2017-06-01

    We assessed severely and persistently depressed patients' interpersonal self-efficacy, problems, and goals, plus changes in interpersonal functioning and depression during 20 weeks of group therapy. Outpatients (32 female, 26 male, mean age = 45 years) completed interpersonal circumplex measures of goals, efficacy, and problems before completing 20 weeks of manualized group therapy, during which we regularly assessed depression and interpersonal style. Compared to normative samples, patients lacked interpersonal agency, including less self-efficacy for expressive/assertive actions; stronger motives to avoid conflict, scorn, and humiliation; and more problems with being too submissive, inhibited, and accommodating. Behavioral Activation and especially Cognitive Behavioral Analysis System of Psychotherapy interventions produced improvements in depression and interpersonal agency, with increases in "agentic and communal" efficacy predicting subsequent decreases in depression. While severely and persistently depressed patients were prone to express maladaptive interpersonal dispositions, over the course of group therapy, they showed increasingly agentic and beneficial patterns of cognitions, motives, and behaviors. © 2016 Wiley Periodicals, Inc.

  15. Combating the terrorist use of mass destruction weapons, particularly nuclear weapons

    International Nuclear Information System (INIS)

    Barakat, M.

    2008-01-01

    The risks of mass destruction weapons vary and also forms of damages resulting therefrom. While the effects of nuclear weapons are focused, sudden and comprehensive, the chemical weapons have limited impacts relatively unless used intensively severe prejudice to the element of surprise, and thus impaired the efficacy of their influences,especially that they affect exceptionally the individuals in the area of injury and biological weapons do not announce themselves except through their effect that appears later than the time of use as they affect exceptionally the organisms in the area of injury.The mass destruction weapons have turned from being a purely military means in the early twentieth century and have now become the means of violence against governments and countries that they should prepare themselves for and respond in ways of successful and effective countermeasures. Despite the fact that the acquisition of mass destruction weapons can be considered as a priority objective, which terrorist groups and organizations steadily seek but their accessibility is flanked by a lot of difficulties. Addressing the risk of further spread of nuclear weapons, and especially after doubling the power of those high-risk weapons, the international community has an approach to take a number of arrangements that complement each other to control and resist nuclear proliferation, either for the states or for terrorist groups.

  16. Tracking and Analyzing Individual Distress Following Terrorist Attacks Using Social Media Streams.

    Science.gov (United States)

    Lin, Yu-Ru; Margolin, Drew; Wen, Xidao

    2017-08-01

    Risk research has theorized a number of mechanisms that might trigger, prolong, or potentially alleviate individuals' distress following terrorist attacks. These mechanisms are difficult to examine in a single study, however, because the social conditions of terrorist attacks are difficult to simulate in laboratory experiments and appropriate preattack baselines are difficult to establish with surveys. To address this challenge, we propose the use of computational focus groups and a novel analysis framework to analyze a social media stream that archives user history and location. The approach uses time-stamped behavior to quantify an individual's preattack behavior after an attack has occurred, enabling the assessment of time-specific changes in the intensity and duration of an individual's distress, as well as the assessment of individual and social-level covariates. To exemplify the methodology, we collected over 18 million tweets from 15,509 users located in Paris on November 13, 2015, and measured the degree to which they expressed anxiety, anger, and sadness after the attacks. The analysis resulted in findings that would be difficult to observe through other methods, such as that news media exposure had competing, time-dependent effects on anxiety, and that gender dynamics are complicated by baseline behavior. Opportunities for integrating computational focus group analysis with traditional methods are discussed. © 2017 Society for Risk Analysis.

  17. Profile of Nigerians with diabetes mellitus - Diabcare Nigeria study group (2008: Results of a multicenter study

    Directory of Open Access Journals (Sweden)

    Sunday Chinenye

    2012-01-01

    Full Text Available Background: Diabetes Mellitus is the commonest endocrine-metabolic disorder in Nigeria similar to the experience in other parts of the world. The aim was to assess the clinical and laboratory profile, and evaluate the quality of care of Nigerian diabetics with a view to planning improved diabetes care. Materials and Methods: In a multicenter study across seven tertiary health centers in Nigeria, the clinical and laboratory parameters of diabetic out-patients were evaluated. Clinical parameters studied include type of diabetes, anthropometry, and blood pressure (BP status, chronic complications of diabetes, and treatment types. Laboratory data assessed included fasting plasma glucose (FPG, 2-h post-prandial (2-HrPP glucose, glycated hemoglobin (HbA1c, urinalysis, serum lipids, electrolytes, urea, and creatinine. Results: A total of 531 patients, 209 (39.4% males and 322 (60.6% females enrolled. The mean age of the patients was 57.1 ± 12.3 years with the mean duration of diabetes of 8.8 ± 6.6 years. Majority (95.4% had type 2 diabetes mellitus (DM compared to type 1 DM (4.6%, with P < 0.001. The mean FPG, 2-HrPP glucose, and HbA1c were 8.1 ± 3.9 mmol/L, 10.6 ± 4.6 mmol/L, and 8.3 ± 2.2%, respectively. Only 170 (32.4% and 100 (20.4% patients achieved the ADA and IDF glycemic targets, respectively. Most patients (72.8% did not practice self-monitoring of blood glucose. Hypertension was found in 322 (60.9%, with mean systolic BP 142.0 ± 23.7 mmHg, and mean diastolic BP 80.7 ± 12.7 mmHg. Diabetic complications found were peripheral neuropathy (59.2%, retinopathy (35.5%, cataracts (25.2%, cerebrovascular disease (4.7%, diabetic foot ulcers (16.0%, and nephropathy (3.2%. Conclusion: Most Nigerian diabetics have suboptimal glycemic control, are hypertensives, and have chronic complications of DM. Improved quality of care and treatment to target is recommended to reduce diabetes-related morbidity and mortality.

  18. Securing public transportation systems an integrated decision analysis framework for the prevention of terrorist attacks as example

    CERN Document Server

    Brauner, Florian

    2017-01-01

    Florian Brauner addresses the risk reduction effects of security measures (SecMe) as well as economic and social effects using terrorist threats in public transportation as use case. SecMe increase the level of security but cause interferences and restrictions for customers (e.g. privacy). This study identifies the interferences and analyzes the acceptance with an empirical survey of customers. A composite indicator for the acceptance of different SecMe is developed and integrated into a risk management framework for multi-criteria decision analysis achieving the right balance of risk reduction, costs, and social acceptance. Contents Assessment of Security Measures for Risk Management Measurement of Objective Effectiveness of Security Measures Against Terrorist Attacks Determination of Subjective Effects of Security Measures (Customer Acceptance Analysis) Cost Analysis of Security Measures Multi-Criteria Decision Support Systems Target Groups Scientists with Interest in Civil Security Research Providers and S...

  19. Anticipating Terrorist Safe Havens from Instability Induced Conflict

    Science.gov (United States)

    Shearer, Robert; Marvin, Brett

    This chapter presents recent methods developed at the Center for Army Analysis to classify patterns of nation-state instability that lead to conflict. The ungoverned areas endemic to failed nation-states provide terrorist organizations with safe havens from which to plan and execute terrorist attacks. Identification of those states at risk for instability induced conflict should help to facilitate effective counter terrorism policy planning efforts. Nation-states that experience instability induced conflict are similar in that they share common instability factors that make them susceptible to experiencing conflict. We utilize standard pattern classification algorithms to identify these patterns. First, we identify features (political, military, economic and social) that capture the instability of a nation-state. Second, we forecast the future levels of these features for each nation-state. Third, we classify each future state’s conflict potential based upon the conflict level of those states in the past most similar to the future state.

  20. Waste Management Policy Framework to Mitigate Terrorist Intrusion Activities

    International Nuclear Information System (INIS)

    Redus, Kenneth S.

    2003-01-01

    A policy-directed framework is developed to support US Department of Energy (DOE) counterterrorism efforts, specifically terrorist intrusion activities that affect of Environmental Management (EM) programs. The framework is called the Security Effectiveness and Resource Allocation Definition Forecasting and Control System (SERAD-FACS). Use of SERAD-FACS allows trade-offs between resources, technologies, risk, and Research and Development (R and D) efforts to mitigate such intrusion attempts. Core to SERAD-FACS is (1) the understanding the perspectives and time horizons of key decisionmakers and organizations, (2) a determination of site vulnerabilities and accessibilities, and (3) quantifying the measures that describe the risk associated with a compromise of EM assets. The innovative utility of SERAD-FACS is illustrated for three integrated waste management and security strategies. EM program risks, time delays, and security for effectiveness are examined to demonstrate the significant cost and schedule impact terrorist activities can have on cleanup efforts in the DOE complex

  1. Public health preparedness and response to a radiological terrorist attack

    International Nuclear Information System (INIS)

    Yamaguchi, Ichiro

    2016-01-01

    Given the potential for intentional malevolent acts, the security of radioactive sources should be ensured. In the event of a terrorist attack using a radioactive source, we should care not only about health concerns of victims, especially including first responders who suffer from radiation injury, but also public health activities with affected people during the long recovery phase. Regarding the radiological public health viewpoint, preventive efforts are also important. In fact, regulatory reform is progressing in Japan according to the code of conduct issued by IAEA. One of the difficulties of countermeasures for the security of radioactive sources in Japan is to establish a disposal facility for disused sealed radioactive sources, since radioactive waste has been additionally a point of contention in society since the nuclear disaster. This paper presents an overview of countermeasures for terrorist attacks using a radioactive source, from the viewpoint of public health in Japan including the results of survey targeted hospitals equipped with blood irradiation machines. (author)

  2. Use of an Innovative Personality-Mindset Profiling Tool to Guide Culture-Change Strategies among Different Healthcare Worker Groups.

    Science.gov (United States)

    Grayson, M Lindsay; Macesic, Nenad; Huang, G Khai; Bond, Katherine; Fletcher, Jason; Gilbert, Gwendolyn L; Gordon, David L; Hellsten, Jane F; Iredell, Jonathan; Keighley, Caitlin; Stuart, Rhonda L; Xuereb, Charles S; Cruickshank, Marilyn

    2015-01-01

    Important culture-change initiatives (e.g. improving hand hygiene compliance) are frequently associated with variable uptake among different healthcare worker (HCW) categories. Inherent personality differences between these groups may explain change uptake and help improve future intervention design. We used an innovative personality-profiling tool (ColourGrid®) to assess personality differences among standard HCW categories at five large Australian hospitals using two data sources (HCW participant surveys [PS] and generic institution-wide human resource [HR] data) to: a) compare the relative accuracy of these two sources; b) identify differences between HCW groups and c) use the observed profiles to guide design strategies to improve uptake of three clinically-important initiatives (improved hand hygiene, antimicrobial stewardship and isolation procedure adherence). Results from 34,243 HCWs (HR data) and 1045 survey participants (PS data) suggest that HCWs were different from the general population, displaying more individualism, lower power distance, less uncertainty avoidance and greater cynicism about advertising messages. HR and PS data were highly concordant in identifying differences between the three key HCW categories (doctors, nursing/allied-health, support services) and predicting appropriate implementation strategies. Among doctors, the data suggest that key messaging should differ between full-time vs part-time (visiting) senior medical officers (SMO, VMO) and junior hospital medical officers (HMO), with SMO messaging focused on evidence-based compliance, VMO initiatives emphasising structured mandatory controls and prestige loss for non-adherence, and for HMOs focusing on leadership opportunity and future career risk for non-adherence. Compared to current standardised approaches, targeted interventions based on personality differences between HCW categories should result in improved infection control-related culture-change uptake. Personality

  3. Use of an Innovative Personality-Mindset Profiling Tool to Guide Culture-Change Strategies among Different Healthcare Worker Groups.

    Directory of Open Access Journals (Sweden)

    M Lindsay Grayson

    Full Text Available Important culture-change initiatives (e.g. improving hand hygiene compliance are frequently associated with variable uptake among different healthcare worker (HCW categories. Inherent personality differences between these groups may explain change uptake and help improve future intervention design.We used an innovative personality-profiling tool (ColourGrid® to assess personality differences among standard HCW categories at five large Australian hospitals using two data sources (HCW participant surveys [PS] and generic institution-wide human resource [HR] data to: a compare the relative accuracy of these two sources; b identify differences between HCW groups and c use the observed profiles to guide design strategies to improve uptake of three clinically-important initiatives (improved hand hygiene, antimicrobial stewardship and isolation procedure adherence.Results from 34,243 HCWs (HR data and 1045 survey participants (PS data suggest that HCWs were different from the general population, displaying more individualism, lower power distance, less uncertainty avoidance and greater cynicism about advertising messages. HR and PS data were highly concordant in identifying differences between the three key HCW categories (doctors, nursing/allied-health, support services and predicting appropriate implementation strategies. Among doctors, the data suggest that key messaging should differ between full-time vs part-time (visiting senior medical officers (SMO, VMO and junior hospital medical officers (HMO, with SMO messaging focused on evidence-based compliance, VMO initiatives emphasising structured mandatory controls and prestige loss for non-adherence, and for HMOs focusing on leadership opportunity and future career risk for non-adherence.Compared to current standardised approaches, targeted interventions based on personality differences between HCW categories should result in improved infection control-related culture-change uptake. Personality

  4. Pain patterns during adolescence can be grouped into four pain classes with distinct profiles

    DEFF Research Database (Denmark)

    Holden, Sinead; Rathleff, Michael Skovdal; Roos, E. M.

    2018-01-01

    L (assessed by Euro-QoL 5D-3L). Latent class analysis was used to classify spatial pain patterns, based on the pain sites. The analysis included 2953 adolescents. RESULTS: Four classes were identified as follows: (1) little or no pain (63% of adolescents), (2) majority lower extremity pain (10%), (3) multi......-site bodily pain (22%) and (4) head and stomach pain (3%). The lower extremity multi-site pain group reported highest weekly sports participation (p ....001). Males were more likely to belong to the little or no pain class, whereas females were more likely to belong to the multi-site bodily pain class. CONCLUSIONS: Latent class analysis identified distinct classes of pain patterns in adolescents, characterized by sex, differences in HRQoL and sports...

  5. National survey provides average power quality profiles for different customer groups

    International Nuclear Information System (INIS)

    Hughes, B.; Chan, J.

    1996-01-01

    A three year survey, beginning in 1991, was conducted by the Canadian Electrical Association to study the levels of power quality that exist in Canada, and to determine ways to increase utility expertise in making power quality measurements. Twenty-two utilities across Canada were involved, with a total of 550 sites being monitored, including residential and commercial customers. Power disturbances, power outages and power quality were recorded for each site. To create a group average power quality plot, the transient disturbance activity for each site was normalized to a per channel, per month basis and then divided into a grid. Results showed that the average power quality provided by Canadian utilities was very good. Almost all the electrical disturbance within a customer premises were created and stayed within those premises. Disturbances were generally beyond utility control. Utilities could, however, reduce the amount of time the steady-state voltage exceeds the CSA normal voltage upper limit. 5 figs

  6. Management and presentation of grouped procedures: has the IHE integration profile cracked the toughest radiology workflow nut?

    Science.gov (United States)

    Parisot, Charles R.; Channin, David S.; Avrin, David E.; Lindop, Christopher

    2001-08-01

    In a simple, typical radiology workflow process, an order generates a single procedure, which in turn generates a single data set, from which, one radiology report is generated. There are, however, occasions when a single order consists of more than one procedure each with a separate report, yet the procedures are accomplished by one physical acquisition of data. The prototypical example of this is the request for computed tomographic evaluation of the chest, abdomen and pelvis. The study is accomplished, with modern day scanners, by a single helical acquisition, yet there are typically three codable and billable procedures involved, and these may be reported independently either for administrative or academic reasons. This grouping of procedures remained up to now a challenge to automate across integrated modalities, PACS and RIS. This paper discusses a number of other practical cases where this situation occurs and reviews the capabilities of the Presentation of Grouped Procedures IHE Integration Profile in solving this problem. The DICOM services used are evaluated as well as the strengths and weaknesses of this IHE Integration Profile. The implementation experience gained on both a CT and an MR for the IHE Demonstration at RSNA 2000 and HIMSS 2001 is also reviewed. In conclusion, the resulting clinical and operational benefits are discussed.

  7. Trash can bomb can fall into the hands of terrorists

    CERN Multimedia

    2001-01-01

    Leading scientists from CERN described how if terrorists were able to get their hands on plutonium or uranium, they would be able to manufacture a 'trash can' nuclear bomb simply by inserting the radioactive material into a normal bomb. Once detonated a large area could be contaminated leading to the immediate deaths of many with many more future casualties due to cancers caused by the radiation.

  8. Mass casualty response in the 2008 Mumbai terrorist attacks.

    Science.gov (United States)

    Roy, Nobhojit; Kapil, Vikas; Subbarao, Italo; Ashkenazi, Isaac

    2011-12-01

    The November 26-29, 2008, terrorist attacks on Mumbai were unique in its international media attention, multiple strategies of attack, and the disproportionate national fear they triggered. Everyone was a target: random members of the general population, iconic targets, and foreigners alike were under attack by the terrorists. A retrospective, descriptive study of the distribution of terror victims to various city hospitals, critical radius, surge capacity, and the nature of specialized medical interventions was gathered through police, legal reports, and interviews with key informants. Among the 172 killed and 304 injured people, about four-fifths were men (average age, 33 years) and 12% were foreign nationals. The case-fatality ratio for this event was 2.75:1, and the mortality rate among those who were critically injured was 12%. A total of 38.5% of patients arriving at the hospitals required major surgical intervention. Emergency surgical operations were mainly orthopedic (external fixation for compound fractures) and general surgical interventions (abdominal explorations for penetrating bullet/shrapnel injuries). The use of heavy-duty automatic weapons, explosives, hostages, and arson in these terrorist attacks alerts us to new challenges to medical counterterrorism response. The need for building central medical control for a coordinated response and for strengthening public hospital capacity are lessons learned for future attacks. These particular terrorist attacks had global consequences, in terms of increased security checks and alerts for and fears of further similar "Mumbai-style" attacks. The resilience of the citizens of Mumbai is a critical measure of the long-term effects of terror attacks.

  9. The Effect Terrorist Labels Have on Military Operations

    Science.gov (United States)

    2012-05-17

    Department until 2008.44 Nelson Mandela , the renowned member of the ANC and Nobel Prize laureate, became president of South Africa in 1994 and is...celebrated internationally as one of the most prolific and revolutionary leaders of the 20th century. Mandela received all these awards and accolades—many...models or key players during 44 Mimi Hall, "U.S. has Mandela on Terrorist List," USA Today, http

  10. MOTIVATION SPECIFIC FOR YOUNGSTERS INVOLVED INTO TERRORIST OPERATION

    OpenAIRE

    Beslan Alexeyevich Tarchokov

    2015-01-01

    The paper made an attempt to explore preconditions, motives, reasons and factors capable of facilitating youth’ involvement into terrorist operations, emergence of youth terrorism and its spreading around, including the specifics of social and economic domains, of ideology and politics, psychology and law, etc. all of them taken on the scene of nowadays globalized society. Specifying in greater detail the causes and circumstances that contributed to involvement of young Russians into terroris...

  11. Overview of the terrorist threat to international peace and security

    International Nuclear Information System (INIS)

    Wilkinson, P.

    2001-01-01

    This contribution deals with the implications of terrorism for international peace and security and the escalation to mass terrorism. The topics covered are: impact of the latest terrorist events on the United States, impact on the international community; illegitimacy of terrorism; need for global action; the role of the united Nations; the crucial role for disarmament and counter-proliferation activities, especially in finding means of enhancing the security of materials that could easily be misused

  12. Transition from Terrorist Event Management to Consequence Management, Executive Summary

    Science.gov (United States)

    1982-03-31

    hUMIEe " BDM/W-82-l1 5-TR AUTO11(o 1. CONTR ACT OR GRANT NumURe) J. C. Evanis, M. K. Pilgrim, C. J. Potter EMW-C-0744 9. PER•O^•ING ORGANIZATIN NAME...should, and is expected to, provide leadership in this regard. There exists a variety of experience and planning for responding to terrorist events. The

  13. Have the Mexican Drug Cartels Evolved into a Terrorist Insurgency?

    Science.gov (United States)

    2013-06-14

    individual police officers and journalists.55 Originally, the Gulf Cartel recruited them from Mexico’s Special Operations Forces, known as Grupo Aeromóvil de ...fluid situation surrounding the Mexican drug war has led to much speculation about how to classify the powerful drug cartels conducting it. There is... conducting it. There is literature debating whether the cartels are merely a criminal enterprise or whether the cartels represent a new terrorist

  14. Playing the villain : understanding the punishment and portrayal of terrorists

    OpenAIRE

    Spens, Christiana

    2017-01-01

    Playing the Villain argues that the portrayal and punishment of terrorists in the Western media perpetuates colonialist attitudes, due to the visual connections between these modern images and past or fictional representations of iconic, punished villains. A theory of scapegoating related to intervisuality supports this argument, by explaining that as a ritual dependent on and developed by cultural history and mythology, scapegoating requires engagement with recognisable visual motifs that...

  15. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  16. Liquid Missile Fuels as Means of Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Superina, V.; Orehovec, Z.

    2007-01-01

    Modern world is faced with numerous terrorist attacks whose goals, methods and means of the conduct are various. It seems that we have entered the era when terrorism, one's own little terrorism, is the easiest and the most painless way of achieving a goal. That is why that such a situation has contributed to the necessity for strengthening individual and collective protection and safety, import and export control, control of the production and illegal sale of the potential means for delivering terrorist act. It has also contributed to the necessity for devising means of the delivery. For more than 10 years, a series of congresses on CB MTS Industry has pointed at chemicals and chemical industry as potential means and targets of terrorism. The specialization and experience of different authors in the field of the missile technology and missile fuels, especially those of Eastern origin, and the threat that was the reality of the war conflicts in 1990s was the reason for making a scientific and expert analysis of the liquid missile fuels as means of terrorism. There are not many experts in the field of NBC protection who are familiar with the toxicity and reaction of liquid missile fuels still lying discarded and unprotected in abandoned barracks all over Europe and Asia. The purpose of this paper is to draw public attention to possible different abuses of liquid missile fuels for a terrorist purpose, as well as to possible consequences and prevention measures against such abuses. (author)

  17. A data-stream classification system for investigating terrorist threats

    Science.gov (United States)

    Schulz, Alexia; Dettman, Joshua; Gottschalk, Jeffrey; Kotson, Michael; Vuksani, Era; Yu, Tamara

    2016-05-01

    The role of cyber forensics in criminal investigations has greatly increased in recent years due to the wealth of data that is collected and available to investigators. Physical forensics has also experienced a data volume and fidelity revolution due to advances in methods for DNA and trace evidence analysis. Key to extracting insight is the ability to correlate across multi-modal data, which depends critically on identifying a touch-point connecting the separate data streams. Separate data sources may be connected because they refer to the same individual, entity or event. In this paper we present a data source classification system tailored to facilitate the investigation of potential terrorist activity. This taxonomy is structured to illuminate the defining characteristics of a particular terrorist effort and designed to guide reporting to decision makers that is complete, concise, and evidence-based. The classification system has been validated and empirically utilized in the forensic analysis of a simulated terrorist activity. Next-generation analysts can use this schema to label and correlate across existing data streams, assess which critical information may be missing from the data, and identify options for collecting additional data streams to fill information gaps.

  18. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  19. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  20. Severe accidents and terrorist threats at nuclear reactors

    International Nuclear Information System (INIS)

    Pollack, G.L.

    1987-01-01

    Some of the key areas of uncertainty are the nature of the physical and chemical interactions of released fission products and of the interactions between a molten core and concrete, the completeness and validity of the computer codes used to predict accidents, and the behavior of the containment. Because of these and other uncertainties, it is not yet possible to reliably predict the consequences of reactor accidents. It is known that for many accident scenarios, especially less severe ones or where the containment is not seriously compromised, the amount of radioactive material expected to escape the reactor is less, even much less, than was previously calculated. For such accidents, the predictions are easier and more reliable. With severe accidents, however, there is considerable uncertainty as to the predicted results. For accidents of the type that terrorists might cause - for example, where the sequence of failure would be unexpected or where redundant safety features are caused to fail together - the uncertainties are still larger. The conclusion, then, is that there are potential dangers to the public from terrorist actions at a nuclear reactor; however, because of the variety of potential terrorist threats and the incompleteness of the knowledge about the behavior of reactor components and fission products during accidents, the consequences cannot yet be assessed quantitatively

  1. Can a Copycat Effect be Observed in Terrorist Suicide Attacks?

    Directory of Open Access Journals (Sweden)

    Nicholas Farnham

    2017-03-01

    Full Text Available The purpose of this paper is to explore how a copycat effect – established within the field of suicide studies – may manifest itself in terrorist suicide attacks, and takes an exploratory approach in evaluating the prospect of incorporating open-data resources in future counter-terrorism research. This paper explores a possible ‘copycat effect’ in cases of suicide terrorism, which entails a perpetrator being inspired by a preceding attack to carry out a similar attack not long after the original. In the wake of mounting risks of lone wolf terrorist attacks today and due to the general difficulties faced in preventing such attacks, in this paper we explore a potential area of future prevention in media reporting, security and anti-terrorism policies today. Using the START Global Terrorism Database (GTD, this paper investigates terrorist suicide-attack clusters and analyses the relationship between attacks found within the same cluster. Using a mixed-method approach, our analyses did not uncover clear evidence supporting a copycat effect among the studied attacks. These and other findings have numerous policy and future research implications.

  2. Impunity for International Terrorists? Key Legal Questions and Practical Considerations

    Directory of Open Access Journals (Sweden)

    Christophe Paulussen

    2012-04-01

    Full Text Available This Research Paper discusses several of the key questions related to the subject of impunity of international terrorists, taking both a fundamental and a more practical approach within the context of international law. First, it reflects on a number of core definitional and theoretical questions which have been pushed into the background of day‐to‐day reality, by the actual fight against terrorism. For instance: what does the concept of impunity entail exactly and which kinds of standards could be used in measuring impunity? Is it clear what falls under the header of international terrorism and can it in fact be argued that international terrorists enjoy impunity? In practical terms, the paper explores a number of questions related to the actual prosecution of terrorism. What are the obstacles that national prosecutors face every day when prosecuting suspects of international terrorism? To what extent does a rule that prima facie seems ideal to fight terrorism (aut dedere aut judicare: either extradite or prosecute apply to terrorist offences? And what is the role of international criminal law – and the international criminal tribunals – in fighting terrorism? The Paper concludes with a series of recommendations.

  3. Epidemiology, Clinical Characteristics, and Antimicrobial Susceptibility Profiles of Human Clinical Isolates of Staphylococcus intermedius Group.

    Science.gov (United States)

    Yarbrough, Melanie L; Lainhart, William; Burnham, C A

    2018-03-01

    The veterinary pathogens in the Staphylococcus intermedius group (SIG) are increasingly recognized as causes of human infection. Shared features between SIG and Staphylococcus aureus may result in the misidentification of SIG in human clinical cultures. This study examined the clinical and microbiological characteristics of isolates recovered at a tertiary-care academic medical center. From 2013 to 2015, 81 SIG isolates were recovered from 62 patients. Patients were commonly ≥50 years old, diabetic, and/or immunocompromised. Documentation of dog exposure in the electronic medical record was not common. Of the 81 SIG isolates, common sites of isolation included 37 (46%) isolates from wound cultures and 17 (21%) isolates from respiratory specimens. Although less common, 10 (12%) bloodstream infections were documented in 7 unique patients. The majority of SIG (65%) isolates were obtained from polymicrobial cultures. In comparison to S. aureus isolates from the same time period, significant differences were noted in proportion of SIG isolates that were susceptible to doxycycline (74% versus 97%, respectively; P SIG isolates. All MR isolates detected by an oxacillin disk diffusion test would have been misclassified as methicillin susceptible using a cefoxitin disk diffusion test. Thus, SIG is recovered from human clinical specimens, and distinction of SIG from S. aureus is critical for the accurate characterization of MR status in these isolates. Copyright © 2018 American Society for Microbiology.

  4. Refractory Research Group - U.S. DOE, Albany Research Center [Institution Profile

    Energy Technology Data Exchange (ETDEWEB)

    Bennett, James P.

    2004-09-01

    The refractory research group at the Albany Research Center (ARC) has a long history of conducting materials research within the U.S. Bureau of Mines, and more recently, within the U.S. Dept. of Energy. When under the U.S. Bureau of Mines, research was driven by national needs to develop substitute materials and to conserve raw materials. This mission was accomplished by improving refractory material properties and/or by recycling refractories using critical and strategic materials. Currently, as a U.S. Dept of Energy Fossil Energy field site, research is driven primarily by the need to assist DOE in meeting its vision to develop economically and environmentally viable technologies for the production of electricity from fossil fuels. Research at ARC impacts this vision by: • Providing information on the performance characteristics of materials being specified for the current generation of power systems; • Developing cost-effective, high performance materials for inclusion in the next generation of fossil power systems; and • Solving environmental emission and waste problems related to fossil energy systems. A brief history of past refractory research within the U.S. Bureau of Mines, the current refractory research at ARC, and the equipment and capabilities used to conduct refractory research at ARC will be discussed.

  5. Practising of radiological emergency caused by a terrorist attack

    International Nuclear Information System (INIS)

    Racana, R.; Terrado, C.

    2006-01-01

    After the events of September 11, 2001 terrorist working has become an important factor in the forecasts to adopt in the face of the possibility of confronting different radiological emergencies. The not wanted events of exposure to ionizing radiations can take place by flaws of systems or accidents, or also by criminal voluntary actions. These malevolent actions can include attacks or sabotages in nuclear plants, detonation of manufactured nuclear devices or acquired under ground, robbery of radioactive sources to manufacture the calls dirty bombs or to cause damage, panic or threats. In the scenarios in that the radiological emergency is voluntarily provoked the moment and place of the attack are chosen by the aggressors, therefore the ionizing radiations will be in not prepared atmospheres neither equipped to the effect. This increases the confusion, the panic and the damage not only caused by the radiation effects but also by the uncertainty and consequent reactions. To diminish the effects of this type of threats it is necessary to make forecasts and to train the personnel that it can be direct or indirectly involved. During 2005, an exercise in which it was outlined the robbery by part of a group command of a source of Co 60 of 5000 Ci that it was transported to make a decanting in a medical center of The Pampa county, Argentina. It was about a cabinet exercise, planned and executed jointly among the Nuclear Regulatory Authority and the Secretary of Interior Safety, in which participated the professionals of the nuclear area that by law are the responsible ones of coordinating the actions in the event of an emergency of this type, and the safety forces that depend of the Secretary of Interior Safety, Federal and Provincial Policemen, Naval Prefecture and National Gendarmerie. The exercise last one day during which 9 main situations were approached that were unchained after having produced the attack and initial robbery. For each situation it was checked the

  6. Information Operations in Pursuit of Terrorists

    Science.gov (United States)

    2007-09-01

    affairs in secrecy.” It was said in the proverbs, "The hearts of freemen are the tombs of secrets" and "Moslems’ secrecy is faithfulness, and talking...and prepare for new attacks.299 In May 2007, Al Qaeda named an Egyptian , Mustafa Ahmed Muhammad Uthman Abu al-Yazid, as the group’s leader for

  7. Terrorists on Trial: A Performative Perspective

    NARCIS (Netherlands)

    de Graaf, B.A.

    On 30 March 2011, ICCT – The Hague organised an Expert Meeting entitled ‘Terrorism Trials as Theatre: A Performative Perspective’. The Expert Meeting applied a performative perspective to three well known and recent trials in different parts of the world: the trials against the Dutch Hofstad Group,

  8. MTL genotypes, phenotypic switching, and susceptibility profiles of Candida parapsilosis species group compared to Lodderomyces elongisporus.

    Directory of Open Access Journals (Sweden)

    Aylin Döğen

    Full Text Available Reference isolates of Candida parapsilosis (n = 8, Candida metapsilosis (n = 6, Candida orthopsilosis (n = 7, and Lodderomyces elongisporus (n = 11 were analyzed to gain insight into their pathobiology and virulence mechanisms. Initial evaluation using BBL Chromagar Candida medium misidentified L. elongisporus isolates as C. albicans. Polymerase chain reaction analysis of isolate MTL idiomorphs revealed that all C. parapsilosis isolates were MTLa homozygous and no MTL α1, α2, a1, or a2 gene was detected in L. elongisporus isolates. For C. orthopsilosis, two isolates were MTLa homozygous and five were MTL-heterozygous. Similarly, one C. metapsilosis isolate was MTLα homozygous whereas five were MTL-heterozygous. Isolate phenotypic switching analysis revealed potential phenotypic switching in the MTLα homozygous C. metapsilosis isolate, resulting in concomitant elongated cell formation. Minimum inhibitory concentrations of fluconazole (FLC and FK506, alone or in combination, were determined by checkerboard assay, with data analyzed using the fractional inhibitory concentration index model. Synergistic or additive effects of these compounds were commonly observed in C. parapsilosis and L. elongisporus isolates. No killer activity was observed in the studied isolates, as determined phenotypically. No significant difference in virulence was seen for the four species in a Galleria mellonella model (P > 0.05. In conclusion, our results demonstrated phenotypic switching of C. metapsilosis CBS 2315 and that FLC and FK506 represent a promising drug combination against C. parapsilosis and L. elongisporus. The findings of the present study contribute to our understanding of the biology, diagnosis, and new possible treatments of the C. parapsilosis species group and L. elongisporus.

  9. The Representation of Islam in Western Media: The Coverage of Norway Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Emad A. Alghamdi

    2015-05-01

    Full Text Available Undeniably mass media have become the primary source of information and communication for the majority of, if not all, members of modern societies. The nature of the information thus communicated and the manner in which it is dispensed through media certainly have a profound influence on people’s perceptions of the world around them. The relation between the media, on one hand, and culture, social life, and politics on the other, is an interesting one in which media fulfills dual functions, reflecting and also shaping issues occurring within these three domains (Bell & Garrett, 1998. In the initial media coverage of the 2011 Norway terrorist attacks, some western media authors, inaccurately and unjustly, held Muslims and Islamic groups as being responsible for the attacks. Using Critical Discourse Analysis (CDA, this study seeks to ascertain how language was manipulated in this coverage of the terrorist attacks in order to give expression to blind prejudice against Islam and Muslims. As findings of the analyses reveal, the tones of allegation in these articles and reports differed dramatically from one article to another ranging from tones of mere suspicion to those of overt accusation. The varying degrees of uncertainty or assertion of the authors’ statements were reflected in the varied linguistic forms and devices used within the discourse.

  10. Extremist Ideological Influence on Terrorist Decision Frameworks

    Science.gov (United States)

    2012-05-11

    culture in terms of lists of domain-general, stable traits, such as individualist - collectivist value orientations li7J Researchers operating within this...Estabrooke, ONR Code 30 14. ABSTRACT Two cultural studies were conducted to clarify the ideological characteristics that serve as enablers for...rich source of cultural information that provides important clues as to the beliefs, attitudes and values of group members. Documents and postings from

  11. Third Party Involvement in International Terrorist Extortion

    Science.gov (United States)

    1976-03-01

    wide audience to view the event . Because publicity is considered to be among the primary purposes of terrorism, a scale for measuring publicity was...with Palestineans, rank among the top four groups in total publicity generated. Their activities not only shocked their world-wide audience , but also...907 McKee-Tesca Company Saf rar-Peugeot Pepsi -Cola 902 903 904 908 909 9-*-0 Mercedes Benz Motor Company 911 912 913 914 Northwest Airlines Braniff

  12. Distinct genotype distribution and haplotype profiles in MDR1 gene among Chinese Han, Bai, Wa and Tibetan ethnic groups.

    Science.gov (United States)

    Lai, Yong; Huang, Min; Li, Hui; Wang, Xue-Ding; Li, Jia-Li

    2012-11-01

    P-Glycoprotein (P-gp, encoded by MDR1 gene) plays an important role in determining bioavailability and pharmacologic effects of many drugs. There is increasing evidence that P-gp activity may be genetically determined. In this study, we investigated the genotype distribution and the haplotype profiles of MDR1 gene in Chinese Han, Bai, Wa and Tibetan subjects. Much lower frequencies of the 1236T allele and the 2677T allele were found in Wa subjects than those in other three ethnic groups, while the 2677A allele was found about 6-fold more frequently in Han subjects than in subjects of other three ethnic groups. The Han, Bai and Tibetan subjects share the same three predominant haplotypes (T-T-T, T-G-C and C-G-C), and T-T-T is the highest and accounts for more than one third of the number of haplotypes in the subjects from each ethnic group. However, T-T-T was less common than T-G-C, T-G-T and C-G-C and occurring at only 13.8% in Wa subjects, furthermore, higher frequencies of T-G-T, C-T-C, C-G-T and C-T-T were observed in Wa subjects compared to those in other three ethnic groups. Frequencies of C-A-C and T-A-C in Han subjects were higher than those in other three ethnic groups. The findings of this study will be of some relevance in predicting MDR1 phenotype and pharmacokinetics as well as pharmacodynamic effects of many commonly used drugs that are P-gp substrates in these four Chinese ethnic groups.

  13. Distribution of rare-earth (Y, La, Ce) and other heavy metals in the profiles of the podzolic soil group

    Science.gov (United States)

    Vodyanitskii, Yu. N.; Goryachkin, S. V.; Savichev, A. T.

    2011-05-01

    Along with Fe and Al, many heavy metals (Mn, Cr, Zn, Cu, and Ni) show a markedly pronounced eluvial-illuvial redistribution in the profiles of soils of the podzolic group. The intensity of the redistribution of the bulk forms of these metals is comparable with that of Fe and exceeds that of Al. Although the podzolic soils are depleted of rare-earth metals, the latter respond readily to soil podzolization. The inactive participation of Al is explained by an insignificant portion of the active reaction-capable fraction. Podzolization does not influence the profile distribution of Sr and Ba. The leaching degree of heavy metals such as Mn, Cr, Zn, Ni, and Zr is noticeably higher in the sandy podzols than in the loamy podzolic soils. Leaching of heavy metals from the podzolic horizons is of geochemical importance, whereas the depletion of metals participating in plant nutrition and biota development is of ecological importance. The leaching of heavy metals is related to the destruction of clay particles in the heavy-textured podzolic soils; the effect of the soil acidity on the leaching of heavy metals is less significant.

  14. BACTERIAL PROFILES FOR CHRONIC AND AGGRESSIVE PERIODONTITIS IN A SAMPLE POPULATION GROUP. A CROSS-SECTIONAL STUDY

    Directory of Open Access Journals (Sweden)

    Alexandra-Cornelia TEODORESCU

    2017-06-01

    Full Text Available Aim. The study aims at determining some possible significant differences in the subgingival microbial profiles of patients with generalized chronic periodontitis (GCP and generalized aggressive periodontitis (GAP, as a tool in helping with differential diagnostic. Materials and methods. 20 subgingival fluid samples (10 from GAP and 10 from GCP patients were subjected to a Real-Time Polymerase Chain Reaction technique in order to determine the prevalence and the counts of 9 periodontal pathogens (Aggregatibacter actinomycetemcomitans, Porphyromonas gingivalis, Treponema denticola, Tanerella forsythia, Prevotella intermedia, Peptostreptococcus micros, Fusobacterium nucleatum, Eubacterium nodatum and Capnocytophaga gingivalis. Results and discussion. Fusobacterium nucleatum was singnificantly correlated with the aggressive periodontitis group, but no significant differences were found for the other 8 periodontal bacteria. Conclusions. The prevalence or count of some periodontal pathogens could help clinicians make an easier differential diagnostic between GCP and GAP, however further studies, conducted on larger population samples, are still needed.

  15. Evolutionary Profiling of Group II Pyridoxal-Phosphate-Dependent Decarboxylases Suggests Expansion and Functional Diversification of Histidine Decarboxylases in Tomato

    Directory of Open Access Journals (Sweden)

    Rahul Kumar

    2016-03-01

    Full Text Available Pyridoxal phosphate (PLP-dependent enzymes are one of the most important enzymes involved in plant N metabolism. Here, we explored the evolution of group II PLP-dependent decarboxylases (PLP_deC, including aromatic L-amino acid decarboxylase, glutamate decarboxylase, and histidine decarboxylase in the plant lineage. Gene identification analysis revealed a higher number of genes encoding PLP_deC in higher plants than in lower plants. Expression profiling of PLP_deC orthologs and syntelogs in (L. Heynh., pepper ( L., and tomato ( L. pointed toward conserved as well as distinct roles in developmental processes such as fruit maturation and ripening and abiotic stress responses. We further characterized a putative promoter of tomato ripening-associated gene ( operating in a complex regulatory circuit. Our analysis provides a firm basis for further in-depth exploration of the PLP_deC gene family, particularly in the economically important Solanaceae family.

  16. Anti-money laundering and counter-terrorist financing in the Luxembourg investment fund market

    OpenAIRE

    Dietz, Andrea

    2017-01-01

    The field of Anti-Money Laundering and Counter-Terrorist Financing in their current form have had an important impact on the financial world for almost half a century. Today, Money Laundering and Terrorist Financing pose a threat to the integrity of the financial markets and systems worldwide. The intention behind implementing a regulatory Anti-Money Laundering and Counter-Terrorist Financing framework is to cut off the financial resources of criminals and to follow back the traces that finan...

  17. The Next Terrorist Attack: Not If, But When...Are We Prepared?

    National Research Council Canada - National Science Library

    Lynch, David

    2004-01-01

    .... Since lessons learned from past attacks call attention to the terrorists' ability to overcome military defenses, the importance of well-developed, exercised response plans cannot be overstated...

  18. Change and Continuity in Indonesian Islamist Ideology and Terrorist Strategies

    Directory of Open Access Journals (Sweden)

    Adam James Fenton

    2015-04-01

    Full Text Available The “Islamisation” of Indonesia has exerted a transformative force on every aspect of Indonesian society. That process continues today. It has created streams of change and continuity in thoughts, ideologies and practices, of enormous complexity. Strict doctrinal interpretation of Koranic text is not a new phenomenon, contrary to what some reports in the mass media might suggest. Its roots stretch back at least as far as the 1800s with the outbreak of violent conflicts between those urging a stricter, scripturalist application of Islam, and those adhering to traditionalist and colonialist ideologies --culminating in the Padri war of West Sumatra of 1821-38. Indicating an ostensible continuity of ideology, modern extremist ideologues, such as Abu Bakar Bashir, urge their followers toward violent conflict and terrorist actions based on an ideology of strict “Middle Eastern” interpretation of fundamental Islamic tenets. This paper argues that the strategies of those carrying out radical and violent ideologies are undergoing change, as are the strategies of the authorities tasked with combating them. Radical groups have displayed a shift away from large-scale, attacks on symbolic foreign targets towards low-level violence primarily aimed at law enforcement authorities. Authorities, on the other hand, have shown a greater tendency to shoot dead those suspected of involvement with violent radical groups. This paper will examine the changing strategies of violent radical groups and the continuity, and evolution, of the underlying Islamic ideology that provides religious justification for their violent acts. The paper will argue that engaging Indonesia’s politically active youth in an ideological dialogue on Islamism and democracy provides the best prospect for disengagement from, and breaking the cycle of recruitment for, radical violence and terrorism.[Proses panjang Islamisasi di Indonesia telah menghasilkan kekuatan transformatif di

  19. Protein array profiling of tic patient sera reveals a broad range and enhanced immune response against Group A Streptococcus antigens.

    Directory of Open Access Journals (Sweden)

    Mauro Bombaci

    Full Text Available The human pathogen Group A Streptococcus (Streptococcus pyogenes, GAS is widely recognized as a major cause of common pharyngitis as well as of severe invasive diseases and non-suppurative sequelae associated with the existence of GAS antigens eliciting host autoantibodies. It has been proposed that a subset of paediatric disorders characterized by tics and obsessive-compulsive symptoms would exacerbate in association with relapses of GAS-associated pharyngitis. This hypothesis is however still controversial. In the attempt to shed light on the contribution of GAS infections to the onset of neuropsychiatric or behavioral disorders affecting as many as 3% of children and adolescents, we tested the antibody response of tic patient sera to a representative panel of GAS antigens. In particular, 102 recombinant proteins were spotted on nitrocellulose-coated glass slides and probed against 61 sera collected from young patients with typical tic neuropsychiatric symptoms but with no overt GAS infection. Sera from 35 children with neither tic disorder nor overt GAS infection were also analyzed. The protein recognition patterns of these two sera groups were compared with those obtained using 239 sera from children with GAS-associated pharyngitis. This comparative analysis identified 25 antigens recognized by sera of the three patient groups and 21 antigens recognized by tic and pharyngitis sera, but poorly or not recognized by sera from children without tic. Interestingly, these antigens appeared to be, in quantitative terms, more immunogenic in tic than in pharyngitis patients. Additionally, a third group of antigens appeared to be preferentially and specifically recognized by tic sera. These findings provide the first evidence that tic patient sera exhibit immunological profiles typical of individuals who elicited a broad, specific and strong immune response against GAS. This may be relevant in the context of one of the hypothesis proposing that GAS

  20. Metabolic profile in two physically active Inuit groups consuming either a western or a traditional Inuit diet

    Directory of Open Access Journals (Sweden)

    Thor Munch-Andersen

    2012-03-01

    Full Text Available Objectives: To evaluate the effect of regular physical activity on metabolic risk factors and blood pressure in Inuit with high BMI consuming a western diet (high amount of saturated fatty acids and carbohydrates with a high glycemic index. Study design: Cross sectional study, comparing Inuit eating a western diet with Inuit eating a traditional diet. Methods: Two physically active Greenland Inuit groups consuming different diet, 20 eating a traditional diet (Qaanaaq and 15 eating a western diet (TAB, age (mean (range; 38, (22–58 yrs, BMI; 28 (20–40 were subjected to an oral glucose tolerance test (OGTT, blood sampling, maximal oxygen uptake test, food interview/collection and monitoring of physical activity. Results: All Inuit had a normal OGTT. Fasting glucose (mmol/l, HbA1c (%, total cholesterol (mmol/l and HDL-C (mmol/l were for Qaanaaq women: 4.8±0.2, 5.3±0.1, 4.96±0.42, 1.34±0.06, for Qaanaaq men: 4.9±0.1, 5.7±0.1, 5.08±0.31, 1.28±0.09, for TAB women: 5.1±0.2, 5.3±0.1, 6.22±0.39, 1.86±0.13, for TAB men: 5.1±0.2, 5.3±0.1, 6.23±0.15, 1.60±0.10. No differences were found in systolic or diastolic blood pressure between the groups. There was a more adverse distribution of small dense LDL-C particles and higher total cholesterol and HDL-C concentration in the western diet group. Conclusions: Diabetes or impaired glucose tolerance was not found in the Inuit consuming either the western or the traditional diet, and this could, at least partly, be due to the high amount of regular daily physical activity. However, when considering the total cardio vascular risk profile the Inuit consuming a western diet had a less healthy profile than the Inuit consuming a traditional diet.

  1. Metabolic profile in two physically active Inuit groups consuming either a western or a traditional Inuit diet.

    Science.gov (United States)

    Munch-Andersen, Thor; Olsen, David B; Søndergaard, Hans; Daugaard, Jens R; Bysted, Anette; Christensen, Dirk L; Saltin, Bengt; Helge, Jørn W

    2012-03-19

    To evaluate the effect of regular physical activity on metabolic risk factors and blood pressure in Inuit with high BMI consuming a western diet (high amount of saturated fatty acids and carbohydrates with a high glycemic index). Cross sectional study, comparing Inuit eating a western diet with Inuit eating a traditional diet. Two physically active Greenland Inuit groups consuming different diet, 20 eating a traditional diet (Qaanaaq) and 15 eating a western diet (TAB), age (mean (range)); 38, (22-58) yrs, BMI; 28 (20-40) were subjected to an oral glucose tolerance test (OGTT), blood sampling, maximal oxygen uptake test, food interview/collection and monitoring of physical activity. All Inuit had a normal OGTT. Fasting glucose (mmol/l), HbA1c (%), total cholesterol (mmol/l) and HDL-C (mmol/l) were for Qaanaaq women: 4.8±0.2, 5.3±0.1, 4.96±0.42, 1.34±0.06, for Qaanaaq men: 4.9±0.1, 5.7±0.1, 5.08±0.31, 1.28±0.09, for TAB women: 5.1±0.2, 5.3±0.1, 6.22±0.39, 1.86±0.13, for TAB men: 5.1±0.2, 5.3±0.1, 6.23±0.15, 1.60±0.10. No differences were found in systolic or diastolic blood pressure between the groups. There was a more adverse distribution of small dense LDL-C particles and higher total cholesterol and HDL-C concentration in the western diet group. Diabetes or impaired glucose tolerance was not found in the Inuit consuming either the western or the traditional diet, and this could, at least partly, be due to the high amount of regular daily physical activity. However, when considering the total cardio vascular risk profile the Inuit consuming a western diet had a less healthy profile than the Inuit consuming a traditional diet.

  2. Epidemiological Profile and Risk Factors for Acquiring HBV and/or HCV in HIV-Infected Population Groups in Nepal.

    Science.gov (United States)

    Bhattarai, Manjula; Baniya, Jagat Bahadur; Aryal, Nirmal; Shrestha, Bimal; Rauniyar, Ramanuj; Adhikari, Anurag; Koirala, Pratik; Oli, Pardip Kumar; Pandit, Ram Deo; Stein, David A; Gupta, Birendra Prasad

    2018-01-01

    HBV and HCV infections are widespread among the HIV-infected individuals in Nepal. The goals of this study were to investigate the epidemiological profile and risk factors for acquiring HBV and/or HCV coinfection in disadvantaged HIV-positive population groups in Nepal. We conducted a retrospective study on blood samples from HIV-positive patients from the National Public Health Laboratory at Kathmandu to assay for HBsAg, HBeAg, and anti-HCV antibodies, HIV viral load, and CD4+ T cell count. Among 579 subjects, the prevalence of HIV-HBV, HIV-HCV, and HIV-HBV-HCV coinfections was 3.62%, 2.93%, and 0.34%, respectively. Multivariate regression analysis indicated that spouses of HIV-positive migrant labourers were at significant risk for coinfection with HBV infection, and an age of >40 years in HIV-infected individuals was identified as a significant risk factor for HCV coinfection. Overall our study indicates that disadvantaged population groups such as intravenous drug users, migrant workers and their spouses, female sex workers, and men who have sex with HIV-infected men are at a high and persistent risk of acquiring viral hepatitis. We conclude that Nepalese HIV patients should receive HBV and HCV diagnostic screening on a regular basis.

  3. Suits Against Terrorist States by Victims of Terrorism

    Science.gov (United States)

    2008-05-01

    Nat’l City Bank v. Banco Para El Comercio Exterior de Cuba, 462 U.S. 611 (1983) (“Bancec”) to judgments against designated terrorist States. Bancec held...to determine both whether an exception to the Cuban Government’s immunity from garnishment also applies to [ Empresa de Telecomunicaciones de Cuba, S.A...was eventually reversed on other grounds by the U.S. Court of Appeals for the Eleventh Circuit — Alejandre v. Telefonica Larga Distancia de Puerto Rico

  4. Cultural Memory of Sorrow in Advertising after the Terrorist Attacks

    Directory of Open Access Journals (Sweden)

    Esther Martínez Pastor

    2015-09-01

    Full Text Available The general objective of this research study is to do a comparative research to investigate the perception of sorrow in the advertising in the press after the terrorist attacks: 11/09/2001 (U.S. and 11/04/2004 (Spain. The general hypothesis considers that there are similar perceptions of the sorrow towards the ads although there are cultural differences. On a computer program the subject was shown these images about announcement advertisement published in the press after the 09/11 and 11/04 in a random order and was asked different questions that explored their perception and attitudes with regard to these advertisements

  5. Neurodevelopmental Expression Profile of Dimeric and Monomeric Group 1 mGluRs: Relevance to Schizophrenia Pathogenesis and Treatment.

    Science.gov (United States)

    Lum, Jeremy S; Fernandez, Francesca; Matosin, Natalie; Andrews, Jessica L; Huang, Xu-Feng; Ooi, Lezanne; Newell, Kelly A

    2016-10-10

    Group 1 metabotropic glutamate receptors (mGluR1/mGluR5) play an integral role in neurodevelopment and are implicated in psychiatric disorders, such as schizophrenia. mGluR1 and mGluR5 are expressed as homodimers, which is important for their functionality and pharmacology. We examined the protein expression of dimeric and monomeric mGluR1α and mGluR5 in the prefrontal cortex (PFC) and hippocampus throughout development (juvenile/adolescence/adulthood) and in the perinatal phencyclidine (PCP) model of schizophrenia. Under control conditions, mGluR1α dimer expression increased between juvenile and adolescence (209-328%), while monomeric levels remained consistent. Dimeric mGluR5 was steadily expressed across all time points; monomeric mGluR5 was present in juveniles, dramatically declining at adolescence and adulthood (-97-99%). The mGluR regulators, Homer 1b/c and Norbin, significantly increased with age in the PFC and hippocampus. Perinatal PCP treatment significantly increased juvenile dimeric mGluR5 levels in the PFC and hippocampus (37-50%) but decreased hippocampal mGluR1α (-50-56%). Perinatal PCP treatment also reduced mGluR1α dimer levels in the PFC at adulthood (-31%). These results suggest that Group 1 mGluRs have distinct dimeric and monomeric neurodevelopmental patterns, which may impact their pharmacological profiles at specific ages. Perinatal PCP treatment disrupted the early expression of Group 1 mGluRs which may underlie neurodevelopmental alterations observed in this model.

  6. Mucosal Blood Group Antigen Expression Profiles and HIV Infections: A Study among Female Sex Workers in Kenya.

    Directory of Open Access Journals (Sweden)

    Nadia Musimbi Chanzu

    Full Text Available The ABO blood group antigens are carbohydrate moieties expressed on human red blood cells however; these antigens can also be expressed on some other cells particularly the surface of epithelial cells and may be found in mucosal secretions. In many human populations 80% secrete ABO antigens (termed 'secretors' while 20% do not (termed 'non-secretors'. Furthermore, there are disease conditions that are associated with secretor status.To investigate correlations between secretor status and HIV infection among female sex workers in Nairobi, Kenya.This cross-sectional study recruited 280 female sex workers aged 18-65 years from the Pumwani Majengo cohort, Kenya. Blood typing was determined by serological techniques using monoclonal antibodies to the ABO blood group antigens. Secretor phenotyping was determined using anti-H specific lectins specific to salivary, vaginal and cervical blood group H antigen using the agglutination inhibition technique and correlated to individual HIV sero-status. Participants were additionally screened for Bacterial vaginosis, Neisseria gonorrhoea and Trichomonas vaginalis.Out of the 280 participants, 212 (75.7% were secretors and 68 (24.3% were non-secretors. The incidence of all infections: HIV, Bacterial vaginosis, Neisseria gonorrhoea and Trichomonas vaginalis was higher among secretors compared to non-secretors. However, this difference was only statistically significant for HIV infection incidence rates: HIV infected secretors (83.7% versus HIV un-infected secretors (71.8% (p = 0.029 Based on ABO phenotype stratification, the incidence of HIV infection was higher among blood group A secretors (26/52 = 50%, in comparison to B (12/39 = 33.3%: p = 0.066, AB (3/9 = 33.3%: p = 0.355, and O secretors (36/112 = 32.1%: p = 0.028.This is the first report to document the variable expression of the ABH blood group antigens profiling secretor and non-secretor phenotypes in the female genital tract among a high-risk population

  7. Identifying foreign terrorist fighters: The Role of Public-Private Partnership, Information Sharing and Financial Intelligence

    Directory of Open Access Journals (Sweden)

    Tom Keatinge

    2015-07-01

    Full Text Available Since 9/11, financial institutions have found themselves placed squarely on the front line of efforts to combat terrorism: countering terrorist financing has been a core element of the global counter-terrorism architecture since President George W Bush signed Executive Order 13224 promising to starve terrorists of funding. Financial institutions have played valuable “post-event” forensic roles, but despite the apparently immense troves of data they hold, their effective involvement in the identification and disruption of terrorist intentions or activity remains elusive. With global authorities consumed with the mushrooming growth of “foreign terrorist fighters” (FTFs, it seems timely to revisit the question of how financial institutions can play a more preventative role in countering terrorist threats. As the intergovernmental Financial Action Task Force (FATF noted recently, “greater domestic cooperation among AML/CFT [anti-money laundering and countering the financing of terrorism] bodies and other authorities” is needed to tackle funding of FTFs. Banks must play a key role in the development of this architecture. The issue of FTFs flowing to and from the conflict in Syria is likely to shape the international security agenda for the foreseeable future. Identifying citizens who have joined terrorist groups in Syria and Iraq pose a threat to the UK. The UK is certainly not alone in Europe in facing this threat. Evidence suggests these fears are now being realised. Both the scale of the issue in the context of the Syrian conflict and the speed with which the numbers have risen have caught international security authorities off guard, which – it would seem – have only belatedly appreciated the magnitude of the challenge. Whilst there has been much discussion and debate about who these travelling fighters are, their motivations, and the threats they pose, the majority of this analysis has focused on the role of social media in this

  8. Scientific Support of Terrorist Actions by Commercial Grey Area Literature

    International Nuclear Information System (INIS)

    Katzung, W.

    2007-01-01

    The publication of the Al-Quaida handbook and time and time again notes of the possibility for getting special scientific knowledge from the internet have decreased the attention for an other important source of scientific support for terrorist education and/or actions. This is the commercial available and distributed grey area literature provided by a huge amount of (book) sellers and publishing houses. Most of this literature (hard copies and CDs) with dangerous subject matter is published in the US and may be ordered fast and with low costs using the internet. This kind of support for real and potential terrorists stands strongly in contradiction to the official policy and the 'unconditional' war against terrorism. With the presented poster the above described problem should be a little bit put in the focus of the CBMTS community and so to the authorities, too. By means of selected examples from different branches, such as Narcotics, Explosives, unusual Killing Methods, special Poisons / Toxins and, last not least, CW agents inclusive application methods and devices the highly charged situation is tried to shown. (author)

  9. Media participation and mental health in terrorist attack survivors.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Dyb, Grete

    2014-12-01

    Terrorism and disasters receive massive media attention, and victims are often approached by reporters. Not much is known about how terror and disaster victims perceive the contact with media and whether such experiences influence mental health. In this study, we describe how positive and negative experiences with media relate to posttraumatic stress (PTS) reactions among survivors of the 2011 Utøya Island terrorist attack in Norway. Face-to-face interviews were conducted with 285 survivors (47.0% female and 53.0% male) 14-15 months after the terrorist attack. Most survivors were approached by reporters (94%), and participated in media interviews (88%). The majority of survivors evaluated their media contact and participation as positive, and media participation was unrelated to PTS reactions. Survivors who found media participation distressing had more PTS reactions (quite distressing: B = 0.440, extremely distressing: B = 0.611, p = .004 in adjusted model). Perceiving media participation as distressing was slightly associated with lower levels of social support (r = -.16, p = .013), and regretting media participation was slightly associated with feeling let down (r = .18, p = .004). Reporters should take care when interviewing victims, and clinicians should be aware of media exposure as a potential additional strain on victims. Copyright © 2014 International Society for Traumatic Stress Studies.

  10. TePiTri : a screening method for assessing terrorist-related pipeline transport risks

    NARCIS (Netherlands)

    Reniers, G.; Dullaert, W.E.H.

    2012-01-01

    The article proposes an approach to determine relative terrorist-related security risk levels of pipeline transportation. Pipeline routes are divided into smaller route segments. Subsequently, likelihood scores of possible terrorist-related incidents are determined per route segment and per

  11. Game Theoretic Centrality Analysis of Terrorist Networks : The Cases of Jemaah Islamiyah and Al Qaeda

    NARCIS (Netherlands)

    Lindelauf, R.; Hamers, H.J.M.; Husslage, B.G.M.

    2011-01-01

    The identification of key players in a terrorist network can lead to prevention of attacks, due to efficient allocation of surveillance means or isolation of key players in order to destabilize the network. In this paper we introduce a game theoretic approach to identify key players in terrorist

  12. Training, SEVIS, and NSEERS: Will They Stop Terrorists from Entering the U.S

    National Research Council Canada - National Science Library

    Bugarin, Darwina S

    2007-01-01

    .... Stopping their entry is key to preventing attacks. The 9/11 Commission's Staff Report of the National Commission on Terrorist Attacks Upon the United States, 9/11 and Terrorist Travel, identified pre-9/11 gaps/weaknesses in U.S...

  13. The meaning of collective terrorist threat : Understanding the subjective causes of terrorism reduces its negative psychological impact

    NARCIS (Netherlands)

    Fischer, Peter; Postmes, Tom; Koeppl, Julia; Conway, Lianne; Fredriksson, Tom

    This article hypothesized that the possibility to construct intellectual meaning of a terrorist attack (i.e., whether participants can cognitively understand why the perpetrators did their crime) reduces the negative psychological consequences typically associated with increased terrorist threat.

  14. Amino Acid Profile, Group of Functional and Molecular Weight Distribution of Goat Skin Gelatin That Produced Through Acid Process

    Directory of Open Access Journals (Sweden)

    Muhammad Irfan Said

    2012-02-01

    Full Text Available Gelatin is a product of hydrolysis of collagen protein from animals that are partially processed.  Gelatin used in food and non food industries.  Gelatin is produced when many import of raw skins and bones of pigs and cows.  Goat skins potential as a raw material substitution that still doubt its halal. Process production of gelatin determine the properties of gelatin. The objectives of this research were to determine amino acid profile, group of functional and molecular weight distribution of gelatin made from goat skins which was produced through a process of acid. The skin of male Bligon goat, 1.5 to 2.5 year old was used as raw materials. Process production of gelatin was using acid type acetic acid (CH3COOH 0.5 M (v/v as curing material. The experimental design applied in this study and commercial gelatin was used as control. The results showed that gelatin produced from goat skin through the process of acid had properties identical with commercial gelatin. It can be concluded that the gelatin has the potential substitute product of commercial gelatin. Keywords: collagen, gelatin, goat skin, curing, acid process

  15. Islamic State and Its Attitude to the Terrorist Attacks on the Energy Sector

    Directory of Open Access Journals (Sweden)

    Lukáš Tichý

    2016-06-01

    Full Text Available The main aim of this article is both to analyze the importance of the terrorist attacks on energy infrastructure and industry for strategy of militant terrorist organization Islamic State against the background of the influence of Islam and to describe a specific example and manifestations of the terrorist activities focused on energy sector in the Middle East and North Africa. In the theoretical level, the article is based on the concept of terrorist attack on energy sector and relation between energy and Sunni Islam. In methodological level, the article is based on the case study method framing terrorist attacks of Islamic State on energy industry and infrastructure in Iraq, Syria and Libya.

  16. The alliance relationship analysis of international terrorist organizations with link prediction

    Science.gov (United States)

    Fang, Ling; Fang, Haiyang; Tian, Yanfang; Yang, Tinghong; Zhao, Jing

    2017-09-01

    Terrorism is a huge public hazard of the international community. Alliances of terrorist organizations may cause more serious threat to national security and world peace. Understanding alliances between global terrorist organizations will facilitate more effective anti-terrorism collaboration between governments. Based on publicly available data, this study constructed a alliance network between terrorist organizations and analyzed the alliance relationships with link prediction. We proposed a novel index based on optimal weighted fusion of six similarity indices, in which the optimal weight is calculated by genetic algorithm. Our experimental results showed that this algorithm could achieve better results on the networks than other algorithms. Using this method, we successfully digged out 21 real terrorist organizations alliance from current data. Our experiment shows that this approach used for terrorist organizations alliance mining is effective and this study is expected to benefit the form of a more powerful anti-terrorism strategy.

  17. "Evita Una Muerte, Esta en Tus Manos" Program: Bystander First Aid Training for Terrorist Attacks.

    Science.gov (United States)

    Pajuelo Castro, J J; Meneses Pardo, J C; Salinas Casado, P L; Hernandez Martin, P; Montilla Canet, R; Del Campo Cuesta, J L; Incera Bustio, G; Martin Ayuso, D

    The latest terrorist attacks in Europe and in the rest of the world, and the military experience in the most recent conflicts leave us with several lessons learned. The most important is that the fate of the wounded rests in the hands of the one who applies the first dressing, because the victims usually die within the first 10 minutes, before professional care providers or police personnel arrive at the scene. A second lesson is that the primary cause of preventable death in these types of incidents involving explosives and firearms is massive hemorraghe. There is a need to develop a training oriented to citizens so they can identify and use available resources to avoid preventable deaths that occur in this kind of incidents, especially massive hemorrhage. A 7-hour training intervention program was developed and conducted between January and May 2017. Data were collected from participants' answers on a multiple-choice test before and after undertaking the training. Improved mean score for at least 75% of a group's members on the posttraining test was considered reflective of adequate knowledge. A total of 173 participants (n = 74 men [42.8%]; n = 99 women [57.2%]) attended the training. They were classified into three groups: a group of citizens/ first responders with no prior health training, a group of health professionals, and a group of nursing students. Significant differences (ρ first responders group. 2017.

  18. Remediation following a CBRN terrorist attack : domestic and international perspectives

    Energy Technology Data Exchange (ETDEWEB)

    Yanofsky, N. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    The risks of chemical, biological and radiological/nuclear (CBRN) agents in terrorist attacks is well recognized. Serious measures must be in place to respond to terrorist attacks that involve these agents, including cleanup of affected buildings, machinery, land, water and air. This paper describes what is expected from the science community in the development of adequate, reliable and economical decontamination methods and equipment. It also discusses improved detection methods and adequate personal protection. Cleanup after a terrorist attack has much in common with the cleanup of contaminated sites or dealing with the consequences of industrial accidents, particularly as most potential chemical terror agents are represented by toxic industrial chemicals. The major needs of organizations involved in cleanup procedures were reviewed. Issues concerning first responders, assessment of situations, information collecting and the detection of possible chemical, biological and radiological agents were discussed. The development of generic decontamination procedures and equipment was suggested, with reference to the fact that the spectrum of CBRN weapons is very broad. In addition, the development of detection systems and instruments capable of analyzing a broad range of agents was also seen as desirable. New generation instruments such as Toxic Industrial Materials (TIMs) detectors were reviewed. Guidelines for cleanup procedures and remediation efforts were examined. It was also noted that there is relatively little information available to predict the behaviour of potential agents of CBRN terrorism in a complex urban environment. By studying different complex threat scenarios, scientists, first responders and other parties can achieve a better understanding of how to optimize the deployment of their resources. Mechanical, physiochemical and biological methods of decontamination were evaluated. Issues concerning waste disposal were discussed. It was noted that the

  19. Seasonal profiles of malaria infection, anaemia, and bednet use among age groups and communities in northern Ghana.

    Science.gov (United States)

    Koram, Kwadwo A; Owusu-Agyei, Seth; Fryauff, David J; Anto, Francis; Atuguba, Frank; Hodgson, Abraham; Hoffman, Stephen L; Nkrumah, Francis K

    2003-09-01

    We conducted all-age point prevalence surveys to profile the severity and seasonality of malaria and anaemia in Kassena-Nankana District of northern Ghana. Random cross-sectional surveys were timed to coincide with the end of low (May 2001) and high (November 2001) malaria transmission seasons and to yield information as to the potential value of haemoglobin (Hb) levels and parasitaemia as markers of malaria morbidity and/or malaria vaccine effect. Parasitaemia was found in 22% (515 of 2286) screened in May (dry-low transmission), and in 61% of the general population (1026 of 1676) screened in November (wet-high transmission). Malaria prevalence in May ranged from 4% (infants <6 months and adults 50-60 years) to 54% (children 5-10 years). Age-specific malaria prevalence in November ranged from 38% (adults 50-60 years) to 82% (children 5-10 years). Differences between low- and high-transmission periods in the prevalence of severe anaemia (SA) among young children (6-24 months) were unexpectedly comparable (low, 3.9%vs. high, 5.4%; P = 0.52) and greatly reduced from levels measured in this same community and age group in November 2000 (12.5%) and November 1996 (22.0%). Despite the lower frequency of anaemia/SA in young children surveyed in 2001, it was still clear that this condition was strongly associated with parasitaemia and that children under 5 years of age experienced a significant drop in their mean Hb levels by the end of the high transmission season. Prevalence of parasitaemia was significantly lower (P < 0.01) among infants and young children (<2 years) whose parents reported the use of bednets. There was a significantly lower risk of parasitaemia among infants [odds ratio (OR) 6-8] and young children (OR 3-4) living in the central, more urbanized sector of the study area.

  20. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    International Nuclear Information System (INIS)

    Shin, Hyeongki; Kim, Juyoul

    2007-01-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity

  1. Consequence Assessment for Potential Scenarios of Radiological Terrorists Events

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Hyeongki [Korea Institute of Nuclear Safety, Daejeon (Korea, Republic of); Kim, Juyoul [Seoul National University, Seoul (Korea, Republic of)

    2007-07-01

    Radiological dispersal device (RDD) means any method used to deliberately disperse radioactive material to create terror or harm. Dirty bomb is an example of RDD, which usually consists of radioactive material and unconventional explosive. Dirty bomb was a problem long before September 11, 2001. In 1987, the Iraqi government tested a one-ton radiological bomb. The Iraqi tests confirmed that a dirty bomb is not effective as weapons of mass destruction (WMD) and that its main value is as a psychological weapon. In 1995, Chechen rebels buried a dirty bomb in a park in Moscow threatening to detonate one in the future if their demands were not met. Another good example of potential dirty bomb effects was an incident in Goiania, Brazil on September 18, 1987, where an orphaned medical source containing 1,375 Ci of Cs-137 resulted the death of four people and extensive environmental contamination. The purposes of radiological terrorists events are not to destroy or damage the target but to disperse radioactivity in the environment. They inflict panic on a public and economic damage by disruption of business. They also have influence on enormous clean-up costs by spreading radioactive contamination including secondary impacts on water supply reservoirs. Generally, two major long-term concerns following a RDD are human health and economic impacts. In this study, we developed potential scenarios of radiological terrorists events and performed their radiological consequence assessments in terms of total effective dose equivalent (TEDE), projected cumulative external and internal dose, and ground deposition of radioactivity.

  2. Know thy enemy: Education about terrorism improves social attitudes toward terrorists.

    Science.gov (United States)

    Theriault, Jordan; Krause, Peter; Young, Liane

    2017-03-01

    Hatred of terrorists is an obstacle to the implementation of effective counterterrorism policies-it invites indiscriminate retaliation, whereas many of the greatest successes in counterterrorism have come from understanding terrorists' personal and political motivations. Drawing from psychological research, traditional prejudice reduction strategies are generally not well suited to the task of reducing hatred of terrorists. Instead, in 2 studies, we explored education's potential ability to reduce extreme negative attitudes toward terrorists. Study 1 compared students in a college course on terrorism (treatment) with wait-listed students, measuring prosocial attitudes toward a hypothetical terrorist. Initially, all students reported extremely negative attitudes; however, at the end of the semester, treatment students' attitudes were significantly improved. Study 2 replicated the effect within a sample of treatment and control classes drawn from universities across the United States. The present work was part of an ongoing research project, focusing on foreign policy and the perceived threat of terrorism; thus classes did not explicitly aim to reduce prejudice, making the effect of treatment somewhat surprising. One possibility is that learning about terrorists "crowds out" the initial pejorative associations-that is, the label terrorism may ultimately call more information to mind, diluting its initial negative associative links. Alternatively, students may learn to challenge how the label terrorist is being applied. In either case, learning about terrorism can decrease the extreme negative reactions it evokes, which is desirable if one wishes to implement effective counterterrorism policies. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  3. The Proliferation of Unmanned Aerial Vehicles: Terrorist Use, Capability, and Strategic Implications

    Energy Technology Data Exchange (ETDEWEB)

    Ball, Ryan Jokl [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-10-16

    There has been unparalleled proliferation and technological advancement of consumer unmanned aerial vehicles (UAVs) across the globe in the past several years. As witnessed over the course of insurgency tactics, it is difficult to restrict terrorists from using widely available technology they perceive as advantageous to their overall strategy. Through a review of the characteristics, consumer market landscape, tactics, and countertactics, as well as operational use of consumer-grade UAVs, this open-source report seeks to provide an introductory understanding of the terrorist-UAV landscape, as well as insights into present and future capabilities. The caveat is evaluating a developing technology haphazardly used by terrorists in asymmetric conflicts.

  4. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums

    Directory of Open Access Journals (Sweden)

    Manuel Ricardo Torres-Soriano

    2013-06-01

    Full Text Available An examination of the organizational nature of the threat posed by jihadi terrorism, supplying quantitative and qualitative data on the dynamics behind the creation, evolution, and disappearance of the main jihadi Internet forums during the period 2008–2012. An analysis of the origins and functions of the forums, their links with terrorist organizations, their internal structures, and the processes accounting for their stability in cyberspace shows that far from representinga horizontal structure where the main actors are a network of followers, the terrorist presence on the Internet is in fact a hierarchical organization in which intervention by formal terrorist organizations plays a crucial role.

  5. The 1983 Beirut Airport terrorist bombing. Injury patterns and implications for disaster management.

    Science.gov (United States)

    Frykberg, E R; Tepas, J J; Alexander, R H

    1989-03-01

    The casualty profile and results of the medical care provided for the survivors of the terrorist truck bombing of the U.S. Marine Corps facility in Beirut, Lebanon, in 1983 were reviewed to determine the factors that influenced casualty survival. This explosion resulted in 346 casualties, of whom 234 (68%) were immediately killed. The spectrum of injury was determined in 85 survivors using the Injury Severity Score (ISS). There were seven (6.3%) deaths among the 112 immediate survivors. All deaths occurred among the 19 (17%) victims who were critically injured (ISS greater than 15), giving a mortality in this population of 37 per cent. Six (86%) of the seven deaths were associated with an initial delay in treatment. Head injury was the most common fatal injury among both immediate fatalities (71.4%) and immediate survivors (57%). Thoracic injury and burns each accounted for 29 per cent of survivor deaths. Triage efficiency, as determined by the rates of overtriage (80%) and undertriage (0), did not appear adversely to affect mortality. Critical analysis of disasters such as this can contribute to improvements in preparation and casualty care in the event of future disasters.

  6. Carcass characteristics, chemical composition and fatty acid profile of longissimus muscle of young bulls from four genetic groups finished in feedlot

    Directory of Open Access Journals (Sweden)

    Roberto Haruyoshi Ito

    2012-02-01

    Full Text Available This experiment was carried out to evaluate the carcass characteristics, chemical composition and fatty acid profile of the longissimus muscle of 32 young bulls from four genetic groups: Caracu; Canchin; Aberdeen Angus × Canchin; and Charolais × Caracu, finished in feedlot and slaughtered at 22 months old. Each group was composed of eight animals. There was no difference for moisture, ash, crude protein or total cholesterol between bulls from different genetic groups. However, total lipids percentage was higher for bulls from Caracu and Aberdeen Angus × Canchin and lower for Canchin and Charolais genetic groups. Polyunsaturated fattty acids and n-6 percentage was higher for Canchin and lower for Caracu, Aberdeen Angus × Canchin and Charolais genetic groups. Canchin and Charolais × Caracu genetic groups presented higher n-3 percentage than Caracu and Aberdeen Angus × Canchin. There was no difference for the n-6/n-3 ratio among the bulls from the four genetic groups.

  7. A Profile of Tehrik-i-Taliban Pakistan

    Science.gov (United States)

    2008-01-01

    executing attacks. By sharing information with other terrorist groups, al-Qa`ida became the “Jihad’s Franchise ” by using the internet to connect...terrorist activities or causes. Recruiters can log into chat rooms or visit cyber- cafes to find receptive members of the public, especially the...worst that globalization and advanced community technologies have to offer. Al-Qa`ida is a virtual “network of networks,” a jihadist franchise

  8. Temperature and Humidity Profiles in the TqJoint Data Group of AIRS Version 6 Product for the Climate Model Evaluation

    Science.gov (United States)

    Ding, Feng; Fang, Fan; Hearty, Thomas J.; Theobald, Michael; Vollmer, Bruce; Lynnes, Christopher

    2014-01-01

    The Atmospheric Infrared Sounder (AIRS) mission is entering its 13th year of global observations of the atmospheric state, including temperature and humidity profiles, outgoing long-wave radiation, cloud properties, and trace gases. Thus AIRS data have been widely used, among other things, for short-term climate research and observational component for model evaluation. One instance is the fifth phase of the Coupled Model Intercomparison Project (CMIP5) which uses AIRS version 5 data in the climate model evaluation. The NASA Goddard Earth Sciences Data and Information Services Center (GES DISC) is the home of processing, archiving, and distribution services for data from the AIRS mission. The GES DISC, in collaboration with the AIRS Project, released data from the version 6 algorithm in early 2013. The new algorithm represents a significant improvement over previous versions in terms of greater stability, yield, and quality of products. The ongoing Earth System Grid for next generation climate model research project, a collaborative effort of GES DISC and NASA JPL, will bring temperature and humidity profiles from AIRS version 6. The AIRS version 6 product adds a new "TqJoint" data group, which contains data for a common set of observations across water vapor and temperature at all atmospheric levels and is suitable for climate process studies. How different may the monthly temperature and humidity profiles in "TqJoint" group be from the "Standard" group where temperature and water vapor are not always valid at the same time? This study aims to answer the question by comprehensively comparing the temperature and humidity profiles from the "TqJoint" group and the "Standard" group. The comparison includes mean differences at different levels globally and over land and ocean. We are also working on examining the sampling differences between the "TqJoint" and "Standard" group using MERRA data.

  9. Asian Organized Crime and Terrorist Activity in Canada, 1999-2002

    National Research Council Canada - National Science Library

    Helfand, Neil S

    2003-01-01

    This study is based on open source research into the scope of Asian organized crime and terrorist activity in Canada during the period 1999 to 2002, and the extent of cooperation and possible overlap...

  10. Underlying Reasons for Success and Failure of Terrorist Attacks: Selected Case Studies

    National Research Council Canada - National Science Library

    McCleskey, Edward; McCord, Diana; Leetz, Jennifer; Markey, John

    2007-01-01

    .... This is the second of a two-phased effort: Phase I focused on assessing the underlying reasons for the success and failure of terrorist attacks against targets within the United States and against U.S. interests abroad...

  11. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  12. Improving Local and State Agency Response to Terrorist Incidents Involving Biological Weapons

    National Research Council Canada - National Science Library

    2003-01-01

    .... Because of multiple terrorist acts such as the September II, 2001 attacks on the Pentagon and the World Trade Center, as well as anthrax contaminated mail and the Oklahoma City bombing, there is a...

  13. Will opposites attract? Similarities and differences in students' perceptions of the stereotype profiles of other health and social care professional groups.

    Science.gov (United States)

    Hean, Sarah; Clark, Jill Macleod; Adams, Kim; Humphris, Debra

    2006-03-01

    The extent to which health and social care (HSC) students hold stereotypical views of other HSC professional groups is of great potential importance to team working in health care. This paper explores students' perceptions of different HSC professional groups at the beginning of their university programmes. Findings are presented from an analysis of baseline data collected as part of the New Generation Project longitudinal cohort study which is assessing the impact of interprofessional education over time on a range of variables including stereotyping. Questionnaires were administered to a cohort of over 1200 students from 10 different HSC professional groups entering their first year of university. Stereotypes were measured using a tool adapted from Barnes et al. (2000) designed to elicit stereotype ratings on a range of nine characteristics. The findings confirm that students arrive at university with an established and consistent set of stereotypes about other health and social care professional groups. Stereotypical profiles were compiled for each professional group indicating the distinctive characteristics of the groups as well as the similarities and differences between groups.Midwives, social workers and nurses were rated most highly on interpersonal skills and on being a team player whilst doctors were rated most highly on academic ability. Doctors, midwives and social workers were perceived as having the strongest leadership role, whilst doctors were also rated most highly on decision making. All professions were rated highly on confidence and professional competence and, with the exception of social workers, on practical skills. A comparison of profiles for each professional group reveals that, for example, pharmacists and doctors were perceived as having very similar characteristics as were social workers, midwives and nurses. However, the profiles of nurses and doctors were perceived to be very different. The implications of these similarities and

  14. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    OpenAIRE

    Li MingChu; Yang Zekun; Lu Kun; Guo Cheng

    2017-01-01

    The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watch...

  15. The human body as a terrorist weapon: hunger strikes and suicide bombers

    OpenAIRE

    Mollica, Marcello; Dingley, James

    2007-01-01

    This article argues that a major factor in terrorist acts is an appeal to the actor's own community at an emotional and symbolic level, through acts of sacrifice, particularly self-sacrifice. Although other aims also exist, a prime concern is to recall the actor's home audience to the struggle, because the actor regards himself as acting on their behalf. This utilizes the imagery and symbolism of traditional religion, implying a strong communal and non-material impetus to terrorist acts, rath...

  16. Analysing Personal Characteristics of Lone-Actor Terrorists: Research Findings and Recommendations

    OpenAIRE

    Roy, de, van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of (potentially) violent lone-actors based on an analysis of 120 cases from across Europe. The Research Note focuses on the personal characteristics of lone-actor terrorists.[1] First of all, it presents th...

  17. Leading Players of the Global Renewable Energy Equipment Industry. Overview of Groups - SWOTs - Benchmarking - Company Profiles and Financials

    International Nuclear Information System (INIS)

    2017-06-01

    This study presents: The medium-term and mega trends of the industry market developments and geographical segments; The competitive landscape and the main corporate rankings; The main conclusions of the report, summarised in 10 analytical slides. Content: 1. Overview: The Sector, Ranking, Performance Analysis; 2. Company Profiles: Toshiba, Vestas, Dong Energy, GE Renewable Energy, Siemens, Goldwind, First Solar, SunPower, Andritz, Yingli Green Energy; 3. Sources; 4. Annexes

  18. Leading Players of the European Power and Gas Industry Overview of Groups - SWOTs - Benchmarking - Company Profiles and Financials

    International Nuclear Information System (INIS)

    2017-09-01

    This study presents: The medium-term and mega trends of the industry market developments and geographical segments; The competitive landscape and the main corporate rankings; The main conclusions of the report, summarised in 10 analytical slides. Content: 1. Overview: The Sector, Ranking, Performance Analysis; 2. Company Profiles: EDF, Enel, Engie, RWE, E.ON, SSE, Iberdrola, Gas Natural Fenosa, Vattenfall, EDP; 3. Sources; 4. Annexes

  19. Leading Players of the Global Oil and Gas Industry. Overview of Groups - SWOTs - Benchmarking - Company Profiles and Financials

    International Nuclear Information System (INIS)

    2017-07-01

    This study presents: The medium-term and mega trends of the industry market developments and geographical segments; The competitive landscape and the main corporate rankings; The main conclusions of the report, summarised in 10 analytical slides. Content: 1. Overview: The Sector, Ranking, Performance Analysis; 2. Company Profiles: Sinopec, PetroChina, Shell, ExxonMobil, BP, Total, Chevron, Gazprom, Lukoil, Eni; 3. Sources; 4. Annexes

  20. Hospital Preparedness to Respond to Biological and Chemical Terrorist Attack

    International Nuclear Information System (INIS)

    Florin, P.

    2007-01-01

    There is a growing concern about the terrorist use of chemical or biological agents against civilian population. A large proportion of hospitals are probably poorly prepared to handle victims of chemical or biological terrorism. At national level, starting with 2008 hospitals will be under the administration and control of local authorities. That is good opportunities for local authorities and public health office to tailor the activity of the hospitals to the real needs in the area of responsibility, and to allocate the suitable budget for them. Commonly hospitals are not fully prepared to respond to massive casualty disaster of any kind, either i their capacity to care for large numbers of victims or in their ability to provide care in coordination with a regional or national incident command structure. Preparedness activities to respond properly to chemical or biological attack including the adequate logistic, the principle of training and drill for the hospital emergency units and medical personal, communication and integration of the hospital team in local and regional civil response team are developed by the author.(author)

  1. Screening Cargo Containers to Remove a Terrorist Threat

    International Nuclear Information System (INIS)

    Hazi, A

    2005-01-01

    Each year some 48 million cargo containers move between the world's ports. More than 6 million of these enter the U.S., but only about 2 percent are opened and inspected when they arrive at U.S. seaports. The West Coast ports of Los Angeles-Long Beach, Oakland, and Seattle alone process 11,000 containers per day, or about 8 containers per minute. Because of this high traffic volume, U.S. seaports are especially vulnerable to a terrorist attack. Illicit radioactive materials could be hidden in any one of the cargo-filled containers that arrive at U.S. ports. Yet, searching every shipment would be bring legitimate commercial activities to a halt. Improving security at U.S. ports is thus one of the nation's most difficult technical and practical challenges because the systems developed for screening cargo must operate in concert with ongoing seaport activities. Working at this intersection of commerce and national security, Lawrence Livermore researchers are applying their expertise in radiation science and detection to develop improved technologies for detecting hidden radioactive materials. One new technology being designed and tested at the Laboratory is a neutron interrogation system for cargo containers. This system will quickly screen incoming shipments to ensure that nuclear materials such as plutonium and highly enriched uranium (HEU) are not smuggled into the U.S

  2. Meeting blood requirements following terrorist attacks: the Israeli experience.

    Science.gov (United States)

    Shinar, Eilat; Yahalom, Vered; Silverman, Barbara G

    2006-11-01

    Blood services worldwide must be prepared to meet surges in demand for blood components needed by casualties of domestic disasters and acts of terrorism. Israel's National Blood Services, operated by Magen David Adom, has extensive experience in managing blood collections and supply in emergencies. This review summarizes the structure and function of Magen David Adom's national blood program, and relates its experience to other practices that have been reported in the medical literature. Between 2000 and 2005, 7497 victims (85% civilians) were involved in 1645 terrorist attacks in Israel. On-site triage resulted in 967 (13%) deaths at the scene, 615 (8%) with severe injuries, 897 (12%) with moderate injuries and 5018 (67%) with mild injuries. Requests for blood averaged 1.3 blood units and 0.9 components per casualty, or 6.7 units and 4.5 components per severe and moderately injured patient. Public appeals for blood donations were managed centrally to match supply with demand and prevent wastage. This experience illustrates the advantages of a comprehensive program for managing blood operations in emergency situations. A coordinated national program can stabilize in-hospital inventories during routine activities, ensure instant access to precisely defined inventories, facilitate sufficient supply in times of disasters, and minimize outdating and wastage.

  3. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  4. Comparing Profile of Temperament and Character Dimensions in Patients with Major Depressive Disorder and Bipolar Mood Disorder and Control Group in the Iranian Sample

    Directory of Open Access Journals (Sweden)

    shahram hajirezaei

    2017-06-01

    Full Text Available Objective: This study was conducted to compare the profile of Temperament and Character dimensions in patients with major depressive disorder and bipolar mood disorder and control group.Methods: In this causal-comparative study the population consisted of two clinical groups (major depressive disorder and bipolar mood disorder and a non-clinical group. The sample was 193 subjects (77 patients with major depressive disorder, 86 patients with bipolar mood disorder, and 30 normal people with an age range of 18-65 years and the mean age of 40.1. They were selected from Roozbeh psychiatric hospital using available sampling method. Tools used in this research included Temperament and Character Inventory-140 and General Health Questionnaire-28. Collected data were analyzed by statistical methods of independent t-test and one-way analysis of variance using Statistical Package for the Social Sciences-22 software.Result: The results of comparing the groups showed that there was a significant difference among groups in dimensions of Novelty Seeking, Harm Avoidance, Persistence, Self-Directedness and Cooperativeness (P <0.05. The results showed that only in the Novelty Seeking dimension, the mean was different in males and females (P <0.05.Conclusion: In general, our results showed that patients with major depressive disorder and bipolar mood disorder have different personality profile in some dimensions of Temperament and Character compared with control group.

  5. HBA1C AND LIPID PROFILE LEVELS IN THE KNOWN TYPE 2 DIABETIC GROUP IN THE RURAL REGION OF VIDARBHA, MAHARASHTRA, INDIA

    Directory of Open Access Journals (Sweden)

    Sarmistha Sarkar

    2017-04-01

    Full Text Available BACKGROUND Diabetes Mellitus (DM is a group of metabolic diseases in which there is high blood sugar levels over a prolonged period of time, and if early interventions are not taken, then it can cause many life-threatening complications like heart disease, stroke, kidney failure, damage to eyes, etc. Our aim is to determine HbA1c and Lipid profile level in the known type 2 diabetic group in the rural region of Vidarbha, Maharashtra, India, to see that as our study is a rural-based study and there is less pollution and stress factor compared to the cities whether it effects out study result or not. MATERIALS AND METHODS FBS, HbA1c, TC, HDL, LDL, VLDL, TG levels were evaluated. Total sample size 60 in between 30-40 years including males and females divided into two groups. 30 patients study group with known history of type 2 DM who attended the Medicine OPD and 30 age, sex matched healthy controls. Statistical analysis was done by using SPSS 17.0 version. RESULTS Results of serum lipid profile showed that mean values for TC, TG, HDL, LDL and VLDL in study group were 227.76±30.72, 152.23 ± 40.94, 40.5 ± 6.43, 153.30 ± 27.70 and 33.00 ± 9.94 mg/dL. FBS showed significant positive correlation with HbA1c (p<0.002. HDL has significant negative correlation with HbA1c (p<0.008. CONCLUSION Early detection in the abnormalities of serum lipid profile and HbA1c can minimise the risk for micro and macroangiopathies in the known type 2 diabetic patients.

  6. Toxicology of organophosphorus compounds in view of an increasing terrorist threat.

    Science.gov (United States)

    Worek, Franz; Wille, Timo; Koller, Marianne; Thiermann, Horst

    2016-09-01

    The implementation of the Chemical Weapon Convention (CWC), prohibiting the development, production, storage and use of chemical weapons by 192 nations and the ban of highly toxic OP pesticides, especially class I pesticides according to the WHO classification, by many countries constitutes a great success of the international community. However, the increased interest of terrorist groups in toxic chemicals and chemical warfare agents presents new challenges to our societies. Almost seven decades of research on organophosphorus compound (OP) toxicology was mainly focused on a small number of OP nerve agents despite the fact that a huge number of OP analogues, many of these agents having comparable toxicity to classical nerve agents, were synthesized and published. Only limited physicochemical, toxicological and medical information on nerve agent analogues is available in the open literature. This implies potential gaps of our capabilities to detect, to decontaminate and to treat patients if nerve agent analogues are disseminated and may result in inadequate effectiveness of newly developed countermeasures. In summary, our societies may face new, up to now disregarded, threats by toxic OP which calls for increased awareness and appropriate preparedness of military and civilian CBRN defense, a broader approach for new physical and medical countermeasures and an integrated system of effective detection, decontamination, physical protection and treatment.

  7. Identification of critical locations across multiple infrastructures for terrorist actions

    International Nuclear Information System (INIS)

    Patterson, S.A.; Apostolakis, G.E.

    2007-01-01

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures

  8. Terrorism, the Internet and the Social Media Advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism.

    Directory of Open Access Journals (Sweden)

    Luke Bertram

    2016-06-01

    Full Text Available The deeply engrained nature of social media in modern life have provided ease of access to information and speed of use within almost every aspect of a person’s life. These same benefit are also available to terrorists and their organizations. The same technology that allows for a globalized world to interact without regard for distance or physical location is also utilized, exploited and adapted to by terrorist organizations to conduct operations, reach candidates and ensure organizational longevity. This article takes the position of observer of these advancements with the end goal of informing counter-violent extremism strategists of the advances that terrorist groups have already made in digital technology; and where the priority of intervention strategies should be aimed. Further, this is intended to guide policy makers to embrace and utilize digital technologies as a mechanism to carry counter-radicalization and counter-violent extremism interventions through the same digital potential and reach the same audiences as terrorist organizations. What appears strongly apparent is that social media will not abate from its intrinsic position graphed into daily life. This means that counter-terrorism, counter-radicalization and counter-violent extremism strategies must take up the same technology in order to effectively discredit and nullify extremist groups – a digital problem needs a digital solution.

  9. Smokers are not a homogeneous group and smoking is not a uniform behaviour: profiling psychosocial characteristics differentiates between smoking patterns.

    OpenAIRE

    Seeds, Sophie

    2013-01-01

    Much of our understanding of ‘smokers’ is based the subset of the group that smoke daily, under the assumption that smokers are a relatively homogeneous group. However, there is a growing body of evidence which recognises other ‘kinds’ of smoking which are not characterised by nicotine dependence, fundamentally challenging many of our conceptions about the nature of ‘smoking’. Despite this relatively recent recognition, little has been done to reformulate our understanding of smokers as a het...

  10. Clinical profile, degree of severity and underlying factors of acute pancreatitis among a group of Bangladeshi patients

    Directory of Open Access Journals (Sweden)

    Indrajit Kumar Datta

    2018-01-01

    Full Text Available Background and objectives: Acute pancreatitis is a common condition for hospital admission. In Bangladesh, no study has yet investigated the clinical profile, degree of severity and underlying factors of acute pancreatitis. The aim of the present study was to determine the clinical profile, degree of severity and underlying factors of acute pancreatitis in a cohort of Bangladeshi patients. Methods: This prospective study was conducted from April 2016 to March 2017 on patients admitted with acute pancreatitis at Bangladesh Institute of Research and Rehabilitation in Diabetes, Endocrine and Metabolic Disorders (BIRDEM General Hospital, Dhaka, Bangladesh. History and clinical features of each patient was systematically recorded. Diagnosis of acute pancreatitis was made by clinical findings, serum amylase and lipase levels (> 3 times the upper limit of normal values, evidences of acute pancreatitis by ultrasonography and computed tomography (CT. Severity of acute pancreatitis was classified according to the revised version of Atlanta classification. Results: A total of 40 patients with acute pancreatitis were enrolled in the study. Male and female were equally distributed. The mean age was 44.3±2.7 years. Among 40 cases, 26 (65.0% and 14 (35% had moderate and severe acute pancreatitis respectively. No specific clinical feature including ascites or pleural effusion was found significantly related to severity of the disease. Gall stone and metabolic (hypertriglyceridaemia/hypercalcemia causes were present in 62.5% cases, but none had significant association with the severity of the disease. Conclusion: The present study has demonstrated that no specific observed clinical feature or underlying factor was related to the degree of severity of acute pancreatitis in a cohort of Bangladeshi patients. IMC J Med Sci 2018; 12(1: 06-10

  11. Virulence profile of different phylogenetic groups of locally isolated community acquired uropathogenic E. coli from Faisalabad region of Pakistan

    Directory of Open Access Journals (Sweden)

    Bashir Saira

    2012-08-01

    Full Text Available Abstract Background Uropathogenic E.coli (UPEC are among major pathogens causing urinary tract infections. Virulence factors are mainly responsible for the severity of these emerging infections. This study was planned to investigate the distribution of virulence genes and cytotoxic effects of UPEC isolates with reference to phylogenetic groups (B2, B1, D and A to understand the presence and impact of virulence factors in the severity of infection in Faisalabad region of Pakistan. Methods In this study phylogenetic analysis, virulence gene identification and cytotoxicity of 59 uropathogenic E.coli isolates obtained from non-hospitalized patients was studied. Results Among 59 isolates, phylogenetic group B2 (50% was most dominant followed by groups A, B1 (19% each and D (12%. Isolates present in group D showed highest presence of virulence genes. The prevalence hlyA (37% was highest followed by sfaDE (27%, papC (24%, cnf1 (20%, eaeA (19% and afaBC3 (14%. Highly hemolytic and highly verotoxic isolates mainly belonged to group D and B2. We also found two isolates with simultaneous presence of three fimbrial adhesin genes present on pap, afa, and sfa operons. This has not been reported before and underlines the dynamic nature of these UPEC isolates. Conclusions It was concluded that in local UPEC isolates from non-hospitalized patients, group B2 was more prevalent. However, group D isolates were most versatile as all were equipped with virulence genes and showed highest level of cytotoxicity.

  12. All Terrorists are Not Equal - The Drug War in Colombia After September 11th

    National Research Council Canada - National Science Library

    Mitchell, Charles

    2002-01-01

    ...'. Since these three organizations are among the twenty-eight groups listed in the U.S. State Department's 'Profile of Global Terrorism', such a designation could drastically change the type of military assistance offered by the U.S...

  13. Integrated DNA methylation and copy-number profiling identify three clinically and biologically relevant groups of anaplastic glioma.

    Science.gov (United States)

    Wiestler, Benedikt; Capper, David; Sill, Martin; Jones, David T W; Hovestadt, Volker; Sturm, Dominik; Koelsche, Christian; Bertoni, Anna; Schweizer, Leonille; Korshunov, Andrey; Weiß, Elisa K; Schliesser, Maximilian G; Radbruch, Alexander; Herold-Mende, Christel; Roth, Patrick; Unterberg, Andreas; Hartmann, Christian; Pietsch, Torsten; Reifenberger, Guido; Lichter, Peter; Radlwimmer, Bernhard; Platten, Michael; Pfister, Stefan M; von Deimling, Andreas; Weller, Michael; Wick, Wolfgang

    2014-10-01

    The outcome of patients with anaplastic gliomas varies considerably. Whether a molecular classification of anaplastic gliomas based on large-scale genomic or epigenomic analyses is superior to histopathology for reflecting distinct biological groups, predicting outcomes and guiding therapy decisions has yet to be determined. Epigenome-wide DNA methylation analysis, using a platform which also allows the detection of copy-number aberrations, was performed in a cohort of 228 patients with anaplastic gliomas (astrocytomas, oligoastrocytomas, and oligodendrogliomas), including 115 patients of the NOA-04 trial. We further compared these tumors with a group of 55 glioblastomas. Unsupervised clustering of DNA methylation patterns revealed two main groups correlated with IDH status: CpG island methylator phenotype (CIMP) positive (77.5 %) or negative (22.5 %). CIMP(pos) (IDH mutant) tumors showed a further separation based on copy-number status of chromosome arms 1p and 19q. CIMP(neg) (IDH wild type) tumors showed hallmark copy-number alterations of glioblastomas, and clustered together with CIMP(neg) glioblastomas without forming separate groups based on WHO grade. Notably, there was no molecular evidence for a distinct biological entity representing anaplastic oligoastrocytoma. Tumor classification based on CIMP and 1p/19q status was significantly associated with survival, allowing a better prediction of outcome than the current histopathological classification: patients with CIMP(pos) tumors with 1p/19q codeletion (CIMP-codel) had the best prognosis, followed by patients with CIMP(pos) tumors but intact 1p/19q status (CIMP-non-codel). Patients with CIMP(neg) anaplastic gliomas (GBM-like) had the worst prognosis. Collectively, our data suggest that anaplastic gliomas can be grouped by IDH and 1p/19q status into three molecular groups that show clear links to underlying biology and a significant association with clinical outcome in a prospective trial cohort.

  14. Health effects of technologies for power generation: Contributions from normal operation, severe accidents and terrorist threat

    International Nuclear Information System (INIS)

    Hirschberg, Stefan; Bauer, Christian; Burgherr, Peter; Cazzoli, Eric; Heck, Thomas; Spada, Matteo; Treyer, Karin

    2016-01-01

    As a part of comprehensive analysis of current and future energy systems we carried out numerous analyses of health effects of a wide spectrum of electricity supply technologies including advanced ones, operating in various countries under different conditions. The scope of the analysis covers full energy chains, i.e. fossil, nuclear and renewable power plants and the various stages of fuel cycles. State-of-the-art methods are used for the estimation of health effects. This paper addresses health effects in terms of reduced life expectancy in the context of normal operation as well as fatalities resulting from severe accidents and potential terrorist attacks. Based on the numerical results and identified patterns a comparative perspective on health effects associated with various electricity generation technologies and fuel cycles is provided. In particular the estimates of health risks from normal operation can be compared with those resulting from severe accidents and hypothetical terrorist attacks. A novel approach to the analysis of terrorist threat against energy infrastructure was developed, implemented and applied to selected energy facilities in various locations. Finally, major limitations of the current approach are identified and recommendations for further work are given. - Highlights: • We provide state-of-the-art comparative assessment of energy health risks. • The scope of the analysis should to the extent possible cover full energy chains. • Health impacts from normal operation dominate the risks. • We present novel approach to analysis of terrorist threat. • Limitations include technology choices, geographical coverage and terrorist issues.

  15. Terrorists: analogies and differences with mental diseases. A phenomenological-metaphysical perspective.

    Science.gov (United States)

    Fisogni, Primavera

    2010-01-01

    Are islamic terrorists insane? International scholars generally concede that Al Qaeda members are not mentally ill. But, until now, there has not been a shared consensus and a strong argument that can prove it. This paper intends to throw light on the specific dehumanization of terrorists and to show that they are always responsible for their acts, unlike those who are affected by mental diseases. The members of Al Qaeda deny the world of life and take the distance from its sense and value: in their perspective only subversive action makes sense. However they always maintain a transcendent relation with the world (I-you; I-it). Persons with serious mental diseases have generally lost the sense of their self and the transcendence with the world. Terrorists and people with mental illness share a common separation from the world of life: one is voluntary, the other is the consequence of a number of factors (biological, social, etc.). Terrorists and psychotics have nevertheless something in common: the deprivation of the self. A loss of being that--I argue--is at the origin of the ordinariness of terrorists and the experience of void in psychotics. Two symptoms that reveal the condition of an intimate dryness, from a phenomenological and a metaphysical point of view as a consequence of a distorted relation with the world of life. I shall discuss how ordinariness is strictly related with the blurring definition of terrorism.

  16. Profiling, Screening and Criminal Recruitment

    OpenAIRE

    Christopher Cotton; Cheng Li

    2012-01-01

    We model major criminal activity as a game in which a law enforcement officer chooses the rate at which to screen different population groups and a criminal organization (e.g., drug cartel, terrorist cell) chooses the observable characteristics of its recruits. Our model best describes smuggling or terrorism activities at borders, airports and other security checkpoints. When the social costs of crime are high, law enforcement is most-effective when it is unconstrained in its ability to profi...

  17. Profile of European radiotherapy departments contributing to the EORTC Radiation Oncology Group (ROG) in the 21st century

    NARCIS (Netherlands)

    Budiharto, Tom; Musat, Elena; Poortmans, Philip; Hurkmans, Coen; Monti, Angelo; Bar-Deroma, Raquel; Bernstein, Zvi; van Tienhoven, Geertjan; Collette, Laurence; Duclos, Frédéric; Davis, Bernard; Aird, Edwin

    2008-01-01

    Since 1982, the Radiation Oncology Group of the EORTC (EORTC ROG) has pursued an extensive Quality Assurance (QA) program involving all centres actively participating in its clinical research. The first step is the evaluation of the structure and of the human, technical and organisational resources

  18. Mobile system for radiation reconnaissance after terrorist attack

    International Nuclear Information System (INIS)

    Resehetin, V. P.

    2009-01-01

    Well-timed radiation reconnaissance aimed at identifying a source of radiation contamination and drawing up a contamination map represents an important and complex problem, the solution of which allows for the reduction of the irradiation dose, the implementation of decontamination works, and finally minimizing the consequences of a terrorist attack. New opportunities for operational gathering of radiation contamination data and corresponding space coordinates can be associated with the development of mobile systems which provide measurements of ionizing radiation dose rate and corresponding space coordinates, and subsequent transferral to the crisis centre server where these data are processed and used for mapping radiation contamination. In such a way, the data obtained on radiation contamination could be incorporated in a timely manner as input data to computer models, describing the dispersion of radionuclides in an environment that makes it possible not only to forecast the development of a situation but to define necessary protection measures for mitigating and localizing the consequences. The mobile reconnaissance system was developed as a prototype of such a solution, based on a cellular terminal such as the Nokia 12i (Teltonika BoxGPS). A Global Positioning System (GPS) was used to determine space coordinates. A Russian BDMG device measured the dose rate of ionizing radiation, and the subsequent data were transferred to the server of the crisis centre of the Nuclear Safety Institute of RAS (IBRAE). The main operation regime involved setting the GPRS connection, transferring data, and switching off the connection. A change of the operation regime can be produced via SMS commands from the crisis centre's terminal or with the help of a cellular phone. When a connection is not available, the data are aggregated in memory and transferred to the server when the connection channel arises. A few data transfer protocols, including FTP and HTTP/HTTPS, are provided

  19. Computing Optimal Mixed Strategies for Terrorist Plot Detection Games with the Consideration of Information Leakage

    Directory of Open Access Journals (Sweden)

    Li MingChu

    2017-01-01

    Full Text Available The terrorist’s coordinated attack is becoming an increasing threat to western countries. By monitoring potential terrorists, security agencies are able to detect and destroy terrorist plots at their planning stage. Therefore, an optimal monitoring strategy for the domestic security agency becomes necessary. However, previous study about monitoring strategy generation fails to consider the information leakage, due to hackers and insider threat. Such leakage events may lead to failure of watching potential terrorists and destroying the plot, and cause a huge risk to public security. This paper makes two major contributions. Firstly, we develop a new Stackelberg game model for the security agency to generate optimal monitoring strategy with the consideration of information leakage. Secondly, we provide a double-oracle framework DO-TPDIL for calculation effectively. The experimental result shows that our approach can obtain robust strategies against information leakage with high feasibility and efficiency.

  20. Do terrorist attacks affect ethnic discrimination in the labour market? Evidence from two randomized field experiments.

    Science.gov (United States)

    Birkelund, Gunn Elisabeth; Chan, Tak Wing; Ugreninov, Elisabeth; Midtbøen, Arnfinn H; Rogstad, Jon

    2018-01-24

    Terrorist attacks are known to influence public opinion. But do they also change behaviour? We address this question by comparing the results of two identical randomized field experiments on ethnic discrimination in hiring that we conducted in Oslo. The first experiment was conducted before the 2011 terrorist attacks in Norway; the second experiment was conducted after the attacks. In both experiments, applicants with a typical Pakistani name were significantly less likely to get a job interview compared to those with a typical Norwegian name. But the ethnic gap in call-back rates were very similar in the two experiments. Thus, Pakistanis in Norway still experienced the same level of discrimination, despite claims that Norwegians have become more positive about migrants after the far-right, anti-migrant terrorist attacks of 2011. © London School of Economics and Political Science 2018.

  1. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  2. Why Failing Terrorist Groups Persist: The Case of Al-Qaeda in the Islamic Maghreb

    Science.gov (United States)

    2012-06-01

    and Nigeria in the South). As an AQ franchise organization their goals now include attacking western interests within the Sahel.10 Lastly, AQIM...concerning NEA. 317 Official, interview concerning NEA. 318 Official, interview concerning NEA 76 open society and encouraged entrepreneurship as...focused on criminal entrepreneurship than the AQIM Islamist ideology.359 The Joint Staff does not see an end to AQIM without a significant change in

  3. The Study of New Religious Movements and the Process of Radicalization in Terrorist Groups

    Science.gov (United States)

    2009-11-01

    Apocalyptic beliefs: While in most instances holding apocalyptic beliefs does not foster explicit violence, it can set in place certain attitudes and...socialization and preparation for violence; (3) the demonization of opponents; (4) exemplary- dualism . The embodiment of each of these typical features of an...aggravate this situation in ways that foster ever more extreme behaviour. Four of the relevant management issues are: (1) maintaining the leader’s

  4. Terrorist and Organized Crime Groups in the Tri-Border Area (TBA) of South America

    Science.gov (United States)

    2003-07-01

    do Iguaçu], “Muslims Prevail Among Small Religions in Foz,” February 3, 2003, as translated for FBIS, “Highlights From the Tri-Border Press for the...www.ajc.org/InTheMedia/PublicationsPrint.asp?did=555] 23 Gazeta do Iguaçu [Foz do Iguaçu], “Muslims Prevail Among Small Religions in Foz,” February 3...la Seguridad y Delitos del Siglo XXI, Escuela Superior de Gendarmería, Buenos Aires, 1996, 13-16. Library of Congress – Federal Research Division

  5. How Terrorist Groups End: Lessons for Countering al Qa’ida

    Science.gov (United States)

    2008-01-01

    Soda tribe recently helped U.S. forces find IEDs [improvised explosive devices] that had been planted by their own tribesmen, and they have...necessary “preventive medicine ” to thwart Soviet inroads.34 Komer argued that the police were in regular contact with the popula- tion; could serve...PO Kosovo Liberation Army (Macedonia, Serbia, Montenegro ) 1992–1999 10,000s LM PF N TC V Ku Klux Klan (U.S.) 1866– 1,000s H F RW SR — Kuki Liberation

  6. Changing the Story: The Role of the Narrative in the Success or Failure of Terrorist Groups

    Science.gov (United States)

    2009-12-01

    Advisor Hy Rothstein Second Reader Gordon McCormick Chairman, Department of Defense Analysis iv THIS PAGE INTENTIONALLY LEFT BLANK v...terrible dictatorship and put in place a democracy.66 65 Clay Ramsay and Angela Stephens, "Among Key

  7. Authorities for Military Operations Against Terrorist Groups: The State of the Debate and Options for Congress

    Science.gov (United States)

    2016-01-01

    of these operations are high-precision strikes conducted by special forces ground teams or air- ground attack aircraft, such as armed drones , with...The unsettling truth is that the difference between a plot to attack a local mall in Kenya , for example, and a mall in Europe or the United States may

  8. Why Failing Terrorist Groups Persist Revisited: A Social Network Approach to AQIM Network Resilience

    Science.gov (United States)

    2017-12-01

    the approach and methods used in this analysis to organize, analyze, and explore the geospatial, statistical , and social network data...requirements for the degree of MASTER OF SCIENCE IN INFORMATION STRATEGY AND POLITICAL WARFARE from the NAVAL POSTGRADUATE SCHOOL December...research utilizes both descriptive statistics and regression analysis of social network data to explore the changes within the AQIM network 2012

  9. The Dynamic Terrorist Threat: An Assessment of Group Motivations and Capabilities in a Changing World

    Science.gov (United States)

    2004-01-01

    Liberty and Disneyland ,15 and some of the hijackers, such as Mohammad Atta, enrolled in flight schools in preparation for the attack.16 Although al...Tower, the Golden Gate Bridge, Disneyland , and Universal Studios. The tapes were allegedly shot by Ghasoub Abrash Ghalyoun in 1997. See Walter Pincus...information on the finances of FARC, see “Los Costos del Cese al Fuego,” El País, July 6, 2000; “El Otro Plan Colombia,” Cambio, March 20, 2000, pp. 25–26

  10. A Global Overview of Narcotics-Funded Terrorist and Other Extremist Groups

    Science.gov (United States)

    2002-05-01

    Comunidades en Conflicto Arauco-Malleco), which is the most radical branch of the Mapuche insurgent movement.300 Method of Funding The FARC’s... mapuches con las Farc,” La Tercera de la Hora [Santiago], March 14, 2000. 301 Gregory A Walker, “Combatting a Criminal Insurgency,” Jane’s

  11. Combating Terrorism: A Case Study of Nigeria Against Boko Haram Terrorist Group

    Science.gov (United States)

    2014-06-13

    Many scholars on terrorism have pointed to a sense of alienation felt by immigrants , particularly those living in Europe, as a driver of terrorism.39...culture most times are different from those of the immigrants . As a result, they become irritated and begin to feel excluded from the society around...158Nick Chiles , “After Rejecting Nigeria’s Amnesty Offer, Boko Haram Continues to Kill,” Atlanta

  12. A First Look on iMiner's Knowledge base and Detecting Hidden Hierarchy of Riyadh Bombing Terrorist Network

    DEFF Research Database (Denmark)

    Memon, Nasrullah

    2007-01-01

      - Data collection is difficult to any network analysis because it is difficult to create a complete network.  It is not easy to gain information on terrorist networks.  It is fact that terrorist organizations do not provide information on their members and the government rarely allows researche...

  13. Facilitating improved road safety based on increased knowledge about driving behaviour and profiling sub-groups of drivers

    DEFF Research Database (Denmark)

    Martinussen, Laila Marianne

    The aim of the Ph.D. study presented in this thesis was to facilitate improved road safety through increased understanding of methods used to measure driving behaviour, and through increased knowledge about driving behaviour in sub-groups of drivers. More specifically, the usefulness of the Driver...... with underlying mechanisms of lack of focus, emotional stress, recklessness and confusion, and hence it is highly important to further explore means to making drivers become more focused or attentive when driving, and to deal with emotional responses in traffic like impatience and frustration (Article 1). 2......, indicating that the problem lies in the drivers’ attitudes towards safety (Article 3). 6. It is indicated that rather than viewing safety and risk as two ends of a continuum, safety and risk should be understood as two separate constructs, with different underlying motives. Therefore it is suggested...

  14. Group A rotavirus and norovirus display sharply distinct seasonal profiles in Belém, northern Brazil

    Directory of Open Access Journals (Sweden)

    Jones Anderson Monteiro Siqueira

    2013-08-01

    Full Text Available Several viruses have been associated with acute gastroenteritis (AGE, and group A rotavirus (RVA and nor-ovirus (NoV are the most prevalent. This study aimed to assess their prevalence among children hospitalised for diarrhoea during a three-year surveillance study. From May 2008-April 2011, overall positivity rates of 21.6% (628/2904 and 35.4% (171/483 were observed for RVA and NoV, respectively. The seasonality observed indicated distinct patterns when both viruses were compared. This finding may explain why hospitalisation for AGE remains constant throughout the year. Continuous AGE monitoring is needed to better assess the patterns of infection.

  15. ANTI-TERROR POLICY OF UZBEKISTAN IN THE FRAMEWORK OF THE REGIONAL ANTI-TERRORIST POLICY OF THE SCO

    Directory of Open Access Journals (Sweden)

    С П Базылева

    2017-12-01

    Full Text Available The beginning of the XXI century was marked by a number of serious problems, including cancer, world hunger, environmental problems and increasing every year the problem of global terrorism, which poses a great threat to the security of the modern multipolar world. Uzbekistan today occupies a firm position in fight against terrorist threat. The principled position of Uzbekistan in the fight against terrorism is that “no country should exclude their participation in the fight against global terrorism, there must be no transit zones and "green corridors" for terrorist organizations”. The Central Asian region is one of the most vulnerable, because it is necessary to pay special attention to the strategy of the anti-terrorist security of the countries included in the structure of the Central Asian region. In this article, we consider the anti-terrorist policy of Uzbekistan in the framework of the regional anti-terrorist policy of the SCO.

  16. Urinary arsenic speciation profile in ethnic group of the Atacama desert (Chile) exposed to variable arsenic levels in drinking water.

    Science.gov (United States)

    Yáñez, Jorge; Mansilla, Héctor D; Santander, I Paola; Fierro, Vladimir; Cornejo, Lorena; Barnes, Ramón M; Amarasiriwardena, Dulasiri

    2015-01-01

    Ethnic groups from the Atacama Desert (known as Atacameños) have been exposed to natural arsenic pollution for over 5000 years. This work presents an integral study that characterizes arsenic species in water used for human consumption. It also describes the metabolism and arsenic elimination through urine in a chronically exposed population in northern Chile. In this region, water contained total arsenic concentrations up to 1250 μg L(-1), which was almost exclusively As(V). It is also important that this water was ingested directly from natural water sources without any treatment. The ingested arsenic was extensively methylated. In urine 93% of the arsenic was found as methylated arsenic species, such as monomethylarsonic acid [MMA(V)] and dimethylarsinic acid [DMA(V)]. The original ingested inorganic species [As(V)], represent less than 1% of the total urinary arsenic. Methylation activity among individuals can be assessed by measuring primary [inorganic As/methylated As] and secondary methylation [MMA/DMA] indexes. Both methylation indexes were 0.06, indicating a high biological converting capability of As(V) into MMA and then MMA into DMA, compared with the control population and other arsenic exposed populations previously reported.

  17. Metabolic profile in two physically active Inuit groups consuming either a western or a traditional Inuit diet

    DEFF Research Database (Denmark)

    Munch-Andersen, Thor; Olsen, David B.; Søndergaard, Hans

    2012-01-01

    Objectives: To evaluate the effect of regular physical activity on metabolic risk factors and blood pressure in Inuit with high BMI consuming a western diet (high amount of saturated fatty acids and carbohydrates with a high glycemic index). Study design: Cross sectional study, comparing Inuit...... eating a western diet with Inuit eating a traditional diet. Methods: Two physically active Greenland Inuit groups consuming different diet, 20 eating a traditional diet (Qaanaaq) and 15 eating a western diet (TAB), age (mean (range)); 38, (22–58) yrs, BMI; 28 (20–40) were subjected to an oral glucose...... tolerance test (OGTT), blood sampling, maximal oxygen uptake test, food interview/collection and monitoring of physical activity. Results: All Inuit had a normal OGTT. Fasting glucose (mmol/l), HbA1c (%), total cholesterol (mmol/l) and HDL-C (mmol/l) were for Qaanaaq women: 4.8±0.2, 5.3±0.1, 4.96±0.42, 1...

  18. Bat Caliciviruses and Human Noroviruses Are Antigenically Similar and Have Overlapping Histo-Blood Group Antigen Binding Profiles.

    Science.gov (United States)

    Kocher, Jacob F; Lindesmith, Lisa C; Debbink, Kari; Beall, Anne; Mallory, Michael L; Yount, Boyd L; Graham, Rachel L; Huynh, Jeremy; Gates, J Edward; Donaldson, Eric F; Baric, Ralph S

    2018-05-22

    Emerging zoonotic viral diseases remain a challenge to global public health. Recent surveillance studies have implicated bats as potential reservoirs for a number of viral pathogens, including coronaviruses and Ebola viruses. Caliciviridae represent a major viral family contributing to emerging diseases in both human and animal populations and have been recently identified in bats. In this study, we blended metagenomics, phylogenetics, homology modeling, and in vitro assays to characterize two novel bat calicivirus (BtCalV) capsid sequences, corresponding to strain BtCalV/A10/USA/2009, identified in Perimyotis subflavus near Little Orleans, MD, and bat norovirus. We observed that bat norovirus formed virus-like particles and had epitopes and receptor-binding patterns similar to those of human noroviruses. To determine whether these observations stretch across multiple bat caliciviruses, we characterized a novel bat calicivirus, BtCalV/A10/USA/2009. Phylogenetic analysis revealed that BtCalV/A10/USA/2009 likely represents a novel Caliciviridae genus and is most closely related to "recoviruses." Homology modeling revealed that the capsid sequences of BtCalV/A10/USA/2009 and bat norovirus resembled human norovirus capsid sequences and retained host ligand binding within the receptor-binding domains similar to that seen with human noroviruses. Both caliciviruses bound histo-blood group antigens in patterns that overlapped those seen with human and animal noroviruses. Taken together, our results indicate the potential for bat caliciviruses to bind histo-blood group antigens and overcome a significant barrier to cross-species transmission. Additionally, we have shown that bat norovirus maintains antigenic epitopes similar to those seen with human noroviruses, providing further evidence of evolutionary descent. Our results reiterate the importance of surveillance of wild-animal populations, especially of bats, for novel viral pathogens. IMPORTANCE Caliciviruses are

  19. Profile of European radiotherapy departments contributing to the EORTC Radiation Oncology Group (ROG) in the 21st century

    International Nuclear Information System (INIS)

    Budiharto, Tom; Musat, Elena; Poortmans, Philip; Hurkmans, Coen; Monti, Angelo; Bar-Deroma, Raquel; Bernstein, Zvi; Tienhoven, Geertjan van; Collette, Laurence; Duclos, Frederic; Davis, Bernard; Aird, Edwin

    2008-01-01

    Purpose: Since 1982, the Radiation Oncology Group of the EORTC (EORTC ROG) has pursued an extensive Quality Assurance (QA) program involving all centres actively participating in its clinical research. The first step is the evaluation of the structure and of the human, technical and organisational resources of the centres, to assess their ability to comply with the current requirements for high-tech radiotherapy (RT). Materials and methods: A facility questionnaire (FQ) was developed in 1989 and adapted over the years to match the evolution of RT techniques. We report on the contents of the current FQ that was completed online by 98 active EORTC ROG member institutions from 19 countries, between December 2005 and October 2007. Results: Similar to the data collected previously, large variations in equipment, staffing and workload between centres remain. Currently only 15 centres still use a Cobalt unit. All centres perform 3D Conformal RT, 79% of them can perform IMRT and 54% are able to deliver stereotactic RT. An external reference dosimetry audit (ERDA) was performed in 88% of the centres for photons and in 73% for electrons, but it was recent (<2 years) in only 74% and 60%, respectively. Conclusion: The use of the FQ helps maintain the minimum quality requirements within the EORTC ROG network: recommendations are made on the basis of the analysis of its results. The present analysis shows that modern RT techniques are widely implemented in the clinic but also that ERDA should be performed more frequently. Repeated assessment using the FQ is warranted to document the future evolution of the EORTC ROG institutions

  20. A comparative analysis of cardiovascular disease risk profiles of five Pacific ethnic groups assessed in New Zealand primary care practice: PREDICT CVD-13.

    Science.gov (United States)

    Grey, Corina; Wells, Sue; Riddell, Tania; Pylypchuk, Romana; Marshall, Roger; Drury, Paul; Elley, Raina; Ameratunga, Shanthi; Gentles, Dudley; Erick-Peletiy, Stephanie; Bell, Fionna; Kerr, Andrew; Jackson, Rod

    2010-11-05

    Data on the cardiovascular disease risk profiles of Pacific peoples in New Zealand is usually aggregated and treated as a single entity. Little is known about the comparability or otherwise of cardiovascular disease (CVD) risk between different Pacific groups. To compare CVD risk profiles for the main Pacific ethnic groups assessed in New Zealand primary care practice to determine if it is reasonable to aggregate these data, or if significant differences exist. A web-based clinical decision support system for CVD risk assessment and management (PREDICT) has been implemented in primary care practices in nine PHOs throughout Auckland and Northland since 2002, covering approximately 65% of the population of these regions. Between 2002 and January 2009, baseline CVD risk assessments were carried out on 11,642 patients aged 35-74 years identifying with one or more Pacific ethnic groups (4933 Samoans, 1724 Tongans, 1366 Cook Island Maori, 880 Niueans, 1341 Fijians and 1398 people identified as Other Pacific or Pacific Not Further Defined). Fijians were subsequently excluded from the analyses because of a probable misclassification error that appears to combine Fijian Indians with ethnic Fijians. Prevalences of smoking, diabetes and prior history of CVD, as well as mean total cholesterol/HDL ratio, systolic and diastolic blood pressures, and Framingham 5-year CVD risk were calculated for each Pacific group. Age-adjusted risk ratios and mean differences stratified by gender were calculated using Samoans as the reference group. Cook Island women were almost 60% more likely to smoke than Samoan women. While Tongan men had the highest proportion of smoking (29%) among Pacific men, Tongan women had the lowest smoking proportion (10%) among Pacific women. Tongan women and Niuean men and women had a higher burden of diabetes than other Pacific ethnic groups, which were 20-30% higher than their Samoan counterparts. Niuean men and women had lower blood pressure levels than all

  1. Natural endocrine profiles of the group-living skunk anemonefish Amphiprion akallopisos in relation to their size-based dominance hierarchy.

    Science.gov (United States)

    Mills, S C; O'Donnell, J L; Bernardi, G; Beldade, R

    2018-03-01

    Group-living animals commonly display differences in behaviour, physiology and endocrine profiles between conspecifics within the group, which are tightly linked to reproduction. Teleosts exhibit a variety of social systems, where social status, as well as sex, has been linked to different androgen and oestrogen profiles. Levels of gonadal androgen and oestrogen were investigated as a function of sex and position in a social hierarchy in free-living individuals of the skunk anemonefish Amphiprion akallopisos, a protandrous pomacentrid fish with a size-based dominance hierarchical social system. Plasma levels of 11-ketotestosterone (11-KT), testosterone (T) and 17β-oestradiol (E 2 ), as well as conversion ratios from T, were measured by ELISA from 111 individuals along a linear hierarchy from 38 social groups in the wild. Blood plasma levels of 11-KT and E 2 showed sex differences, being higher in males and females respectively as expected based on their role as the major androgen and oestrogen in fish reproduction. However, no sex differences were found for T, which may represent its role in territorial defence or simply as a precursor for the synthesis of 11-KT and E 2 . In terms of the hierarchical social system within males, 11-KT levels decline as the hierarchy is descended, which may represent their decreasing reproductive opportunity, as well as the decreasing levels of aggression towards males lower in the hierarchy. In summary, the size-based dominance hierarchy is associated with distinct steroid levels of 11-KT and E 2 between individual free-living A. akallopisos that closely resemble those of species in which breeding individuals suppress reproduction of conspecifics lower in the hierarchy. © 2018 The Fisheries Society of the British Isles.

  2. CTC Sentinel. January 2008, Volume 1 Issue 2. A Profile of Tehrik-i-Taliban Pakistan

    Science.gov (United States)

    2008-01-01

    executing attacks. By sharing information with other terrorist groups, al-Qa`ida became the “Jihad’s Franchise ” by using the internet to connect...of terrorist activities or causes. Recruiters can log into chat rooms or visit cyber- cafes to find receptive members of the public, especially the...the worst that globalization and advanced community technologies have to offer. Al-Qa`ida is a virtual “network of networks,” a jihadist franchise

  3. Breaching the Fortress Wall. Understanding Terrorist Efforts to Overcome Defensive Technologies

    Science.gov (United States)

    2007-01-01

    that affect, in overlapping ways, sequential parts of the terrorist activity chain (Figure 1.2). The purposes of each of these types of technologies...fication lineup .51 The ways in which PIRA chose to manage operations also contrib- uted to its overall counterforensic effort. For example, although

  4. Iraagi väitel tuleb iga teine terrorist Süüriast / Igor Taro

    Index Scriptorium Estoniae

    Taro, Igor

    2007-01-01

    Bagdadis elurajooni turul hukkus enesetapurünnakus 130 inimest. Iraagi kõrge valitsusametniku sõnul tuleb 50% terrorist üle Süüria piiri. Iraagi peaminister Nuri al-Maliki arvamus. Vt. samas: Mässulised leiavad tuge internetist

  5. The Terrorist and the Media: Partners in Crime or Rituals and Harmless Observers?

    Science.gov (United States)

    Dowling, Ralph E.

    This paper explores the idea that the media "cause" or strongly motivate acts of terrorism. In an effort to refute this view the paper applies Kenneth Burke's dramatistic theory of communication to show that the motives and behavior of political terrorists can be explained without reference to the media coverage terrorism produces. The…

  6. 75 FR 75904 - Global Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist...

    Science.gov (United States)

    2010-12-07

    ... Terrorism Sanctions Regulations; Terrorism Sanctions Regulations; Foreign Terrorist Organizations Sanctions... Foreign Assets Control (``OFAC'') of the U.S. Department of the Treasury is amending the Global Terrorism Sanctions Regulations (``GTSR'') and the Terrorism Sanctions Regulations (``TSR'') to expand the scope of...

  7. Social categorization and fear reactions to the September 11th terrorist attacks

    NARCIS (Netherlands)

    Dumont, M.; Yzerbyt, V.Y.; Wigboldus, D.H.J.; Gordijn, E.H.

    2003-01-01

    Two experiments were run in The Netherlands and Belgium 1 week after the terrorist attacks against the World Trade Center in New York on September 11, 2001. The aim was to investigate whether social categorization affected emotional reactions, behavioral tendencies, and actual behaviors. Results

  8. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  9. Lone Actor Terrorist Attack Planning and Preparation : A Data-Driven Analysis

    NARCIS (Netherlands)

    Schuurman, B.W.; Bakker, E.; Gill, P.; Bouhana, N.

    2017-01-01

    This article provides an in-depth assessment of lone actor terrorists’ attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented

  10. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?

    Science.gov (United States)

    1999-09-01

    for School Killers,” New York Times, June 21, 1999, A10. Della Porta, Donatella. “ Political Socialization in Left-Wing Underground Organizations...Newsletter of the Association of Former Intelligence Officers, 22, No. 1, 1997. Wasmund, Klaus. “The Political Socialization of West German Terrorists.” In

  11. Reasoning about Emotional Contents Following Shocking Terrorist Attacks: A Tale of Three Cities

    Science.gov (United States)

    Blanchette, Isabelle; Richards, Anne; Melnyk, Laura; Lavda, Anastasia

    2007-01-01

    The authors examined reasoning following the terrorist attacks carried out in London in July 2005. They tested participants in London (United Kingdom), Manchester (United Kingdom), and London (Canada) within 1 week of the attacks and again 6 months later. Participants reasoned about syllogisms of 3 types: neutral, generally emotional, and…

  12. In Their Own Words? Methodological Considerations in the Analysis of Terrorist Autobiographies

    Directory of Open Access Journals (Sweden)

    Mary Beth Altier

    2012-01-01

    Full Text Available Despite the growth of terrorism literature in the aftermath of the 9/11 attacks, there remain several methodological challenges to studying certain aspects of terrorism. This is perhaps most evident in attempts to uncover the attitudes, motivations, and intentions of individuals engaged in violent extremism and how they are sometimes expressed in problematic behavior. Such challenges invariably stem from the fact that terrorists and the organizations to which they belong represent clandestine populations engaged in illegal activity. Unsurprisingly, these qualities make it difficult for the researcher to identify and locate willing subjects of study—let alone a representative sample. In this research note, we suggest the systematic analysis of terrorist autobiographies offers a promising means of investigating difficult-to-study areas of terrorism-related phenomena. Investigation of autobiographical accounts not only offers additional data points for the study of individual psychological issues, but also provides valuable perspectives on the internal structures, processes, and dynamics of terrorist organizations more broadly. Moreover, given most autobiographies cover critical events and personal experiences across the life course, they provide a unique lens into how terrorists perceive their world and insight into their decision-making processes. We support our advocacy of this approach by highlighting its methodological strengths and shortcomings.

  13. Activist or Terrorist? Negotiating Discourses of Eco-Terror in "If a Tree Falls"

    Science.gov (United States)

    Olson, Jade

    2018-01-01

    Environmentalist voices like the Earth Liberation Front have been labeled "eco-terrorists." The 2011 documentary film "If a Tree Falls" explores how "eco-terrorism" troubles the unstable border between activism and terrorism. This essay offers a textual analysis of the film's negotiation of the activism/terrorism…

  14. Preemption and Retribution: Precision-Guided Munitions to Counter Terrorist Threats

    Science.gov (United States)

    1998-04-01

    story are told. Terrorists have become skilled at cultivating 18 the " underdog " image and portraying their adversaries as ruthless aggressors...Frontiers, Israel’s War Against Terrorism, London: Arms and Armour Publications, 1990. Schmemann, Serge. " Netanyahu Defiantly Defending Botched

  15. Analysing Personal Characteristics of Lone-Actor Terrorists : Research Findings and Recommendations

    NARCIS (Netherlands)

    Roy, de van Zuijdewijn J.; Bakker, E.

    2016-01-01

    This Research Note presents the outcome of a project that looked at the personal characteristics of lone-actor terrorists. It is part of the larger Countering Lone-Actor Terrorism (CLAT) project. The project described here aimed to improve understanding of, and responses to, the phenomenon of

  16. Attention and Memory in School-Age Children Surviving the Terrorist Attack in Beslan, Russia

    Science.gov (United States)

    Scrimin, Sara; Moscardino, Ughetta; Capello, Fabia; Axia, Giovanna

    2009-01-01

    Little is known about the impact of terrorism on children's cognitive functioning and school learning. The primary purpose of this study was to report on cognitive functioning among school-age children 20 months after a terrorist attack against their school. Participants included 203 directly and indirectly exposed children from Beslan and 100…

  17. Analytical technique to address terrorist threats by chemical weapons of mass destruction

    Science.gov (United States)

    Dempsey, Patrick M.

    1997-01-01

    Terrorism is no longer an issue without effect on the American mind. We now live with the same concerns and fears that have been commonplace in other developed and third world countries for a long time. Citizens of other countries have long lived with the specter of terrorism and now the U.S. needs to be concerned and prepared for terrorist activities.T he terrorist has the ability to cause great destructive effects by focusing their effort on unaware and unprepared civilian populations. Attacks can range from simple explosives to sophisticated nuclear, chemical and biological weapons. Intentional chemical releases of hazardous chemicals or chemical warfare agents pose a great threat because of their ready availability and/or ease of production, and their ability to cause widespread damage. As this battlefront changes from defined conflicts and enemies to unnamed terrorists, we must implement the proper analytical tools to provide a fast and efficient response. Each chemical uses in a terrorists weapon leaves behind a chemical signature that can be used to identify the materials involved and possibly lead investigators to the source and to those responsible. New tools to provide fast and accurate detection for battlefield chemical and biological agent attack are emerging. Gas chromatography/mass spectrometry (GC/MS) is one of these tools that has found increasing use by the military to respond to chemical agent attacks. As the technology becomes smaller and more portable, it can be used by law enforcement personnel to identify suspected terrorist releases and to help prepare the response; define contaminated areas for evacuation and safety concerns, identify the proper treatment of exposed or affected civilians, and suggest decontamination and cleanup procedures.

  18. Managing mild casualties in mass-casualty incidents: lessons learned from an aborted terrorist attack.

    Science.gov (United States)

    Bloch, Yuval H; Leiba, Adi; Veaacnin, Nurit; Paizer, Yohanan; Schwartz, Dagan; Kraskas, Ahuva; Weiss, Gali; Goldberg, Avishay; Bar-Dayan, Yaron

    2007-01-01

    Mildly injured and "worried well" patients can have profound effects on the management of a mass-casualty incident. The objective of this study is to describe the characteristics and lessons learned from an event that occurred on 28 August 2005 near the central bus station in Beer-Sheva, Israel. The unique profile of injuries allows for the examination of the medical and operational aspects of the management of mild casualties. Data were collected during and after the event, using patient records and formal debriefings. They were processed focusing on the characteristics of patient complaints, medical response, and the dynamics of admission. A total of 64 patients presented to the local emergency department, including two critical casualties. The remaining 62 patients were mildly injured or suffered from stress. Patient presentation to the emergency department was bi-phasic; during the first two hours following the attack (i.e., early phase), the rate of arrival was high (one patient every three minutes), and anxiety was the most frequent chief complaint. During the second phase, the rate of arrival was lower (one patient every 27 minutes), and the typical chief complaint was somatic. Additionally, tinnitus and complaints related to minor trauma also were recorded frequently. Psychiatric consultation was obtained for 58 (91%) of the patients. Social services were involved in the care of 47 of the patients (73%). Otolaryngology and surgery consultations were obtained for 45% and 44%, respectively. The need for some medical specialties (e.g., surgery and orthopedics) mainly was during the first phase, whereas others, mainly psychiatry and otolaryngology, were needed during both phases. Only 13 patients (20%) needed a consultation from internal medicine. Following a terrorist attack, a large number of mildly injured victims and those experiencing stress are to be expected, without a direct relation to the effectiveness of the attack. Mildly injured patients tend to

  19. Preventing Terrorist Bombings on United States Subway Systems

    Science.gov (United States)

    2006-09-01

    cleanup, and structural assessment.5 The economic impact of the attack would cost millions in repairs and lost revenue, and public trust would be...houses over a dozen restaurants and other businesses and serves as the “ basement level” for the major high-rise buildings in Philadelphia. An... Arabian Peninsula and Northern Africa, the “profiling appearance” is not a viable solution. As a result, prevention efforts must emphasize the

  20. Know Your Rights on Campus: A Guide on Racial Profiling, and Hate Crime for International Students in the United States.

    Science.gov (United States)

    Harvard Civil Rights Project, Cambridge, MA.

    This guide to the rights of international students explains racial profiling and hate crimes. Since the terrorist attacks of September 11, 2001, many immigrants and international students have experienced heightened scrutiny and outright discrimination. Racial profiling refers to the reliance by law enforcement officers on a person's ethnicity,…

  1. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    Energy Technology Data Exchange (ETDEWEB)

    Medina, Richard M [ORNL; Siebeneck, Laura K. [University of Utah; Hepner, George F. [University of Utah

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  2. Notes on the Analysis of Political Profiles and Careers. The study of Ruling Groups in a Hinterland Province of Argentina. (Mendoza, 1852-1900

    Directory of Open Access Journals (Sweden)

    Eliana Valeria Fucili

    2018-01-01

    Full Text Available This paper provides some theses to enrich studies on the conformation and characterization of nineteenth century Argentinean ruling groups. For this purpose, the article takes as its object of study the political teams of the Mendoza province that emerged during the second half of the 19th century, and presents solid empirical evidence to identify a set of 725 political actors responsible of embodying and activating the dynamics of the provincial state. This information has been analyzed with quantitative methods and qualitative tools such as prosopography, sociological interpretations and sociability analyses, allowing us to distinguish several features of the local leadership. A wide variety of documents—official records, departmental dispatches, press of the time— was used to investigate these questions, in order to explore the variables related to the unfolding of these actors’ political careers: their socio-professional profile, their continuity or permanence in public service positions, and the projection of their itineraries. As a whole, the article constitutes a contribution to current historiographical debates about the relative complexity of the nineteenth century political system and the role of provincial and local political groups in the process of shaping the Argentine national state. This study also represents a substantive advance in regard to literature about elites and ruling teams, which has been based on meager and unsystematic data, producing hasty generalizations that have nevertheless been taken as valid indicators to define a broad political spectrum.

  3. Forensic Analysis of Terrorist Counter-Financing to Combat Nuclear Proliferation

    Energy Technology Data Exchange (ETDEWEB)

    Drame, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Toler, L. [Brookhaven National Lab. (BNL), Upton, NY (United States); Bachner, Katherine [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2016-02-01

    The single greatest threat to U.S. homeland security remains the proliferation of nuclear weapons, especially among terrorists and other non-state actors who are not governed by the Non-Proliferation Treaty. One of the most important tools for combating terrorism among such rogue actors is counter-financing. Without funding, terrorists cannot acquire, maintain, or deploy nuclear weapons. According to the official report of the 9/11 Commission, counter-financing could have prevented the attacks of September 11, 2001. Unfortunately, no single country can defeat global terrorism. Successful counter-financing requires significant international cooperation. Since 2001, the United States and the European Union, despite vastly different approaches to intelligence gathering, have shared information through the Terrorist Finance Tracking Program (TFTP). That shared information allows authorities to trace suspicious transactions, identify culprits, and map out global terrorist networks. The TFTP successfully thwarted a 2011 plot to assassinate the Saudi Arabian Ambassador to the U.S. and multiple threats during the 2012 Summer Olympics in London; it also aided in the investigation of the 2013 Boston Marathon bombing. That program is necessary but not sufficient. To strengthen our ability to detect and disrupt terrorist plotting and prevent nuclear proliferation, we must expand and coordinate two additional transnational measures: (1) the Society for Worldwide Interbank Financial Telecommunications (SWIFT), a standardized global messaging network for financial institutions to quickly, accurately, and securely send and receive money transfer instructions, and (2) International Bank Account Numbers (IBAN) to identify individual accounts involved in international transactions. Both initiatives were incompletely adopted in the wake of 9/11, but most global banks use one or neither. More fully implementing and coordinating these two systems would allow for coherent information

  4. PLUTON: A Three-Group Model for the Radial Distribution of Plutonium, Burnup, and Power Profiles in Highly Irradiated LWR Fuel Rods

    International Nuclear Information System (INIS)

    Lemehov, Sergei; Nakamura, Jinichi; Suzuki, Motoe

    2001-01-01

    A three-group model (PLUTON) is described, which predicts the power density distribution, plutonium buildup, and burnup profiles across the fuel pellet radius as a function of in-pile time and parameters characterizing the type of reactor system with respect to fuel temperature and changes of density during the irradiation period. The PLUTON model is a part of two fuel performance codes (ASFAD and FEMAXI-V), which provide all necessary input for this model, mainly local temperatures and fuel matrix density across the radius. Comparisons between measurements and predictions of the PLUTON model are made on fuels with enrichments in the range 2.9 to 8.25% and with burnup between 21 000 and 64 000 MWd/t. It is shown that the PLUTON predictions are in good agreement with measurements as well as with predictions of the well-known TUBRNP model. The proposed model is flexibly applicable for all types of light water reactor (LWR) fuels, including mixed oxide, and for fuel tested in the Organization for Economic Corporation and Development's Halden heavy water reactor. The PLUTON three-group model is based on analytical (theoretical) consideration of neutron absorption in a resonant region of the fuel in its apparent form. It makes the model more flexible in comparison with the semi-empirical TUBRNP one-group model and allows the physically based model analysis of commercial LWR-type fuels at high burnup as well as analysis of experimental fuel rods tested in the Halden heavy water reactor, which is one of the main test reactors in the world. The differences in fuel behavior in the Halden reactor in terms of burnup distribution and plutonium buildup can be more clearly understood with the PLUTON model

  5. Improvised explosive devices: pathophysiology, injury profiles and current medical management.

    Science.gov (United States)

    Ramasamy, A; Hill, A M; Clasper, J C

    2009-12-01

    The improvised explosive device (IED), in all its forms, has become the most significant threat to troops operating in Afghanistan and Iraq. These devices range from rudimentary home made explosives to sophisticated weapon systems containing high-grade explosives. Within this broad definition they may be classified as roadside explosives and blast mines, explosive formed pojectile (EFP) devices and suicide bombings. Each of these groups causeinjury through a number of different mechanisms and can result in vastly different injury profiles. The "Global War on Terror" has meant that incidents which were previously exclusively seen in conflict areas, can occur anywhere, and clinicians who are involved in emergency trauma care may be required to manage casualties from similar terrorist attacks. An understanding of the types of devices and their pathophysiological effects is necessary to allow proper planning of mass casualty events and to allow appropriate management of the complex poly-trauma casualties they invariably cause. The aim of this review article is to firstly describe the physics and injury profile from these different devices and secondly to present the current clinical evidence that underpins their medical management.

  6. Review of the Estimates for the Impact of the September 11, 2001, Terrorist Attacks on New York Tax Revenues

    National Research Council Canada - National Science Library

    2002-01-01

    As a follow-up to our May 2002 report, reviewing the estimates of the economic impact of the September 11, 2001, terrorist attacks on New York, Congress requested additional information on New York tax revenues...

  7. 48 CFR 252.209-7001 - Disclosure of ownership or control by the government of a terrorist country.

    Science.gov (United States)

    2010-10-01

    ...) (a) Definitions. As used in this provision— (1) Government of a terrorist country includes the state... the government of which has repeatedly provided support for acts of international terrorism. As of the...

  8. The quest for significance model of radicalization: implications for the management of terrorist detainees.

    Science.gov (United States)

    Dugas, Michelle; Kruglanski, Arie W

    2014-01-01

    Radicalization and its culmination in terrorism represent a grave threat to the security and stability of the world. A related challenge is effective management of extremists who are detained in prison facilities. The major aim of this article is to review the significance quest model of radicalization and its implications for management of terrorist detainees. First, we review the significance quest model, which elaborates on the roles of motivation, ideology, and social processes in radicalization. Secondly, we explore the implications of the model in relation to the risks of prison radicalization. Finally, we analyze the model's implications for deradicalization strategies and review preliminary evidence for the effectiveness of a rehabilitation program targeting components of the significance quest. Based on this evidence, we argue that the psychology of radicalization provides compelling reason for the inclusion of deradicalization efforts as an essential component of the management of terrorist detainees. Copyright © 2014 John Wiley & Sons, Ltd.

  9. Licensing issues in the context of terrorist attacks on nuclear power plants

    International Nuclear Information System (INIS)

    Danwitz, T. von

    2002-01-01

    The terrorist attack on the World Trade Center in September 2001 has prompted enhanced nuclear risk awareness among the German population. But in the current public debate about the safety of nuclear power plants in Germany in times of new dimensions of danger, aspects such as the role of the constitutional law, the German Atomic Energy Act, and the regulatory system governing nuclear power plant licensing in the context of protection and safety have not been addressed. The author therefore discusses the German nuclear power plant licensing law and administrative regime, elaborating on the significance attributed in those bodies of law to risks like terrorist attacks on nuclear power plants. (orig./CB) [de

  10. ‘Let the Punishment Match the Offence’: Determining Sentences for Australian Terrorists

    Directory of Open Access Journals (Sweden)

    Nicola McGarrity

    2013-04-01

    Full Text Available To date, 38 men have been charged with terrorism offences in Australia. Twenty-six have been convicted. The article commences with an overview of the factual circumstances leading to these convictions. This provides important background for the following discussion of a largely unexplored issue in Australian anti-terrorism law and policy, namely, the difficulties faced by the Australian courts in adapting traditional sentencing principles to the (for the most part, preparatory terrorism offences enacted by the Commonwealth Parliament after the 9/11 terrorist attacks. Of particular interest are how the courts determine the objective seriousness of these offences and the respective weight placed upon deterrence (both specific and general and the rehabilitation of convicted terrorists.

  11. A data fusion approach to indications and warnings of terrorist attacks

    Science.gov (United States)

    McDaniel, David; Schaefer, Gregory

    2014-05-01

    Indications and Warning (I&W) of terrorist attacks, particularly IED attacks, require detection of networks of agents and patterns of behavior. Social Network Analysis tries to detect a network; activity analysis tries to detect anomalous activities. This work builds on both to detect elements of an activity model of terrorist attack activity - the agents, resources, networks, and behaviors. The activity model is expressed as RDF triples statements where the tuple positions are elements or subsets of a formal ontology for activity models. The advantage of a model is that elements are interdependent and evidence for or against one will influence others so that there is a multiplier effect. The advantage of the formality is that detection could occur hierarchically, that is, at different levels of abstraction. The model matching is expressed as a likelihood ratio between input text and the model triples. The likelihood ratio is designed to be analogous to track correlation likelihood ratios common in JDL fusion level 1. This required development of a semantic distance metric for positive and null hypotheses as well as for complex objects. The metric uses the Web 1Terabype database of one to five gram frequencies for priors. This size requires the use of big data technologies so a Hadoop cluster is used in conjunction with OpenNLP natural language and Mahout clustering software. Distributed data fusion Map Reduce jobs distribute parts of the data fusion problem to the Hadoop nodes. For the purposes of this initial testing, open source models and text inputs of similar complexity to terrorist events were used as surrogates for the intended counter-terrorist application.

  12. [Stories and drawings by children after the 2015 terrorist attacks in Paris].

    Science.gov (United States)

    Poget, Marc; Bouaziz, Nora; Apter, Gisèle

    2016-01-01

    Through the stories and drawings of children in a medical-psychological centre, it is possible to explore their psychological representations of the terrorist attacks which took place in Paris in January 2015. This work highlights the need to rethink the methods of care provided to these children in order to adapt them to their specific needs. Copyright © 2016 Elsevier Masson SAS. All rights reserved.

  13. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    Science.gov (United States)

    2004-04-01

    are forced into prostitution, pornography and sweatshop labor, it becomes an obvious and direct threat to the fabric of our society.3 Add terrorists... impacts the U.S. Finally, many nation states are on the brink of thriving or failing, and their fate depends either on us…or the “help” of organized...and social fabric of societies came to light in the mid-1990s. Aggravating factors include globalization of business networks, lowered trade

  14. Spatial proximity and the risk of psychopathology after a terrorist attack

    OpenAIRE

    DiMaggio, Charles; Galea, Sandro; Emch, Michael

    2010-01-01

    Previous studies concerned with the relation of proximity to the September 11, 2001 terrorist attacks and subsequent psychopathology have produced conflicting results. The goals of this analysis are to assess the appropriateness of using Bayesian hierarchical spatial techniques to answer the question of the role of proximity to a mass trauma as a risk factor for psychopathology. Using a set of individual-level Medicaid data for New York State, and controlling for age, gender, median household...

  15. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    International Nuclear Information System (INIS)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli

    2010-01-01

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  16. Terrorists or cowards: negative portrayals of male Syrian refugees in social media

    OpenAIRE

    Rettberg, Jill Walker; Gajjala, Radhika

    2015-01-01

    This paper examines images and words shared on the Twitter hashtag #refugeesNOTwelcome to understand the portrayal of male Syrian refugees in a post-9/11 context where the Middle-Eastern male is often primarily cast as a potential terrorist. Queer theorist Jasbir Puar (2007) and Middle- East scholar Paul Amar (2011) provide us with a theoretical approach to make sense of the contradictions we see emerging in this social media context.

  17. Strengthening Hospital Surge Capacity in the Event of Explosive or Chemical Terrorist Attacks

    Science.gov (United States)

    2009-03-01

    and become more specialized and efficient over the past decade in order to survive in the tight financial markets . Capacity is not keeping pace...Surge Capacity for Terrorist Bombings,” Atlanta, Georgia, (April 2007): 6. 197 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler ...activated in several bombings, 200 S. Einav, Z. Feigenberg, C. Weissman, D. Zolchik, G. Caspi, D. Kotler

  18. Is magnetic resonance imaging safe for patients with retained metal fragments from combat and terrorist attacks?

    Energy Technology Data Exchange (ETDEWEB)

    Eshed, Iris; Kushnir, Tamar; Shabshin, Noga; Konen, Eli (Dept. of Diagnostic Imaging, Sheba Medical center, Tel Hashomer, Sackler School of Medicine, Tel Aviv Univ., Tel Aviv (Israel)), e-mail: iris.eshed@sheba.health.gov.il

    2010-03-15

    Background: Increasing numbers of military confrontations and terrorist attacks have led to increasing reports of retained metal fragments among patients referred for magnetic resonance imaging (MRI). The potential hazard of retained metal fragments for patients undergoing MRI has been studied among patients with retained metal fragments from domestic violence but not from combat and terrorist attacks. Purpose: To retrospectively evaluate the safety of MRI in patients with subcutaneous warfare-metal fragments. Material and Methods: 10,322 consecutive metal screening forms of patients scheduled for 1.5 Tesla (T) MR examination were retrospectively reviewed. All patients reported to have retained metal fragments were contacted by telephone and asked to describe the event in which they were exposed to the fragments and for any adverse sequelae or sensations during and after MRI. Their radiographs were evaluated for the number and size of the fragments. The data were analyzed for correlations between these factors. Results: Seven of the 24 patients who reported retained metal fragments were excluded, since there was no validating evidence of their presence. Fragments in the remaining 17 patients (18 MRI examinations) were inflicted by military or terrorist attacks that occurred 2-39 years prior to the MRI. The fragment size ranged between 1 and 10 mm. One patient reported a superficial migration of a 10-mm fragment after MRI. No other adverse reactions were reported. Conclusion: Conducting 1.5T MRI examinations is safe in patients with retained metal fragments from combat and terrorist attacks not in the vicinity of vital organs. However, caution is advised.

  19. A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol

    OpenAIRE

    Avoine , Gildas; Bultel , Xavier; Gambs , Sébastien; Gerault , David; Lafourcade , Pascal; Onete , Cristina; Robert , Jean-Marc

    2017-01-01

    International audience; Distance-bounding protocols have been introduced to thwart relay attacks against contactless authentication protocols. In this context, veri-fiers have to authenticate the credentials of untrusted provers. Unfortunately , these protocols are themselves subject to complex threats such as terrorist-fraud attacks, in which a malicious prover helps an accomplice to authenticate. Provably guaranteeing the resistance of distance-bounding protocols to these attacks is a compl...

  20. [Treatment strategies for mass casualty incidents and terrorist attacks in trauma and vascular surgery : Presentation of a treatment concept].

    Science.gov (United States)

    Friemert, B; Franke, A; Bieler, D; Achatz, A; Hinck, D; Engelhardt, M

    2017-10-01

    The treatment of patients in the context of mass casualty incidents (MCI) represents a great challenge for the participating rescue workers and clinics. Due to the increase in terrorist activities it is necessary to become familiar with this new kind of threat to civilization with respect to the medical treatment of victims of terrorist attacks. There are substantial differences between a "normal" MCI and a terrorist MCI with respect to injury patterns (blunt trauma vs. penetrating/perforating trauma), the type and form of the incident (MCI=static situation vs. terrorist attack MCI= dynamic situation) and the different security positions (rescue services vs. police services). This article is concerned with question of which changes in the surgical treatment of patients are made necessary by these new challenges. In this case it is necessary that physicians are familiar with the different injury patterns, whereby priority must be given to gunshot and explosion (blast) injuries. Furthermore, altered strategic and tactical approaches (damage control surgery vs. tactical abbreviated surgical care) are necessary to ensure survival for as many victims of terrorist attacks as possible and also to achieve the best possible functional results. It is only possible to successfully counter these new challenges by changing the mindset in the treatment of terrorist MCI compared to MCI incidents. An essential component of this mindset is the acquisition of a maximum of flexibility. This article would like to make a contribution to this problem.

  1. Lone Actor Terrorist Attack Planning and Preparation: A Data-Driven Analysis.

    Science.gov (United States)

    Schuurman, Bart; Bakker, Edwin; Gill, Paul; Bouhana, Noémie

    2017-10-23

    This article provides an in-depth assessment of lone actor terrorists' attack planning and preparation. A codebook of 198 variables related to different aspects of pre-attack behavior is applied to a sample of 55 lone actor terrorists. Data were drawn from open-source materials and complemented where possible with primary sources. Most lone actors are not highly lethal or surreptitious attackers. They are generally poor at maintaining operational security, leak their motivations and capabilities in numerous ways, and generally do so months and even years before an attack. Moreover, the "loneness" thought to define this type of terrorism is generally absent; most lone actors uphold social ties that are crucial to their adoption and maintenance of the motivation and capability to commit terrorist violence. The results offer concrete input for those working to detect and prevent this form of terrorism and argue for a re-evaluation of the "lone actor" concept. © 2017 The Authors. Journal of Forensic Sciences published by Wiley Periodicals, Inc. on behalf of American Academy of Forensic Sciences.

  2. The Internet information infrastructure: Terrorist tool or architecture for information defense?

    Energy Technology Data Exchange (ETDEWEB)

    Kadner, S.; Turpen, E. [Aquila Technologies Group, Albuquerque, NM (United States); Rees, B. [Los Alamos National Lab., NM (United States)

    1998-12-01

    The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizing possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.

  3. The challenge of preparation for a chemical, biological, radiological or nuclear terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexander David

    2006-01-01

    Full Text Available Terrorism is not a new phenomenon, but, in the contemporary scene, it has established itself in a manner which commands the most serious attention of the authorities. Until relatively recently, the major threat has been through the medium of conventional weaponry and explosives. Their obvious convenience of use and accessibility guarantees that such methods will continue to represent a serious threat. However, over the last few years, terrorists have displayed an enthusiasm for higher levels of carnage, destruction and publicity. This trend leads inexorably to the conclusion that chemical, biological, radiological and nuclear (CBRN methods will be pursued by terrorist organisations, particularly those which are well organised, are based on immutable ideological principles, and have significant financial backing. Whilst it is important that the authorities and the general public do not risk over-reacting to such a threat (otherwise, they will do the work of the terrorists for them, it would be equally ill-advised to seek comfort in denial. The reality of a CBRN event has to be accepted and, as a consequence, the authorities need to consider (and take seriously how individuals and the community are likely to react thereto and to identify (and rehearse in a realistic climate what steps would need to be taken to ameliorate the effects of such an event.

  4. Rising threat of terrorist bomb blasts in Karachi--a 5-year study.

    Science.gov (United States)

    Mirza, Farhat Hussain; Parhyar, Hamid Ali; Tirmizi, Syed Zubair Ahmed

    2013-08-01

    This study aims to determine the frequency of injuries and fatalities associated with terrorist bomb explosions in the city of Karachi from 1 January 2007 to 31 December 2011. Moreover, this study is aimed to determine age and sex vulnerability among the victims of blast explosion. A descriptive cross-sectional study was conducted. The study was carried out at mortuaries and medicolegal sections at Jinnah Postgraduate Medical Center, Civil Hospital and Abbasi-Shaheed Hospital Karachi, the three main hospitals, which cater to all these cases of Karachi. The study included all bomb blast victims examined and autopsied from January 2007 to December 2011 at Jinnah Postgraduate Medical Center, Civil Hospital and Abbassi Shaheed Hospital Karachi. Details of 1142 cases were collected for those medicolegal deaths and injured persons, identified to be the victims of bomb blasts from January 2007 to December 2011. Data were collected on a preformed proforma from the mortuaries and medicolegal sections of these three public sector hospitals. The variables investigated include age, gender, year-wise distribution of the injured and the dead along with the cause of death and body parts injured in survivors. Out of the total 11,109 autopsies during the study period, 249 (2.24%) were carried out on deaths due to bomb blasts. Similarly, 135,065 injury cases were reported during the study period out of which 893 (0.66%) cases were due to bomb blasts. An initial peak in the year 2007, followed by a decline in 2008 and since then a steady rise of bomb blast incidences with casualties and fatalities, has been observed. The highest numbers of injured victims were reported in the year 2010 and fatalities in 2007. Among 1142 cases, 95.18% were male and 4.82% female with a male to female ratio of 19.76:1. Persons of ages between 15 and 45 years were chiefly involved. Shock due to multiple injuries was the leading cause of death, followed by head injury with or without haemorrhage. The

  5. PopAffiliator: online calculator for individual affiliation to a major population group based on 17 autosomal short tandem repeat genotype profile.

    Science.gov (United States)

    Pereira, Luísa; Alshamali, Farida; Andreassen, Rune; Ballard, Ruth; Chantratita, Wasun; Cho, Nam Soo; Coudray, Clotilde; Dugoujon, Jean-Michel; Espinoza, Marta; González-Andrade, Fabricio; Hadi, Sibte; Immel, Uta-Dorothee; Marian, Catalin; Gonzalez-Martin, Antonio; Mertens, Gerhard; Parson, Walther; Perone, Carlos; Prieto, Lourdes; Takeshita, Haruo; Rangel Villalobos, Héctor; Zeng, Zhaoshu; Zhivotovsky, Lev; Camacho, Rui; Fonseca, Nuno A

    2011-09-01

    Because of their sensitivity and high level of discrimination, short tandem repeat (STR) maker systems are currently the method of choice in routine forensic casework and data banking, usually in multiplexes up to 15-17 loci. Constraints related to sample amount and quality, frequently encountered in forensic casework, will not allow to change this picture in the near future, notwithstanding the technological developments. In this study, we present a free online calculator named PopAffiliator ( http://cracs.fc.up.pt/popaffiliator ) for individual population affiliation in the three main population groups, Eurasian, East Asian and sub-Saharan African, based on genotype profiles for the common set of STRs used in forensics. This calculator performs affiliation based on a model constructed using machine learning techniques. The model was constructed using a data set of approximately fifteen thousand individuals collected for this work. The accuracy of individual population affiliation is approximately 86%, showing that the common set of STRs routinely used in forensics provide a considerable amount of information for population assignment, in addition to being excellent for individual identification.

  6. Profile characterization of soil developed on pelitic rocks from the Bambui Group through chemical analysis, X-ray diffraction and Moessbaur spectroscopy

    International Nuclear Information System (INIS)

    Almeida Barbosa, L.C. de.

    1986-07-01

    Five sample from a Red-yellow latosol developed on pelitic rocks from the Bambui Group, located close to Paraopeba, state of Minas Gerais, Brazil, were collected and studied. The sample with color patterns varying from yellowish (sample SL11; 0.3m depth), in superficial horizons, to reddish (SL12; 1.0m) in intermediate profile positions, and various shades (SL14A and SL14V; 3.0m), in deeper horizons, were studied through Moessbauer spectroscopy in order to characterize, in detail, the ferruginous species present. The total iron content within the soil is practically constant in relation to the depth. Yet, the hematite/goethite content ratio varies within the expected sequence according to the color. A linear relationship was observed between the reddish intensity and the hematite content of the argillaceous fraction. The hematite contents are proportionally less in the SL14A sample, apparently due to deficient drainage in the past, and in the SL11 sample, due to organic matter effects. This latter sample is also characterized by at least two goethite populations: one with 20% mol replacing aluminum and another with certainly more than 30% mol. In to explan this difference, three hypothesis were elaborated. The most suitable one suggests that the goethite is destroyed and formed again through the soil column, in response to pedo environmental changes closer to the surface. (D.J.M.) [pt

  7. Does acute maternal stress in pregnancy affect infant health outcomes? Examination of a large cohort of infants born after the terrorist attacks of September 11, 2001

    Directory of Open Access Journals (Sweden)

    Conlin Ava Marie S

    2009-07-01

    Full Text Available Abstract Background Infants in utero during the terrorist attacks of September 11, 2001 may have been negatively affected by maternal stress. Studies to date have produced contradictory results. Methods Data for this retrospective cohort study were obtained from the Department of Defense Birth and Infant Health Registry and included up to 164,743 infants born to active-duty military families. Infants were considered exposed if they were in utero on September 11, 2001, while the referent group included infants gestating in the same period in the preceding and following year (2000 and 2002. We investigated the association of this acute stress during pregnancy with the infant health outcomes of male:female sex ratio, birth defects, preterm birth, and growth deficiencies in utero and in infancy. Results No difference in sex ratio was observed between infants in utero in the first trimester of pregnancy on September 11, 2001 and infants in the referent population. Examination of the relationship between first-trimester exposure and birth defects also revealed no significant associations. In adjusted multivariable models, neither preterm birth nor growth deficiencies were significantly associated with the maternal exposure to the stress of September 11 during pregnancy. Conclusion The findings from this large population-based study suggest that women who were pregnant during the terrorist attacks of September 11, 2001 had no increased risk of adverse infant health outcomes.

  8. Roots and Causes That Created the PKK Terrorist Organization

    Science.gov (United States)

    2013-09-01

    Kurdish Workers Party (PKK) as Criminal Syndicate : Funding Terrorism through Organized Crime, A Case Study,” Studies in Conflict & Terrorism 30, no. 10...and outside of the group. Rival organizations and individuals were put on the spot. Even columnists , criticizing Apocu movement, were targeted. A...Oslo’da Neler Oldu?” Aksam Gazetesi, April 24, 2013. Roth, Mitchel P. and Murat Sever. 2007. “The Kurdish Workers Party (PKK) as Criminal Syndicate

  9. Terrorist Precursor Crimes: Issues and Options for Congress

    Science.gov (United States)

    2007-05-24

    iterated by the purported comments of Abu Bakar Bashir, spiritual leader of the al Qaeda-linked Jemaah Islamiyah (JI), an Islamist group in Indonesia ...and law enforcement in recent years.61 In August 2006, Abdel-Ilah Elmardoudi was convicted for operating a phone card “shoulder surfing ” scheme in...identification fraud charges and the fourth defendant was cleared of all charges.64 Beyond calling card surfing , there has been increasing concern

  10. Terrorist Threats in the Basque Country: its Impact on the Psychosocial Sphere of Victims

    Directory of Open Access Journals (Sweden)

    Javier Martín-Peña

    2014-07-01

    Full Text Available The ceasefire of armed activities announced by ETA (Basque Homeland and Freedom in 2011 has fostered a debate about the violence and the victims of the terrorist organization. During those years, the violence perpetrated by ETA was characterized by bomb attacks and assassinations. In addition to this blatant violent behavior, a low-intensity violence was also taking place in the Basque Country, consisting of terrorist threats against their targets. There is, however, a lack of evidence-based research into this phenomenon. This investigation studies the impact of terrorist threats on the psychosocial functioning of people threatened by ETA in the Basque Country. Seventy-six people targeted by ETA completed self-reported survey. Terrorist threats and their derived psychosocial consequences were assessed by this way. The findings point out a relationship between terrorist threats and their psychosocial effects, which greatly affected the immediate environment of the targets too. The implications of these findings are discussed. El cese de la actividad armada anunciado por ETA (Euskadi ta Askatasuna – Euskadi y Libertad en 2011 ha promovido un debate sobre la violencia y las víctimas de la organización terrorista. Durante esos años, la violencia perpetrada por ETA se caracterizó por ataques con bombas y asesinatos. Además de este comportamiento claramente violento, en el País Vasco también se estaba produciendo una violencia de baja intensidad, consistente en amenazas terroristas contra sus objetivos. Sin embargo, no hay una investigación basada en la evidencia sobre este fenómeno. Esta investigación estudia el impacto de las amenazas terroristas en el funcionamiento psicosocial de las personas amenazadas por ETA en el País Vasco. Setenta y seis personas amenazadas por ETA completaron una encuesta de autoevaluación. Se evaluaron de esta forma las amenazas terroristas y sus consecuencias psicosociales derivadas. Los resultados indicaron

  11. Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations

    Science.gov (United States)

    2007-01-01

    used a number of violent video games 7 See, for example, the Anti-Defamation League study on extremist recruitment in prisons (B’nai B’rith, 2002). 8...compelling experience. The latest generations of computer-based, massively multiplayer online games (MMOGs), in which many individuals interact in a... effectiveness , those with that potential would require some specialization by the group (e.g., creation or subversion of massively multiplayer games for

  12. Leaving out control groups: an internal contrast analysis of gene expression profiles in atrial fibrillation patients--a systems biology approach to clinical categorization.

    Science.gov (United States)

    Vanhoutte, Kurt; de Asmundis, Carlo; Francesconi, Anna; Figysl, Jurgen; Steurs, Griet; Boussy, Tim; Roos, Markus; Mueller, Andreas; Massimo, Lucio; Paparella, Gaetano; Van Caelenberg, Kristien; Chierchia, Gian Battista; Sarkozy, Andrea; Terradellas, Pedro Brugada Y; Zizi, Martin

    2009-01-01

    Atrial fibrillation (AF) is a frequent chronic dysrythmia with an incidence that increases with age (>40). Because of its medical and socio-economic impacts it is expected to become an increasing burden on most health care systems. AF is a multi-factorial disease for which the identification of subtypes is warranted. Novel approaches based on the broad concepts of systems biology may overcome the blurred notion of normal and pathological phenotype, which is inherent to high throughput molecular arrays analysis. Here we apply an internal contrast algorithm on AF patient data with an analytical focus on potential entry pathways into the disease. We used a RMA (Robust Multichip Average) normalized Affymetrix micro-array data set from 10 AF patients (geo_accession #GSE2240). Four series of probes were selected based on physiopathogenic links with AF entryways: apoptosis (remodeling), MAP kinase (cell remodeling), OXPHOS (ability to sustain hemodynamic workload) and glycolysis (ischemia). Annotated probe lists were polled with Bioconductor packages in R (version 2.7.1). Genetic profile contrasts were analysed with hierarchical clustering and principal component analysis. The analysis revealed distinct patient groups for all probe sets. A substantial part (54% till 67%) of the variance is explained in the first 2 principal components. Genes in PC1/2 with high discriminatory value were selected and analyzed in detail. We aim for reliable molecular stratification of AF. We show that stratification is possible based on physiologically relevant gene sets. Genes with high contrast value are likely to give pathophysiological insight into permanent AF subtypes.

  13. Contribution of NAD 2D-NMR in liquid crystals to the determination of hydrogen isotope profile of methyl groups in miliacin

    Science.gov (United States)

    Berdagué, Philippe; Lesot, Philippe; Jacob, Jérémy; Terwilliger, Valery J.; Le Milbeau, Claude

    2016-01-01

    The hydrogen isotopic composition (δD or (D/H) value) of molecular biomarkers preserved in sedimentary archives is increasingly used to provide clues about the evolution of past climatic conditions. The rationale is that intact biomarkers retain isotopic information related to the climatic conditions that prevailed at the time of their synthesis. Some of these biomarkers may be degraded during diagenesis, however. The extent to which these degradations alter the original δD value of the source biomarker is presently debated and the capacity to resolve this question by determination of compound-specific δD values alone is limited. The ;bulk; or ;global; δD value of any molecule is in fact a composite of δD values at each site within this molecule (δDi or (D/H)i with i = number of hydrogen/deuterium atoms in the considered molecule). Determination of this site-specific δDi value in biomarkers could not only yield outstanding paleoenvironmental information but also help forecast the impacts of diagenesis and define essential steps in biosynthetic pathways. This task is analytically challenging. Here, we examined the capabilities of natural abundance deuterium 2D-NMR (NAD 2D-NMR) using homopolypeptide liquid crystals as an NMR solvent to: (i) analyze the NAD spectra of biomakers; (ii) determine the site-specific distribution of hydrogen in the nine methyl groups (δDMei with i = 23-31) of miliacin, a pentacyclic triterpene of the amyrin family and key biomarker for broomcorn millet in sedimentary archives. Relative (D/H)Mei values were established by anisotropic NAD 2D-NMR. Then absolute δDMei values were obtained by determining δDMei value of the methoxy group of miliacin using two independent approaches: isotropic NAD NMR (SNIF-NMR™) and GC-irMS. The resulting isotope profile for miliacin shows, for the first time, large variations in δDMei values that can directly be explained by biosynthetic processes. This approach has also the potential to permit

  14. Terror i tvillingtårnene – dystopi og ironi? 9/11 i Darlah og En terrorist i senga

    Directory of Open Access Journals (Sweden)

    Lersbryggen Mørk, Kjersti

    2011-03-01

    Full Text Available Terror in the Twin Towers – dystopia and irony? 9/11 in Darlah and En terrorist i senga. Through globalization of our media society, children as well as adults are endlessly exposed to information and images from all over the world. In Norway, signs of the terrorist attack on the Twin Towers in USA on September 11th 2001 are now to be found in literature for children and young adults. With globalization theory and post-colonial theory I will examine how two novels present global challenges in general and 9/11 in particular. What does globalization mean for the construction of identity? Who are “we”, and who are “the others”? The novel for young adults, Darlah – 172 timer på månen [Darlah – 172 hours on the moon] (2008 by Johan Harstad, is a dystopia where 9/11 points forward to a full scale catastrophe for humanity. En terrorist i senga [There's a terrorist in my bed] (2008, a novel for children by Endre Lund Eriksen, makes explicit references to 9/11 – but with playfulness and ironic revelation of xenophobia. Both books use aliens from outer space as “the other”, but where Darlah presents a pessimistic view of our global future, En terrorist i senga is optimistic on behalf of the humankind.

  15. Perfil dos médicos auditores no estado do Rio Grande do Sul Profile of a medical auditing group in the state of Rio Grande do Sul

    Directory of Open Access Journals (Sweden)

    Claus Michael Preger

    2005-04-01

    Full Text Available OBJETIVO: O presente artigo analisa o perfil do médico auditor no Estado do Rio Grande do Sul, tomando por base o grupo de médicos que participou dos cursos de pós-graduação em Auditoria em Saúde, Fundação Unimed, nas cidades de Porto Alegre e Caxias do Sul. MÉTODOS: Apresentamos uma revisão histórica, estudo das leis e normas que regem a função de médico auditor e uma revisão bibliográfica sobre a auditoria médica no Brasil. Foi aplicado um instrumento fechado, no qual constavam dados pessoais e de formação profissional, assim como relativos à satisfação pessoal, saúde e bem-estar do entrevistado. RESULTADOS: Responderam ao questionário 71 médicos auditores com um total de 85 funções de auditoria médica em locais diversos de trabalho: 83,8% do sexo masculino, com faixa de idade preponderante de 41 a 50 anos (38%, formados em média há 21,96 +/- 7,68 anos, com tempo de atuação em auditoria médica de 7,24 +/- 6,62 anos, e 88,7% possuem títulos universitários e/ou cursos de especialização médica nas mais diversas áreas de atuação. Do grupo pesquisado, 25,37% têm relação formal de emprego, 60% encontram-se satisfeitos como pessoa e como profissional, estando bem fisicamente. No grupo entrevistado, não existem médicos com menos de 33 anos de idade nem formados há menos de 7 anos. CONCLUSÕES: Fica evidente o alto grau de formação, especialização e de atualização dos médicos auditores entrevistados. O presente estudo contribuirá para que se possa estabelecer o perfil do médico auditor brasileiro.BACKGROUND: This paper aims to determine the profile of the medical auditor in the State of Rio Grande do Sul, Brazil, based upon a group of physicians who participated in the post-graduation courses of Unimed Foundation Health Auditing, in the cities of Porto Alegre and Caxias do Sul, together with other professionals performing the same activity in the State of Rio Grande do Sul. METHODS: A historical

  16. Stochastic nanopore sensors for the detection of terrorist agents: Current status and challenges

    Energy Technology Data Exchange (ETDEWEB)

    Liu Aihua; Zhao Qitao [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States); Guan Xiyun, E-mail: xguan@uta.edu [Department of Chemistry and Biochemistry, University of Texas at Arlington, Arlington, TX 76019-0065 (United States)

    2010-08-24

    Nanopore stochastic sensor works by monitoring the ionic current modulations induced by the passage of analytes of interest through a single pore, which can be obtained from a biological ion channel by self-assembly or artificially fabricated in a solid-state membrane. In this minireview, we overview the use of biological nanopores and artificial nanopores for the detection of terrorist agents including explosives, organophosphorus nerve agents, nitrogen mustards, organoarsenic compounds, toxins, and viruses. We also discuss the current challenge in the development of deployable nanopore sensors for real-world applications.

  17. Architectural and structural engineering aspects of protective design for nuclear power plants against terrorist attack

    International Nuclear Information System (INIS)

    Musacchio, J.M.; Rozen, A.

    1987-01-01

    This paper presents the results of several threat studies which have been performed, provides collective data on costs, and discusses, in a general sense, architectural/structural aspects of passive protection design measures which have been developed and utilized at several nuclear power plants. By combining relevant architectural and structural measures in the standard design, it is possible to substantially reduce the vulnerability of nuclear power plants to terrorist attack and the estimated damage to a manageable level with a minimal investment. (orig./HP)

  18. Finding the Wolves in Sheeps Clothing: Ways to Distinguish and Deter Lone-Wolf Terrorists

    Science.gov (United States)

    2015-03-01

    Mark Hamm, “Lone-wolf Terrorism in America: Forging a New Way of Looking at an Old Problem,” YouTube video, 7:32, posted by the National Institute...that factors that influence most lone-wolf terrorists include, “to varying degrees and in variable combinations: personal aversion or depression ...Russia.”97 Also discovered after the bombings, “Tamerlan had a YouTube account that he used to post and watch violent Islamic extremist videos starting

  19. The Treatment of Images in 11-M Terrorist Attacks. Terrorism and Violence in the Press

    Directory of Open Access Journals (Sweden)

    Dra. Emma Torres Romay

    2006-01-01

    Full Text Available In this paper we want to analyze the pictures publishing in the Spanish and international newspapers before the Madrid terrorist attack, March, 11. With this research we get some ideas about freedom speech limits: the respect of the privacy and, in special, the respect of the pain. At the same time, we´ll remark the importance of the photography in the press and their communication power. For this research we used the March, 11 and 12 newspapers of most important Spanish editors and the digital edition of international press.

  20. An assessment of the terrorist threat to use a nuclear or radiological device in an attack

    Energy Technology Data Exchange (ETDEWEB)

    Kingshott, B.F. [Grand Valley State University, 275C DeVos Center, 401 West Fulton Street, Grand Rapids, MI 49504 (United States)]. E-mail: kingshob@gvsu.edu

    2006-07-01

    This paper will discuss terrorism from the perspective of a terrorist organisation acquiring nuclear material to build weapons and how security of radiological material world wide will minimise the risk of such devices being used. It will discuss the need to improve security at nuclear waste processing and storage sites and the adequacy of current security. It will also discuss the phenomenon of suicide attacks by the bomb carriers and the role of the media in informing and educating the general public of the consequences should such a device containing nuclear material be detonated. (author)

  1. STR data for the AmpFlSTR Profiler loci from the three main ethnic population groups (Malay, Chinese and Indian) in Malaysia.

    Science.gov (United States)

    Lim, K B; Jeevan, N H; Jaya, P; Othman, M I; Lee, Y H

    2001-06-01

    Allele frequencies for the nine STRs genetic loci included in the AmpFlSTR Profiler kit were obtained from samples of unrelated individuals comprising 139-156 Malays, 149-153 Chinese and 132-135 Indians, residing in Malaysia.

  2. [The profile of Israeli travelers to developing countries: perspectives of a travel clinic].

    Science.gov (United States)

    Stienlauf, Shmuel; Meltzer, Eyal; Leshem, Eyal; Rendi-Wagner, Pamela; Schwartz, Eli

    2010-09-01

    The number of Israeli travelers is increasing, including the number of travelers to developing countries. This study aimed to characterize the profile of Israeli travelers to developing countries. Data regarding demographics, travel destinations, trip duration and the purpose of travel were collected on travelers attending the pre-travel clinic at the Sheba Medical Center during a period of 9 years. Between the dates 1/1/1999 and 31/12/2007, 42,771 travelers presented for consultation at the Sheba Medical Center pre-travel clinic. The average age was 30.8 +/- 13.4 years and 54% of the travelers were males. The female proportion increased from 42% in 1999 to 49% in 2006. There was a steady increase in the number of travelers attending our clinic, except in 2003 (coinciding with the SARS epidemic). Post-army backpackers (20-25 year-old age group) were only 43% of the travelers. Children (60 years) comprised 4.4% and 4.6% of the travelers, respectively. The favorite destinations were Asia (55%), followed by Latin America (27%) and Africa (13%). The distribution of travel destinations varied significantly during the study period. Of note is the sharp decline in travel to Africa following the terrorist attack in Mombassa, Kenya (November 2002). The median trip duration changed during the study period, from 30 to 45 days, between 1999-2004 and 2005-2007 respectively. The majority (87%) of voyagers traveled for pleasure, 6% went for business, and 7% were representatives of governmental organizations. This study found an increasing diversity in the traveler population (more women, more children and older travelers) and more diversity in travel destinations. Disease outbreaks and terrorist attacks had transient negative impacts on the number of travelers.

  3. The need to counter extremist terrorist manifestations in society and in the penal system

    Directory of Open Access Journals (Sweden)

    Kazberov P.N.

    2013-09-01

    Full Text Available The article discusses the need for inter-agency work to minimize the extremist-terrorist activities in the community. The problem of the psychology of extremism and terrorism are increasingly in the spotlight representatives of various scientific disciplines. First of all, there is no single legal science in all respects understanding of phenomena such as extremism and terrorism, their classification and evaluation, although a number of positive examples in this respect international cooperation is present. According to current data provided by the Investigative Committee of the Russian Federation, the General Prosecutor of the Russian Federation, the Russian Ministry of Internal Affairs, as well as the Moscow Bureau for Human Rights, extremism is a real threat to the national security of the Russian Federation. From the data of law enforcement should be the fact that most of the crimes of extremist and terrorist nature committed by persons of young age, the consciousness of which are susceptible to nationalist propaganda. A significant increase in informal youth movements extremist-nationalist orientation. The problem of expansion of extremism is also relevant for the penitentiary system of modern society. The very fact that a significant number of prisoners serving sentences for extremism and terrorism, illustrates the need for them special psychological and educational work

  4. Radiological preparedness in the case of a terrorist attack or an accident

    International Nuclear Information System (INIS)

    Cizmek, A.

    2005-01-01

    During the Cold War, every information about weapons of mass destruction was treated as top secret, regardless of whether the information concerned friend or foe. The most serious threat in our post Cold War era are terrorist radiological dispersal devices. Dirty nukes are what you may choose to build if you're unable to create a real nuclear bomb, i.e. one whose explosion is based on a nuclear reaction. A dirty bomb is a conventional explosive salted with radioactive isotopes in order to spew out that nuclear material and contaminate a wide area. The military usefulness of such devices have always been in dispute. In fact, the TNT in such a bomb may still be more dangerous than the nuclear material. Its destructive power would really depend on the size of the conventional bomb, and the volume and nature of nuclear material. This paper addresses the possibilities of decontamination and preparedness in the case of a terrorist attack or accident.(author)

  5. [Terrorist attack trauma - an individual entity of polytrauma : A 10-year update].

    Science.gov (United States)

    Güsgen, C; Franke, A; Hentsch, S; Kollig, E; Schwab, R

    2017-10-01

    The incidence of terrorist attacks is increasing worldwide, and they have also become a permanent threat in European cities. Due to its complexity, terrorist attack trauma places high demands on the strategy of surgical treatment. The combination of various mechanisms, explosions and gunshot injuries, with the characteristic pressure (blast) damage and a high proportion of penetrating trauma with simultaneous burns are characteristic features. Unlike in military conflicts, injuries to people of all ages and without ballistic body protection (body armor) are to be expected. The mechanism of the attack and its local conditions are of relevance for the assessment of the situation and the expected injury patterns. Thus, suicide attacks result in several times higher numbers of fatalities and casualties. Explosions on free ground lead to different types of injury than those in closed or semi-enclosed spaces. The treatment principles of the Advanced Trauma Life Support (ATLS®) are based on the intrahospital care of casualties as well as damage control strategies with trigger factors. In order to prepare and educate clinics and surgeons in Germany for such scenarios, various course formats of the professional societies, the German Society for General and Visceral Surgery (DGAV) and the German Society for Trauma Surgery (DGU) have now been established.

  6. Reflection in phraseological neology of traumatic historical events connected with the terrorist threat

    Directory of Open Access Journals (Sweden)

    Skorobogatova Taisiya Ivanovna

    2016-03-01

    Full Text Available The article is devoted to the analysis of phraseological units - neologisms which are associated with such traumatic historical events, as the implementation of terrorist acts. Particular emphasis is placed on the description of English, Russian and French phraseological units that have introduced the memory of the terrorist threat in the XX-XXI centuries.: Eng. That’s so 10th September (lit. today September 10, fig: Do not worry ahead of time about nothing; Rus. мочить в сортире (descriptor: беспощадно расправиться; фр. le prince s’est mari, le m chant est mort, c’est une semaine Walt Disney (lit. prince married the villain died, week Walt Disney; descriptor: Idyll, g n ration Bataclan (lit. Bataklan generation; descriptor: young people age of the victims who died in the “Bataklane”, i.e. young people aged 25-35. Phraseology description of new, emerging units is one of the most important problems in theoretical linguistics, namely: to illustrate and confirm the fact that the phrasebook body of a single national language is the result of the two memories - historical and linguistic. At the same time important to consider such a significant factor that determines the specificity of the national phraseological fund as memory selectivity in general and historical memory in particular.

  7. Plastic Surgery Management of Victims of Terrorist Violence in Ankara, Turkey.

    Science.gov (United States)

    İğde, Murat; Kaplan, Ahmet

    2017-12-01

    Terror attacks have been progressively increasing worldwide through the present era. The management of the consequences of terrorism events is under debate in almost every scientific area. The organization and advancement of health services constitute important components of the crisis management. Similar to other specialty areas in medicine, the medical management of terrorist attacks is becoming important in terms of plastic and reconstructive surgery.Ankara, the capital of Turkey, has been subject to 2 terrorist events in public places within a year. The total number of patients involved in both cases was 434. Ankara Numune Training and Research Hospital is a tertiary health care institution and one of the most important trauma centers in the region. A total of 178 Patients exposed to these events referred to our hospital. Of the total, 34 patients were completely or partially treated in the plastic and reconstructive surgery clinic. In this study, we tried to discuss the difficulties encountered in the classification of patients and plastic surgery during the treatment period of patients who experienced these attacks.Data were obtained from The National News Agency, hospital, and our own clinic registries. Patient classification was based on the injured parts of the body. Statistical analysis was performed for all data. In conclusion, the role and the importance of plastic surgery department especially in trauma management have been emphasized in the light of our findings.

  8. A project to develop restoration methods for buildings and facilities after a terrorist attack

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.F. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Div]|[Environment Canada, Ottawa, ON (Canada). River Road Environmental Technology Centre; Volchek, K.; Hornof, M.; Boudreau, L.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Best, M. [Health Canada, Ottawa, ON (Canada); Garbutt, M.; Krishnan, J.; Wagener, S.; Bernard, K. [Health Canada, Winnipeg, MB (Canada); Cousins, T.; Haslip, D. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2004-07-01

    A multi-agent project was initiated to review site restoration after a terrorist attack. The objective was to acquire and compile information on all known restoration procedures for buildings, exteriors of buildings, their interior contents, and adjacent areas such as parking lots, lawns and vehicles. All procedures were then tested and validated. Restoration procedures included pickup, neutralization, decontamination, removal and final destruction/deposition of the contaminant, cleaning material and contaminated debris resulting from the terrorist act. This research and development project considered chemical, biological and nuclear contamination with the intent to develop methods to decontaminate and restore buildings after a chemical, biological and radiological (CBR) attack. Ideas were collected from work conducted around the world. The efficacy of best candidates was tested along with all selected chemical target items. The project also involved the preparation of procedures for decontamination and restoration. Ultimately, a tradeoff decision basis will be developed to provide information on abandonment and quarantine versus cleanup. The study revealed that there are several technologies that can be used for the decontamination of structures and equipment after acts of terrorism, however, no one technique will work for all contaminants on all surfaces. The selection of a decontamination method depends on the contaminant, the surface being decontaminated and economic, social and health factors. The amount of waste generated by decontamination is a major feasibility factor. 25 refs., 6 tabs.

  9. Optimizing Visits to the Site of Death for Bereaved Families After Disasters and Terrorist Events.

    Science.gov (United States)

    Kristensen, Pål; Dyregrov, Atle; Weisæth, Lars; Straume, Marianne; Dyregrov, Kari; Heir, Trond; Bugge, Renate Grønvold

    2017-09-13

    In recent years it has been common after disasters and terrorist events to offer bereaved families the opportunity to visit the place where their loved ones died. Many report that such visits are beneficial in processing their loss. Various factors, both cognitive (eg, counteracting disbelief) and existential or emotional (eg, achieving a sense of closeness to the deceased), are associated with the experienced benefit. Nonetheless, exacerbations of trauma and grief reactions (eg, re-enactment fantasies) are common, with some of the bereaved also reporting adverse reactions after the visit. Subsequently, proper preparations are a prerequisite before such visits take place. This article describes how to optimize collective visits to the site of death after disasters or terrorist events for bereaved families. Important questions-for example, concerning those who should be responsible for organizing a visit and those who should be invited, the timing of the visit, what can be done at the site, the need for support personnel, and other practical issues-are discussed and general guidelines are recommended. (Disaster Med Public Health Preparedness. 2017;page 1 of 5).

  10. Defense against terroristic hazards and risk by building planning law; Abwehr terroristischer Gefahren und Risiken durch Bauplanungsrecht

    Energy Technology Data Exchange (ETDEWEB)

    Hopkins, Richard

    2012-07-01

    The book on defense against terroristic hazards and risk by building planning law includes the following issues: Introduction: civil engineering and safety. Risk, hazards and urban planning: historical and actual examples for the constructional danger prevention, terroristic threat and urban planning. Risk, hazards and terrorism: sociology and risk, law and risk, terrorism - risk or hazard? Answer to uncertainty - risk prevention, catastrophe law as link. Risk, hazard, terrorism and the public building and regional planning law: regional planning law as point of origin, building law and terrorism, possibility of control by the legal building regulations.

  11. The game-theoretic national interstate economic model : an integrated framework to quantify the economic impacts of cyber-terrorist behavior.

    Science.gov (United States)

    2014-12-01

    This study suggests an integrated framework to quantify cyber attack impacts on the U.S. airport security system. A cyber attack by terrorists on the U.S. involves complex : strategic behavior by the terrorists because they could plan to invade an ai...

  12. The 'overlooked trio' of hypothetical terrorist nuclear weapons - reactor grade plutonium, neptunium-237 and tritium

    International Nuclear Information System (INIS)

    Sholly, S.

    2002-01-01

    Full text: Considerations revolving around physical protection of nuclear material are quite commonly and naturally focused on protecting weapons-grade plutonium (WGPu) and highly enriched uranium (HEU) from theft and diversion. These two materials are the center of attention because of their well-known (and demonstrated) potential for use in first-generation nuclear explosive devices of which potential terrorists are widely thought to be capable. They are also the center of attention because of retirements of these materials from military use as the Russian Federation and the United States reduce the number of nuclear weapons in their arsenals. Three other materials - an 'overlooked trio' - must also be borne in mind within this context: (1) reactor-grade plutonium (RGPu); (2) neptunium-237 (Np-237); and (3) tritium (H-3). Although there are still some authorities who either contend that RGPu cannot be used in a nuclear explosive or that there are (for a terrorist) insurmountable difficulties in doing so, the knowledgeable scientific and technical community, recognizes the potential utility of RGPu for hypothetical terrorist nuclear devices. A much smaller community of experts recognizes the usefulness of Np-237 for nuclear devices, but Np-237 is as straight-forwardly and easily usable as HEU and similarly abundant (but not often in separated form). Tritium can be used (with a modest increase in design sophistication) in a conventional first-generation nuclear device with any of the weapons-usable materials (WGPu, HEU, RGPu or Np-237) to increase the yield and/or increase the reliability of a non-fizzle yield. Given the presence of RGPu and Np-237 in abundant quantities in spent commercial reactor fuel, widely available knowledge of how to separate these materials, and a world-wide total of more than 400 nuclear power plants, spent reactor fuel also requires stringent controls. This is especially true of old spent fuel which has far less radiation dose

  13. The effect of the September 11 terrorist attacks on suicide and deliberate self-harm : A time trend study

    NARCIS (Netherlands)

    De Lange, AW; Neeleman, J

    2004-01-01

    Suicide rates may be affected by world news. Our objective was to investigate the possible impact of the terrorist attacks of September 11, 2001, on suicidal behavior in the Netherlands. There was evidence of an increase in rates of suicide and deliberate self-harm in the weeks immediately following

  14. Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists (by Jeffrey Kahn, University of Michigan Press, 2013

    Directory of Open Access Journals (Sweden)

    Susan Ginsburg

    2014-04-01

    Full Text Available Since 9/11, migration-related security measures, including a growing reliance on watch-lists, have limited the right to travel. Jeffrey Kahn’s book, Mrs. Shipley’s Ghost: The Right to Travel and Terrorist Watchlists, examines the legal and policy questions raised by prohibitions on travel by US citizens. 

  15. Granting Concessions and Paying Ransoms to Terrorists: A Policy Options Analysis of the U.S. Policy on Hostage Recovery

    Science.gov (United States)

    2016-06-01

    businesses like General Motors, which received bailout money from the federal government, and the Catholic Church, which receives tax-exempt status...from gaining independence from France . Other examples of absolute terrorists include the Provisional Irish Republican Army (IRA), Hamas, and al...The conflict began when the IRA, which represented the Catholic minority, felt discriminated against by the Protestant majority, represented by

  16. 76 FR 39408 - Privacy Act of 1974; Department of Homeland Security/ALL-030 Use of the Terrorist Screening...

    Science.gov (United States)

    2011-07-06

    ... of Investigation (FBI)/Terrorist Screening Center (TSC) is providing a near real time, synchronized... appropriate clearances or permissions. Retention and disposal: The WLS will maintain a near real time mirror... difficulties they experienced during their travel screening at transportation hubs such as airports and train...

  17. Molecular screening for Candida orthopsilosis and Candida metapsilosis among Danish Candida parapsilosis group blood culture isolates: proposal of a new RFLP profile for differentiation

    DEFF Research Database (Denmark)

    Mirhendi, Hossein; Bruun, Brita; Schønheyder, Henrik Carl

    2010-01-01

    . Isolates with RFLP patterns distinct from C. parapsilosis were characterized by sequence analysis of the ITS1-ITS2, 26S rRNA (D1/D2) and SADH regions. Restriction patterns for the 3 species with each of 610 restriction enzymes were predicted in silico using 12 available sequences. By PCR-RFLP of the SADH......, respectively. This was confirmed using the reference strains and 79 clinical isolates. In conclusion, reliable discrimination was obtained by PCR-RFLP profile analysis of the SADH gene after digestion with NlaIII but not with BanI. C. metapsilosis and C. orthopsilosis are involved in a small but significant...

  18. The A0 blood group genotype modifies the jejunal glycomic binding pattern profile of piglets early associated with a simple or complex microbiota

    NARCIS (Netherlands)

    Priori, D.; Colombo, M.; Koopmans, S.J.; Jansman, A.J.M.; Meulen, van der J.; Trevisi, P.; Bosi, P.

    2016-01-01

    The intestinal epithelium glycocalyx sugar motif is an important determinant of the bacterial-host interaction and may be affected in pigs by gut microbiota and by blood group genotype. The aim was to study the effect of intestinal association with different microbiota and A0 blood group

  19. Construction of War Discourse on International News Agencies: Case Study Terrorist attacks November 13th 2015

    Directory of Open Access Journals (Sweden)

    Ángel TORRES-TOUKOUMIDIS

    2017-01-01

    Full Text Available This study analyzes warmongering rhetoric presented by international agencies Reuters, Al Arabiya, Al Jazeera and Associated Press (AP of the information related to the terrorist attacks in Paris on November 13th, 2015 for 15 days after the event. We have started from a quantitative and qualitative analysis of 550 information units using the software MAXQDA (v. 11.0.11. Subsequently, the semantic criteria of media discourse: functionality, significance and direction of the goal was applied on the selected sample. The results demonstrate the prevailing demonization of Islam, the exaltation of fear and panic in the discursive construction and it highlighted the spectacle of the information as a communicative strategy on the rhetorical guidance.

  20. War on Terror: Fantasy and Fiction Behind the Mythology of Terrorist Financing

    Directory of Open Access Journals (Sweden)

    El-Fatih A. Abdel Salam

    2009-06-01

    Full Text Available Documentary evidence shows that the series of financial crackdowns initiated since 9/11 have had virtually no impact on terrorism. This is because these efforts are based on a fundamental misconception on how terrorism works. The financial warriors’ predisposition to stereotypes about “Arabs and their money” allowed unsubstantiated rumours–such as Bin Laden’s personal fortune of $300 million–to become established as facts. This study exposes the extent to which Washington policymakers simply transposed the template for the war on drugs on to the war on terror, despite the fact that terrorism is not a profit–driven enterprise. The collateral damage inflicted on organisations like Al-Barakaat, the Somali remittance network, wrongly accused of channeling money to the terrorists, and others are counter-productive as they dent the image of the US in the Muslim world.

  1. Chronic thought suppression and posttraumatic symptoms: data from the Madrid March 11, 2004 terrorist attack.

    Science.gov (United States)

    Vázquez, Carmelo; Hervás, Gonzalo; Pérez-Sales, Pau

    2008-12-01

    Although a considerable number of people either witnessed directly or in the mass media the traumatic scenes of the terrorist attack that took place on March 11th, 2004 in Madrid, only a fraction of Madrid citizens developed posttraumatic symptoms. In this study, posttraumatic stress-related symptoms, degree of exposure, coping strategies related to the attack, and chronic attempts to avoid intrusive thoughts (i.e., thought suppression) were assessed in a general population Madrid sample (N=503) 2-3 weeks after the attacks. Our results showed that participants with higher scores in chronic thought suppression exhibited higher levels of PTSD symptoms. Higher scores in chronic thought suppression also correlated positively with the use of avoidant coping strategies after the attacks. We discuss the possible common roots of avoidance of intrusive thoughts and avoidant coping strategies and the implications of this relationship for the emergence of stress-related symptoms as well as for public health policies.

  2. Addressing the Foreign Terrorist Fighters Phenomenon From a European Union Perspective

    Directory of Open Access Journals (Sweden)

    Mark Singleton

    2014-12-01

    Full Text Available With the outbreak of civil war and sectarian violence in Syria, Iraq, and Libya, over 15,000 men and women from more than 80 countries around the world have left their homes to become foreign fighters. The security challenge they pose is immense and there are concerns about radicalised fighters returning to their countries of origin or residence, hardened by experience and with the possible intent – and the know-how – to engage in terrorist activities. On 24 September, the UN Security Council unanimously adopted Resolution 2178 (2014 with the support of over 120 states representing a broad cross-section of the UN membership. Resolution 2178 called on all UN member states to ensure increased border security and to screen for or arrest so-called “foreign terrorist fighters” (FTFs travelling to or returning from conflict areas. Rightly so, it also urges states to counter violent extremism by taking preventive measures, such as engaging with communities at the local level to stop the spread of extremist ideologies. On 23 October 2014, the Global Center on Cooperative Security, the Human Security Collective, and ICCT convened an expert meeting at the European Union (EU in Brussels to discuss the implications of the resolution and to explore appropriate and effective responses to the threat of FTFs, both within the EU and as part of the Union’s foreign security and development programming. Building upon the discussion in Brussels, this policy brief is a compilation of essays from all three organisations on the challenges and opportunities for addressing the FTF threat from a European Union perspective. It also examines the implementation of Resolution 2178 as an integral part of national and multilateral foreign security and development policies and initiatives.

  3. Molecular screening for Candida orthopsilosis and Candida metapsilosis among Danish Candida parapsilosis group blood culture isolates: proposal of a new RFLP profile for differentiation

    DEFF Research Database (Denmark)

    Mirhendi, Hossein; Bruun, Brita; Schønheyder, Henrik Carl

    2010-01-01

    Candida orthopsilosis and Candida metapsilosis are recently described species phenotypically indistinguishable from Candida parapsilosis . We evaluated phenotyping and molecular methods for the detection of these species among 79 unique blood culture isolates of the C. parapsilosis group obtained...

  4. A Dynamic Network Approach to the Assessment of Terrorist Groups and the Impact of Alternative Courses of Action

    National Research Council Canada - National Science Library

    Carley, Kathleen M

    2006-01-01

    Dynamic network analysis (DNA) is an emergent field centered on the collection, analysis, understanding and prediction of dynamic relations among various entities such as actors, events and resources and the impact...

  5. Ungoverned Spaces and the Survival of Terrorist Groups in Africa: A Case Study of the Lords Resistance Army

    Science.gov (United States)

    2015-12-01

    Shifting the Background.” 151Ibid., 178. 152Ibid., 178. 42 Westgate, Kenya has withstood other attacks on its soil including at bus parks and other...a leading tourist attraction in Tunis, killing 20 people and wounding 44 others.193 Most of the victims were from Japan, Italy, Colombia , Spain

  6. Stemming the Growth: Exploring the Risk Factors in Group Membership in Domestic Street Gangs and Foreign Terrorist Organizations

    Science.gov (United States)

    2015-09-01

    attempt to explain gang membership and offending and delinquent behavior. New CVE program developers may be able to use these same theories to help...outcome in question—in this case, gang membership. Gang research scholars have discovered a multitude of risk factors that are statistically linked...and offending and delinquent behavior, including cultural diffusion, differential association, social disorganization and strain theory. CVE program

  7. The Path to Terrorist Violence: A Threat Assessment Model for Radical Groups at Risk of Escalation to Acts of Terrorism

    Science.gov (United States)

    2005-09-01

    Weathermen was the applause they gave to the murder of movie actress Sharon Tate and her friends by Charles Manson and his “family”…the Weathermen... vs . wrong. Typical statements include “We must always be on the side of good and fight evil.” Truthfulness, truth-speaking and truth-acting; not...identified thirty-four variables in four major categories: (1) Historical, Cultural and Contextual Variables; (2) Key Actors 54 Affecting the

  8. Hypersexual, Sexually Compulsive, or Just Highly Sexually Active? Investigating Three Distinct Groups of Gay and Bisexual Men and Their Profiles of HIV-Related Sexual Risk

    Science.gov (United States)

    Rendina, H. Jonathon; Ventuneac, Ana; Moody, Raymond L.; Grov, Christian

    2015-01-01

    Emerging research supports the notion that sexual compulsivity (SC) and hypersexual disorder (HD) among gay and bisexual men (GBM) might be conceptualized as comprising three groups—Neither SC nor HD; SC only, and Both SC and HD—that capture distinct levels of severity across the SC/HD continuum. We examined data from 370 highly sexually active GBM to assess how the three groups compare across a range of risk factors for HIV infection. Comparisons focused on psychosexual measures—temptation for condomless anal sex (CAS), self-efficacy for avoiding CAS, sexual excitation and inhibition—as well as reports of actual sexual behavior. Nearly half (48.9 %) of this highly sexually active sample was classified as Neither SC nor HD, 30 % as SC Only, and 21.1 % as Both SC and HD. While we found no significant differences between the three groups on reported number of male partners, anal sex acts, or anal sex acts with serodiscordant partners, the Both SC and HD group reported higher numbers of CAS acts and CAS acts with serodiscordant partners and also had a higher proportion of their anal sex acts without condoms compared to the SC Only group. Our findings support the validity of a three-group classification system of SC/HD severity in differentiating psychosexual and HIV-related sexual risk behavior outcomes in a sample of GBM who report similarly high levels of sexual activity. Notwithstanding the need for sex positive HIV prevention programs, interventions that attempt to help Both SC and HD men deal with distress and address their psychosexual needs specifically may derive HIV prevention benefits. PMID:25750052

  9. Asthma and posttraumatic stress symptoms 5 to 6 years following exposure to the World Trade Center terrorist attack.

    Science.gov (United States)

    Brackbill, Robert M; Hadler, James L; DiGrande, Laura; Ekenga, Christine C; Farfel, Mark R; Friedman, Stephen; Perlman, Sharon E; Stellman, Steven D; Walker, Deborah J; Wu, David; Yu, Shengchao; Thorpe, Lorna E

    2009-08-05

    The World Trade Center Health Registry provides a unique opportunity to examine long-term health effects of a large-scale disaster. To examine risk factors for new asthma diagnoses and event-related posttraumatic stress (PTS) symptoms among exposed adults 5 to 6 years following exposure to the September 11, 2001, World Trade Center (WTC) terrorist attack. Longitudinal cohort study with wave 1 (W1) enrollment of 71,437 adults in 2003-2004, including rescue/recovery worker, lower Manhattan resident, lower Manhattan office worker, and passersby eligibility groups; 46,322 adults (68%) completed the wave 2 (W2) survey in 2006-2007. Self-reported diagnosed asthma following September 11; event-related current PTS symptoms indicative of probable posttraumatic stress disorder (PTSD), assessed using the PTSD Checklist (cutoff score > or = 44). Of W2 participants with no stated asthma history, 10.2% (95% confidence interval [CI], 9.9%-10.5%) reported new asthma diagnoses postevent. Intense dust cloud exposure on September 11 was a major contributor to new asthma diagnoses for all eligibility groups: for example, 19.1% vs 9.6% in those without exposure among rescue/recovery workers (adjusted odds ratio, 1.5 [95% CI, 1.4-1.7]). Asthma risk was highest among rescue/recovery workers on the WTC pile on September 11 (20.5% [95% CI, 19.0%-22.0%]). Persistent risks included working longer at the WTC site, not evacuating homes, and experiencing a heavy layer of dust in home or office. Of participants with no PTSD history, 23.8% (95% CI, 23.4%-24.2%) reported PTS symptoms at either W1 (14.3%) or W2 (19.1%). Nearly 10% (9.6% [95% CI, 9.3%-9.8%]) had PTS symptoms at both surveys, 4.7% (95% CI, 4.5%-4.9%) had PTS symptoms at W1 only, and 9.5% (95% CI, 9.3%-9.8%) had PTS symptoms at W2 only. At W2, passersby had the highest rate of PTS symptoms (23.2% [95% CI, 21.4%-25.0%]). Event-related loss of spouse or job was associated with PTS symptoms at W2. Acute and prolonged exposures were both

  10. Análise de conglomerados em curvas de aprendizado para formação de agrupamentos homogêneos de trabalhadores Cluster analysis of learning curves for grouping workers with homogeneous learning profiles

    Directory of Open Access Journals (Sweden)

    Renato Eduardo Stroieke

    2012-01-01

    Full Text Available Em diversos setores da indústria é desejado que trabalhadores reunidos em uma estação de trabalho apresentem perfil de aprendizado similar. O presente artigo apresenta um método de agrupamento de trabalhadores utilizando modelagem por curva de aprendizado e técnicas de clusterização. O método modela dados de desempenho de trabalhadores por intermédio de diversos modelos de curvas de aprendizado; os parâmetros de aprendizado dos modelos testados permitem predizer o desempenho dos trabalhadores em intervalos de tempo pré-determinados. Os valores preditos são agrupados através de ferramentas de clusterização. O maior índice de ajuste (IA, gerado a partir do Silhouette Index e do coeficiente de determinação, indica o modelo de curva mais consistente em termos de aderência aos dados e qualidade de agrupamento de perfis de aprendizado. Ao ser aplicado em dados de uma indústria de calçados, o método gerou agrupamentos consistentes de trabalhadores com base nos distintos perfis de aprendizado.In many industrial segments, it is desirable to allocate workers with similar learning profiles in the same workstation. This paper presents a method that groups workers based on learning curve modeling and clustering techniques. Workers' performance data are modeled through several learning curve models; learning parameters allow for workers' performance prediction at intervals of predetermined time. The predicted values are then grouped by clustering techniques. The largest Adjustment Index (AI, derived from the Silhouette Index and Coefficient of Determination, indicates the model yielding superior adherence to data and better clustering of learning profiles. When applied to a shoe manufacturing process, the method generated consistent groups of workers based on their learning profiles.

  11. Posse Comitatus and the Use of the Military in Denying Terrorist Access to the United States Along the Border with Mexico

    National Research Council Canada - National Science Library

    Thomas, Greg A

    2005-01-01

    .... The largely unsecured border we share with Mexico is an enticing avenue for illegal immigrants and drug smugglers but also, and more importantly, for potential terrorists hostile to the United States...

  12. Strong profiling is not mathematically optimal for discovering rare malfeasors

    Energy Technology Data Exchange (ETDEWEB)

    Press, William H [Los Alamos National Laboratory

    2008-01-01

    In a large population of individuals labeled j = 1,2,...,N, governments attempt to find the rare malfeasor j = j, (terrorist, for example) by making use of priors p{sub j} that estimate the probability of individual j being a malfeasor. Societal resources for secondary random screening such as airport search or police investigation are concentrated against individuals with the largest priors. They may call this 'strong profiling' if the concentration is at least proportional to p{sub j} for the largest values. Strong profiling often results in higher probability, but otherwise innocent, individuals being repeatedly subjected to screening. They show here that, entirely apart from considerations of social policy, strong profiling is not mathematically optimal at finding malfeasors. Even if prior probabilities were accurate, their optimal use would be only as roughly the geometric mean between a strong profiling and a completely uniform sampling of the population.

  13. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    International Nuclear Information System (INIS)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il'kaev, R.I.; Shapovalov, V.I.

    2004-01-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks

  14. How Belfius Bank's response to the terrorist attacks in Brussels helped embed business continuity in the company culture.

    Science.gov (United States)

    Jappens, Ludo

    2017-01-01

    Until 2015, major terrorist incidents in Belgium were considered a 'black swan'. However, the suicide attacks in Paris on 13th November, 2015 provided a wake-up call. Investigations revealed that the raid was prepared in Belgium by jihadists who grew up in Brussels and was coordinated by Belgian ISIS fighters in Syria. In an instant, it became clear that terror had been embedded in Belgian society and could erupt at any moment. At Belfius Bank Belgium, the subsequent months were a rollercoaster ride of terrorist-related events. Business activities were strongly affected, as the company's head office is located in the centre of Brussels. This paper focuses on the way Belfius responded to the events and how the lessons learned have helped to improve its business continuity and crisis management capability.

  15. Estimation of terrorist attack resistibility of dual-purpose cask TP-117 with DU (depleted uranium) gamma shield

    Energy Technology Data Exchange (ETDEWEB)

    Alekseev, O.G.; Matveev, V.Z.; Morenko, A.I.; Il' kaev, R.I.; Shapovalov, V.I. [Russian Federal Nuclear Center - All-Russian Research Inst. of Experimental Physics, Sarov (Russian Federation)

    2004-07-01

    Report is devoted to numerical research of dual-purpose unified cask (used for SFA transportation and storage) resistance to terrorist attacks. High resistance of dual-purpose unified cask has been achieved due to the unique design-technological solutions and implementation of depleted uranium in cask construction. In suggested variant of construction depleted uranium fulfils functions of shielding and constructional material. It is used both in metallic and cermet form (basing on steel and depleted uranium dioxide). Implementation of depleted uranium in cask construction allows maximal load in existing overall dimensions of the cask. At the same time: 1) all safety requirements (IAEA) are met, 2) dual-purpose cask with SFA has high resistance to terrorist attacks.

  16. Characterising the UK Terrorist Threat: The Problem with Non-Violent Ideology as a Focus for Counter-Terrorism and Terrorism as the product of ‘Vulnerability’

    OpenAIRE

    Anthony Richards

    2012-01-01

    This article investigates two particular aspects as to how the terrorist threat in the UK has been characterised, arguing that they both challenge conventional academic wisdom as to how terrorism should be conceptualised. While such conventional wisdom should always be open to challenge, and policymaking perspectives are different to those of academics, these two particular aspects as to how the terrorist threat has been perceived in the UK merit scrutiny, especially as counter-terrorism stra...

  17. 9/11, Act II : A Fine-Grained Analysis of Regional Variations in Traffic Fatalities in the Aftermath of the Terrorist Attacks

    OpenAIRE

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-01-01

    Terrorists can strike twice - first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variatio...

  18. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following Chemical Terrorist Attack: Introduction and Key Assessment Considerations

    OpenAIRE

    Watson, Annetta; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Dolislager, Fredrick; Love, Adam H.; Hanna, M. Leslie

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility reuse and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critica...

  19. Collision sensitive niche profile of the worst affected bird-groups at wind turbine structures in the Federal State of Brandenburg, Germany.

    Science.gov (United States)

    Bose, Anushika; Dürr, Tobias; Klenke, Reinhard A; Henle, Klaus

    2018-02-28

    Biodiversity-related impacts at wind energy facilities have increasingly become a cause of conservation concern, central issue being the collision of birds. Utilizing spatial information of their carcass detections at wind turbines (WTs), we quantified the detections in relation to the metric distances of the respective turbines to different land-use types. We used ecological niche factor analysis (ENFA) to identify combinations of land-use distances with respect to the spatial allocation of WTs that led to higher proportions of collisions among the worst affected bird-groups: Buntings, Crows, Larks, Pigeons and Raptors. We also assessed their respective similarities to the collision phenomenon by checking for overlaps amongst their distance combinations. Crows and Larks showed the narrowest "collision sensitive niche"; a part of ecological niche under higher risk of collisions with turbines, followed by that of Buntings and Pigeons. Raptors had the broadest niche showing significant overlaps with the collision sensitive niches of the other groups. This can probably be attributed to their larger home range combined with their hunting affinities to open landscapes. Identification of collision sensitive niches could be a powerful tool for landscape planning; helping avoid regions with higher risks of collisions for turbine allocations and thus protecting sensitive bird populations.

  20. Screening of patients for cochlear implant through a questionnaire online. GroupProfile of patients pre-and peri lingual not summoned

    Directory of Open Access Journals (Sweden)

    Leal, Aquiles Figueiredo

    2010-06-01

    Full Text Available Introduction: Facilitating access to specialized centers and properly screen patients seeking cochlear implants are critical steps for proper rehabilitation. Objective: To describe the group of patients pre-and peri-lingual is not called for in a service evaluation of cochlear implants. Method: A retrospective study analyzed 401 questionnaires of patients pre-and peri-lingual Web site registered in the Central Brazilian cochlear implant. For the failure to call these patients were used as criteria applied some variables: age, use of hearing aids, speech therapy, duration of deafness, type of progression of hearing loss and type of communication used by the patient. Results: The group of patients with pre-and peri-lingual deafness accounted for 34% of total questionnaires completed during the period. The distribution by age found that 54% of patients were over 17 years, 30% between 9 and 17 years, and remaining less than 9 years. The duration of deafness was higher than 20 years in 50% of patients, between 10 and 20 years by 32% between 5 and 10 years in 9% and between 0 and 5 years in 9%. Regarding the performance of voice rehabilitation 58% of patients had performed and 42% did not. Regarding the mode of communication 49% had global communication, 18% LIBRAS, 6% oral communication, 26% no communication. Conclusion: Advanced age, duration of deafness high, so mostly no oral communication and lack of voice rehabilitation were crucial to the failure to call these patients.

  1. Review of Studies of the Economic Impact of the September 11, 2001, Terrorist Attacks on the World Trade Center

    Science.gov (United States)

    2002-05-29

    of the Budget, • New York City Partnership and Chamber of Commerce , Washington, DC 20548 Report Documentation Page Report Date 29MAY2002 Report Type...700R Impact of Terrorist Attacks on the World Trade Center 10 Eight Studies (cont’d) ! New York City Partnership and Chamber of Commerce , Economic...Center 29 Observations Observations The New York City Partnership and Chamber of Commerce study generated the most comprehensive estimates—direct and

  2. What Are We Really Afraid Of? The Practitioner View of the Terrorist Threat in the United States

    Science.gov (United States)

    2005-03-01

    like intelligence gathering and courier work • 80% single • Familiarity with home ground. Thus terrorists come from both rural and urban areas • 66...codes also help disaggregate intra- - 114 - state regions by identifying urban areas from suburban and rural . Finally, through geographic mapping...National Laboratory for Tourism and eCommerce (NLTEC), University of Illinois at Urbana-Champaign. 2002. Self-Selection Biases in the Internet

  3. Magnitude Differences in Bioactive Compounds, Chemical Functional Groups, Fatty Acid Profiles, Nutrient Degradation and Digestion, Molecular Structure, and Metabolic Characteristics of Protein in Newly Developed Yellow-Seeded and Black-Seeded Canola Lines.

    Science.gov (United States)

    Theodoridou, Katerina; Zhang, Xuewei; Vail, Sally; Yu, Peiqiang

    2015-06-10

    Recently, new lines of yellow-seeded (CS-Y) and black-seeded canola (CS-B) have been developed with chemical and structural alteration through modern breeding technology. However, no systematic study was found on the bioactive compounds, chemical functional groups, fatty acid profiles, inherent structure, nutrient degradation and absorption, or metabolic characteristics between the newly developed yellow- and black-seeded canola lines. This study aimed to systematically characterize chemical, structural, and nutritional features in these canola lines. The parameters accessed include bioactive compounds and antinutrition factors, chemical functional groups, detailed chemical and nutrient profiles, energy value, nutrient fractions, protein structure, degradation kinetics, intestinal digestion, true intestinal protein supply, and feed milk value. The results showed that the CS-Y line was lower (P ≤ 0.05) in neutral detergent fiber (122 vs 154 g/kg DM), acid detergent fiber (61 vs 99 g/kg DM), lignin (58 vs 77 g/kg DM), nonprotein nitrogen (56 vs 68 g/kg DM), and acid detergent insoluble protein (11 vs 35 g/kg DM) than the CS-B line. There was no difference in fatty acid profiles except C20:1 eicosenoic acid content (omega-9) which was in lower in the CS-Y line (P structure spectral profile, there were no significant differences in functional groups of amides I and II, α helix, and β-sheet structure as well as their ratio between the two new lines, indicating no difference in protein structure makeup and conformation between the two lines. In terms of energy values, there were significant differences in total digestible nutrient (TDN; 149 vs 133 g/kg DM), metabolizable energy (ME; 58 vs 52 MJ/kg DM), and net energy for lactation (NEL; 42 vs 37 MJ/kg DM) between CS-Y and CS-B lines. For in situ rumen degradation kinetics, the two lines differed in soluble fraction (S; 284 vs 341 g/kg CP), potential degradation fraction (D; 672 vs 590 g/kg CP), and effective degraded

  4. Operation the laboratory for NBC protection and bio monitoring in the case of terrorist attack with NBC weapons

    International Nuclear Information System (INIS)

    Tusek, D.; Vucemilovic, A; Klobucar, J.

    2009-01-01

    The aim of this study was to develop efficacy of Operation the Laboratory for NBC protection and Bio monitoring in the case of terrorist attack with chemical weapons. When is necessary quickly, adeptly Operation and unambiguous confirmation about use chemical warfare agent, the Laboratory must be ready and qualified for reaction. The Laboratory had to develop capability for the timely sampling and unambiguous identification chemical warfare agents in a battlefield or in case of the terrorist attack. The need for quality sample collection and analyses is critical to verify use of chemical weapon (CW) by an enemy or terrorists. Collection, packaging, transport and analysis of samples must be carried out on proper way and quickly enough for military, medical or political purposes. Precise records must accompany each sample but these records must not contaminate samples anyway. All sampling team personnel have to be equipped with appropriate equipment and qualified in its handling. After arriving samples at our Laboratory, we will handle with them on standard procedures; carry out preparation such as Headspace, Liquid/liquid extraction, Solid phase extraction, Liquid/solid extraction, concentration and derivatization. After that we will analyze samples by gas-chromatography mass-spectrometry (GC/MS) method.(author)

  5. Health status and indicators of stress-regulatory systems in children with cardiorheumatologic diseases from the zone of anti-terrorist operation

    Directory of Open Access Journals (Sweden)

    I.S. Lebets

    2018-03-01

    Full Text Available Background. To characterize the health status of children from the antiterrorist operation zone in the east of Ukraine with cardiorheumatologic pathology and to study the indicators of stress-regulating systems was the purpose of our work. Materials and methods. A clinical and instrumental exa­mination was performed in 126 children aged 8–18 years, 92 of them from the anti-terrorist operation zone and 34 immigrant children from the Donetsk and Luhansk regions. The comparison group consisted of 509 children of the same age from the Kharkiv region and Kharkiv. The intensity of stress-realizing systems was determined by the level of cortisol, thiobarbituric acid-active products and diene conjugates in the blood serum, epinephrine and norepinephrine in daily urine. The state of stress-limiting systems was assessed by the content of serotonin, reduced glutathione, activity of glutathione pe­roxidase and superoxide dismutase in the blood and melatonin in daily urine. Results. In the structure of somatic pathology of children and adolescents from zone of military operations in the east of Ukraine, cardiorheumatologic diseases rank se­cond, the first place belongs to diseases of the digestive system. In 34.1 % of children admitted to the institute for the first time, the deterioration of health occurred against the background of psychoemotional stress and lack of conditions for treatment in the main place of residence. In the structure of patients’ complaints, astheno-neurotic ones prevailed, which was significantly more frequent in children of the first group. Also, various psychosomatic disorders, diseases of the digestive system and endocrinopathy were diagnosed most often. The study of stress-regulating systems in children from the anti-terrorist operation zone revealed some differences in the indicators, taking into account the nosology. Thus, patients with cardiovascular patho­logy had an activation of stress-realizing systems, and

  6. Social integration buffers stress in New York police after the 9/11 terrorist attack.

    Science.gov (United States)

    Schwarzer, Ralf; Bowler, Rosemarie M; Cone, James E

    2014-01-01

    Being socially integrated is regarded as a protective factor enabling people to cope with adversity. The stress-buffering effect reflects an interaction between stress and a social coping resource factor on subsequent outcomes. This study, based on 2943 police officers, examines mental health outcomes among officers who responded to the 9/11 terrorist attack on the World Trade Center. The Wave 1 data collection took place between September 2003 and November 2004 with a follow-up study (Wave 2) conducted from November 2006 through December 2007. A moderated mediation model was specified that uses event exposure as a distal predictor, earlier stress response as a mediator, and later stress response as an outcome, and social integration as a moderator of this relationship. The mediation hypothesis was confirmed, and moderation occurred at two stages. First, there was a multiplicative relationship between exposure levels and social integration: The higher the exposure level, the more stress responses occur, but this effect was buffered by a high level of social integration. Second, Wave 1 stress interacted with social integration on Wave 2 stress: The more the police officers were socially integrated, the lower the Wave 2 stress, which happened in a synergistic manner. The findings contribute to the understanding of mediating and moderating mechanisms that result in health outcomes such as posttraumatic stress disorder or resilience.

  7. Extremist Radicalism and Terrorist Inroads in West Africa: Understanding the Threat

    Directory of Open Access Journals (Sweden)

    Solomon Kofi Amoah

    2017-12-01

    Full Text Available While research has not yet established the regional consequences of terrorism, its immediate effects on states that have been hit (i.e. Mali, Niger, Burkina Faso and Nigeria, and the spill over effects in neighbouring countries cannot be discounted. This paper analyses the challenge of violent extremism in Africa based on existing evidence from across the West African sub- region. It pays particular attention to the recruitment of young people in Africa into extremist causes on the continent and beyond and proffers measures for their curtailment. The paper argues that terrorism in contemporary Africa undermines democratization, good governance, peace and security and regional development. It also recommends three-pronged strategies for addressing the miasma of extremist radicalism and its associated violence in West Africa, namely, governance, development and security reforms. While it may be difficult to absolutely curtail the activities of terrorist organizations in West Africa. Countries with minimal vulnerabilities like Ghana, Sierra Leone, Liberia and others should intensify efforts towards increased border and cyber security surveillance, sustained de-radicalization programmes and youth empowerment programmes to curb unemployment in earnest.

  8. Cooperative international arrangements: prevention of nuclear terrorism and the extradition and prosecution of terrorists

    International Nuclear Information System (INIS)

    Murphy, J.F.

    1987-01-01

    In considering the problems associated with prosecuting and punishing nuclear terrorists, it is noted that nuclear terrorism per se is not currently a crime under international law. To be sure, the Convention on the Physical Protection of Nuclear Material would probably cover any act of nuclear terrorism that involved nuclear material used for peaceful purposes. However, nuclear material used for military purposes or military nuclear reactors is outside the scope of the convention. US legislation implementing the convention goes beyond its terms in this respect and covers crimes involving nuclear material for nonpeaceful purposes if the offense is committed within US territorial, special maritime, special territorial, or special aircraft jurisdiction or if the offense is committed by nationals of the US. The author feels an effort should be made, under the auspices of the United Nations, to conclude a convention that would define nuclear terrorism, declare it a crime under international law, and obligate state parties to extradite or prosecute those who commit the crime. Such a convention would fill the large gap in the coverage of the Convention on the Physical Protection of Nuclear Material

  9. Holy Terror, Batman! Frank Miller’s Dark Knight and the Superhero as Hardboiled Terrorist

    Directory of Open Access Journals (Sweden)

    Daniele Croci

    2016-05-01

    Full Text Available Conceived in the late thirties as “bold humanist response to Depression-era fears of runaway scientific advance and soulless industrialism” (Morrison 2012, 6, the superhero has flourished as one of the most resilient archetypes of American popular culture. This essay analyses the literary and cultural contaminations that have engendered an unprecedented revision of the paradigm since the 1980s. In particular, it will take into account three graphic novels by American cartoonist Frank Miller (1957 - , one of leading figures of the mainstream comics renaissance, whose ideas have indelibly influenced the artistic development of both medium and genre. The Dark Knight Returns (1986, The Dark Knight Strikes Again (2002 and Holy Terror (2011 constitute an ideal Batman trilogy that charts the character’s evolution as political counterpoint to the perceived crisis of American identity. In this regard, Reaganism and 9/11 are polarized as historical discontinuities triggering the need for a new kind of a criminal (superhero. It will be in fact demonstrated how the novels hybridise the latent generic links to hardboiled pulp novels (R. Chandler, D. Hammet with narrative and aesthetics elements appropriated from the culturally-received concepts of terrorism and terrorists. This fruitful contamination on the one hand “play[s] with reader assumptions about genre” (Baetens and Frey 2015, 46, while on the other hand deconstructs the ideological underpinnings of the archetype, as the moral dichotomy and the alienation of justice from the law.

  10. An autopsy case related to a terrorist attack using a ball-bearing bomb.

    Science.gov (United States)

    Takamiya, Masataka; Biwasaka, Hitoshi; Niitsu, Hisae; Saigusa, Kiyoshi; Aoki, Yasuhiro

    2009-03-01

    We encountered an autopsy case related to a terrorist attack using a ball-bearing bomb. The decedent was a 51-year-old male without significant medical histories. During dinner in a restaurant, the perpetrator suddenly exploded a ball-bearing bomb, the blast from which blew the victim off his chair. The victim was found to be unresponsive, and pronounced dead. X-ray photographs taken before autopsy revealed six spherical shadows. Three penetrating wounds in the head, one in the neck and chest, and two in the left upper arm were observed in vivo. Six projectiles recovered from the body were identified as ball-bearings, one of which traveled through the midbrain, diencephalon, and left temporal lobe. Although blast injuries and penetrating wounds are often combined in bomb attack victims, penetrating brain injury would be the cause of death in this case. Lethal injuries to major organs can thus occur even though the destructive force of a ball-bearing bomb is weak. X-ray films were informative for detecting the ball-bearings in this case, suggesting that autopsy imaging is essential in cases of terrorism victims.

  11. Armed Groups and Intra State Conflict: A Study on the Egyptian Case

    OpenAIRE

    Ghzlan Mahmoud Abdel Aziz

    2016-01-01

    This case study aims to identify the intrastate conflicts between the nation state and armed groups. Nowadays, most wars weaken states against armed groups. Thus, it is very important to negotiate with such groups in order to reinforce the law for the protection of victims. These armed groups are the cause of conflicts and they are related with many of humanitarian issues that result out of conflicts. In this age of rivalry; terrorists, insurgents, or transnational criminal parties have surfa...

  12. The Racial, Cultural and Social Makeup of Hispanics as a potential Profile Risk for Intensifying the Need for Including this Ethnic Group in Clinical Trials.

    Science.gov (United States)

    López-Candales, Angel; Aponte Rodríguez, Jaime; Harris, David

    2015-01-01

    Hypertension not only is the most frequently listed cause of death worldwide; but also a well-recognized major risk factor for cardiovascular disease and stroke. Based on the latest published statistics published by the American Heart Association, hypertension is very prevalent and found in one of every 3 US adults. Furthermore, data from NHANES 2007 to 2010 claims that almost 6% of US adults have undiagnosed hypertension. Despite this staggering statistic, previous US guidelines for the prevention, detection, and treatment of hypertension (The Seventh Report of the Joint National Committee on Prevention, Detection, Evaluation, and Treatment of High Blood Pressure 7 [JNC 7]), released in 2003, stated that; "unfortunately, sufficient numbers of Mexican Americans and other Hispanic Americans... have not been included in most of the major clinical trials to allow reaching strong conclusions about their responses to individual antihypertensive therapies." However, the recently published JNC 8 offers no comment regarding recommendations or guideline treatment suggestions on Hispanics. The purpose of this article not only is to raise awareness of the lack of epidemiological data and treatment options regarding high blood pressure in the US Hispanic population; but also to make a case of the racial, cultural and social makeup of this ethnic group that places them at risk of cardiovascular complications related to hypertension.

  13. A predictable Java profile

    DEFF Research Database (Denmark)

    Bøgholm, Thomas; Hansen, Rene Rydhof; Ravn, Anders Peter

    2009-01-01

    A Java profile suitable for development of high integrity embedded systems is presented. It is based on event handlers which are grouped in missions and equipped with respectively private handler memory and shared mission memory. This is a result of our previous work on developing a Java profile......, and is directly inspired by interactions with the Open Group on their on-going work on a safety critical Java profile (JSR-302). The main contribution is an arrangement of the class hierarchy such that the proposal is a generalization of Real-Time Specification for Java (RTSJ). A further contribution...

  14. Data Profiling

    OpenAIRE

    Hladíková, Radka

    2010-01-01

    Title: Data Profiling Author: Radka Hladíková Department: Department of Software Engineering Supervisor: Ing. Vladimír Kyjonka Supervisor's e-mail address: Abstract: This thesis puts mind on problems with data quality and data profiling. This Work analyses and summarizes problems of data quality, data defects, process of data quality, data quality assessment and data profiling. The main topic is data profiling as a process of researching data available in existing...

  15. Parents of terror victims. A longitudinal study of parental mental health following the 2011 terrorist attack on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Jensen, Tine K; Wentzel-Larsen, Tore; Dyb, Grete

    2016-03-01

    Little is known about parents' health following their children's exposure to trauma. We investigated the mental health of parents of young terrorist survivors and assessed parental distress and guilt as potential predictors of mental health. Mothers and fathers (N=531) participated in two study waves 4-5 and 14-15 months after the shooting. Posttraumatic stress reactions (PTSS) and anxiety/depression were compared with age- and gender-adjusted expected scores that were calculated from a concurrent population study. Mixed effects models investigated the associations between parental distress, parental guilt, and mental health. Parents' level of anxiety/depression was three times higher and PTSS was five times higher than that of the general population. Parental distress and guilt about their child's traumatic experience contributed uniquely to symptoms at both time points. Parents of traumatized youth constitute a vulnerable group that has been overlooked in the literature. Intervention strategies following trauma should include both survivors and their parents. Copyright © 2016 Z. Published by Elsevier Ltd.. All rights reserved.

  16. DNAStat, version 2.1--a computer program for processing genetic profile databases and biostatistical calculations.

    Science.gov (United States)

    Berent, Jarosław

    2010-01-01

    This paper presents the new DNAStat version 2.1 for processing genetic profile databases and biostatistical calculations. The popularization of DNA studies employed in the judicial system has led to the necessity of developing appropriate computer programs. Such programs must, above all, address two critical problems, i.e. the broadly understood data processing and data storage, and biostatistical calculations. Moreover, in case of terrorist attacks and mass natural disasters, the ability to identify victims by searching related individuals is very important. DNAStat version 2.1 is an adequate program for such purposes. The DNAStat version 1.0 was launched in 2005. In 2006, the program was updated to 1.1 and 1.2 versions. There were, however, slight differences between those versions and the original one. The DNAStat version 2.0 was launched in 2007 and the major program improvement was an introduction of the group calculation options with the potential application to personal identification of mass disasters and terrorism victims. The last 2.1 version has the option of language selection--Polish or English, which will enhance the usage and application of the program also in other countries.

  17. The counter-terrorist campus: Securitisation theory and university securitisation – Three Models

    Directory of Open Access Journals (Sweden)

    Liam Gearon

    2017-02-01

    Full Text Available With intensified threats to global security from international terrorism, universities have become a focus for security concerns and marked as locus of special interest for the monitoring of extremism and counter-terrorism efforts by intelligence agencies worldwide. Drawing on initiatives in the United Kingdom and United States, I re-frame three – covert, overt and covert–overt – intersections of education, security and intelligence studies as a theoretical milieu by which to understand such counter-terrorism efforts. Against the backdrop of new legislative guidance for universities in an era of global terrorism and counter-terrorism efforts by security and intelligence agencies and their Governments, and through a review of Open-Source security/intelligence concerning universities in the United Kingdom and the United States, I show how this interstitial (covert, overt and covert– overt complexity can be further understood by the overarching relationship between securitisation theory and university securitisation. An emergent securitised concept of university life is important because de facto it will potentially effect radical change upon the nature and purposes of the university itself. A current-day situation replete with anxiety and uncertainty, the article frames not only a sharply contested and still unfolding political agenda for universities but a challenge to the very nature and purposes of the university in the face of a potentially existential threat. Terrorism and counterterrorism, as manifest today, may well thus be altering the aims and purposes of the university in ways we as yet do not fully know or understand. This article advances that knowledge and understanding through a theoretical conceptualisation: the counter-terrorist campus.

  18. Restoration projects for decontamination of facilities from chemical, biological and radiological contamination after terrorist actions

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Lumley, T.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science and Technology Division, Environmental Technology Centre, Science and Technology Branch; Payette, P.; Laframboise, D.; Best, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Krishnan, J.; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Winnipeg, MB (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada); Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada)

    2006-07-01

    This paper reviewed studies that identified better decontamination methods for chemical, biological and radiological/nuclear (CBRN) attacks. In particular, it reviewed aspects of 3 projects in which procedures were tested and validated for site restoration. Cleanup targets or standards for decontaminating buildings and materials after a CBRN attack were also developed. The projects were based on physicochemical and toxicological knowledge of potential terrorist agents and selected surface matrices. The projects also involved modeling and assessing environmental and health risks. The first multi-agent project involved gathering information on known procedures for restoration of areas including interiors and exteriors of buildings, contents, parking lots, lawn, and vehicles. Air inside the building was included. The efficacy of some of the proposed concepts was tested. Results included the determination of appropriate surrogates for anthrax and tests of liquid and gaseous biocides on the surrogates. The development of new contamination procedures using peroxyacetic acid were also discussed. The second project involved decontamination tests on CBRN using specially-constructed buildings at the Counter-terrorism Technology Centre at Defence Research and Development Canada in Suffield. The buildings will be contaminated with chemical and biological agents and with short-lived radionuclides. They will be decontaminated using the best-performing technologies known. Information collected will include fate of the contaminant and decontamination products, effectiveness of the restoration methods, cost and duration of cleanup and logistical problems. The third project is aimed at developing cleanup standards for decontaminating buildings and construction materials after a chemical or biological attack. It will create as many as 12 algorithms for the development of 50 standards which will help cleanup personnel and first-responders to gauge whether proposed methods can achieve

  19. The restoration project : decontamination of facilities from chemical, biological and radiological contamination after terrorist action

    Energy Technology Data Exchange (ETDEWEB)

    Fingas, M.; Volchek, K.; Thouin, G.; Harrison, S.; Kuang, W. [Environment Canada, Ottawa, ON (Canada). Emergencies Science Div; Velicogna, D.; Hornof, M.; Punt, M. [SAIC Canada, Ottawa, ON (Canada); Payette, P.; Duncan, L.; Best, M.; Krishnan; Wagener, S.; Bernard, K.; Majcher, M. [Public Health Agency of Canada, Ottawa, ON (Canada); Cousins, T.; Jones, T. [Defence Research and Development Canada, Ottawa, ON (Canada)

    2005-07-01

    Bioterrorism poses a real threat to the public health and national security, and the restoration of affected facilities after a chemical, biological or radiological attack is a major concern. This paper reviewed aspects of a project conducted to collect information, test and validate procedures for site restoration after a terrorist attack. The project began with a review of existing technology and then examined new technologies. Restoration included pickup, neutralization, decontamination, removal and final destruction and deposition of contaminants as well as cleaning and neutralization of material and contaminated waste from decontamination. The project was also intended to test existing concepts and develop new ideas. Laboratory scale experiments consisted of testing, using standard laboratory techniques. Radiation decontamination consisted of removal and concentration of the radioisotopes from removal fluid. General restoration guidelines were provided, as well as details of factors considered important in specific applications, including growth conditions and phases of microorganisms in biological decontamination, or the presence of inhibitors or scavengers in chemical decontamination. Various agents were proposed that were considered to have broad spectrum capability. Test surrogates for anthrax were discussed. The feasibility of enhanced oxidation processes was examined in relation to the destruction of organophosphorus, organochlorine and carbamate pesticides. The goal was to identify a process for the treatment of surfaces contaminated with pesticides. Tests included removal from carpet, porous ceiling tile, steel plates, and floor tiles. General radiation contamination procedures and techniques were reviewed, as well as radiological decontamination waste treatment. It was concluded that there is no single decontamination technique applicable for all contaminants, and decontamination methods depend on economic, social and health factors. The amount of

  20. Karolinske psychodynamic profile (KAPP)

    DEFF Research Database (Denmark)

    Mathiesen, Birgit Bork; Søgaard, Ulf

    2006-01-01

    psykologiske testmetoder, assesment, Karolinska psychodynamic profile (KAPP), psykodynamisk profil......psykologiske testmetoder, assesment, Karolinska psychodynamic profile (KAPP), psykodynamisk profil...

  1. Implicit User Interest Profile

    CERN Document Server

    Chan, K

    2002-01-01

    User interest profile presents items that the users are interested in. Typically those items can be listed or grouped. Listing is good but it does not possess interests at different abstraction levels - the higher-level interests are more general, while the lower-level ones are more specific. Furthermore, more general interests, in some sense, correspond to longer-term interests, while more specific interests correspond to shorter-term interests. This hierarchical user interest profile has obvious advantages: specifying user's specific interests and general interests and representing their relationships. Current user interest profile structures mostly do not use implicit method, nor use an appropriate clustering algorithm especially for conceptually hierarchical structures. This research studies building a hierarchical user interest profile (HUIP) and the hierarchical divisive algorithm (HDC). Several users visit hundreds of web pages and each page is recorded in each users profile. These web pages are used t...

  2. Consumer views on a new holistic screening tool for supportive and palliative-care needs: Sheffield Profile for Assessment and Referral for Care (SPARC): a survey of self-help support groups in health care.

    Science.gov (United States)

    Hughes, Philippa; Ahmed, Nisar; Winslow, Michelle; Walters, Stephen J; Collins, Karen; Noble, Bill

    2015-08-01

    Sheffield Profile for Assessment and Referral for Care (SPARC) was developed in response to concerns that palliative care may not be reaching all people who could benefit from it. Acceptability of the tool is an important step in developing its future use. To elicit the views of a wide variety of members of consumer and self-help support groups concerned with health care on the relevance, acceptability and the overall perception of using SPARC as an early holistic needs assessment tool in supportive and palliative care. This study was conducted in South Yorkshire and North Derbyshire (UK). Ninety-nine consumer and self-help groups were identified from information in the public domain. Thirty-eight groups participated. Packs containing study information and self-complete postal questionnaires were distributed to groups, and they were asked to circulate these to their members. Completed questionnaires were returned in pre-paid envelopes to the research team. 135 questionnaires and feedback forms were returned. The majority of respondents found SPARC easy to understand (93% (120/129; 95% Confidence Interval 87% to 96%) and complete (94% (125/133; 95% CI: 88% to 97%). A minority, 12.2% (16/131), of respondents found questions on SPARC 'too sensitive'. Overall, respondents considered SPARC an acceptable and relevant tool for clinical assessment of supportive and palliative-care needs. Whilst a small minority of people found SPARC difficult to understand (i.e. patients with cognitive impairments), most categories of service user found it relevant. Clinical studies are necessary to establish the clinical utility of SPARC. © 2013 John Wiley & Sons Ltd.

  3. How identity crisis, relative deprivation, personal characteristics, and empathy contribute to the engagement of Western individuals in Islamist terrorist behavior

    Directory of Open Access Journals (Sweden)

    Khouwaga Yusoufzai

    2017-02-01

    Full Text Available The growing sense of insecurity in the Western world due to home-grown Islamist terrorism prompts further research on the topic. Based on previous literature, the current paper attempts to determine whether factors can be identified which contribute to Western individuals joining Islamic extremist organizations and engaging in terrorist behavior in the West. Four factors are discussed: While extensive scientific literature supports the view that identity crises and relative deprivation play a crucial role in turning Western individuals to terrorism, evidence on the role of personal characteristics and empathy, on the other hand, is still too scarce to allow any clear scientific judgment.

  4. What we need to know ...and when. Educating the public about nuclear terrorist risks can help raise levels of security

    International Nuclear Information System (INIS)

    Khripunov, I.

    2006-01-01

    Nuclear power infrastructures could be the target of terrorist acts of theft, sabotage, unauthorized access or other malicious acts given their radiological and chemical content and potential for building weapons. Attacks on its major components, including fuel production, reactors, waste handling, and reprocessing facilities, would lead to serious consequences-even if there is little or no damage to a nuclear power plant itself and other related structures. Public fear of nuclear radiation, in combination with a possibly massive resultant blackout and other aggravating factors, could create significant distress and panic. In other words, successful terrorist attempts to attack nuclear power infrastructure can easily bring about systemic disaster. Systemic risks impact society on a large scale and their effects may spread much further from the original hazardous source. Those risks widely affect systems that society depends on, such as health, transport, environment, telecommunications. Their consequences may be technical, social, environmental, psychological and economic and involve different stakeholders. In this context, however, one important stakeholder has been under-appreciated, under-utilized and somewhat misunderstood: the general public. The nuclear power infrastructure must learn how to efficiently communicate to the public and develop better options for public risk communication that relate to deliberate attacks or accidents. The public is also a challenging stockholder because citizens are deeply split regarding the acceptability and value of nuclear power generation and tend to express their feelings emotionally. However, there is growing recognition that because of skyrocketing oil prices and evidence of the greenhouse effect, nuclear power may be approaching renaissance. Hence, the public must no longer be looked upon only as potential victims or panicked masses but rather as an important contributing factor for better nuclear security throughout

  5. Restorative Encounters in Terrorist Victimization in Spain: Theoretical Reflections and Practical Insights from Social Work

    Directory of Open Access Journals (Sweden)

    Alberto Jose Olalde

    2014-07-01

    Full Text Available After the ceasefire announcement by the terrorist organization ETA in 2011, new horizons and scenarios of peace have opened in the Basque Country, a land that has been badly hurt by violence over several decades.Restorative justice, a new paradigm for an old kind of justice, the reparation of the harm caused to victims and their consequent importance in the judicial process, has been knocking at our door for a long time. Since the beginning of this decade, following European trends, our country has begun to implement restorative justice at different levels.This article wants to bring the reader closer to understanding of the possibilities which restorative justice offers to the victims of terrorism. We describe the central elements of the restorative encounters held between ex-members of ETA and direct or indirect victims. Furthermore, we support our restorative intervention with theoretical arguments and practical examples from social work. Tras el anuncio del cese de la actividad armada por parte de la organización armada ETA, en 2011, nuevos escenarios y horizontes de pacificación se abren en la historia para esta tierra, castigada por la violencia durante decenas de años.La Justicia restaurativa, un nuevo paradigma para una vieja reivindicación, la reparación de la víctima y su protagonismo en la resolución y abordaje de las consecuencias de los conflictos penales, lleva años asomando a nuestro contexto. Tras la incorporación de España a principios de esta década a las corrientes europeas, se constata la validación de la práctica restaurativa.Este artículo quiere acercar a la persona lectora la comprensión de las posibilidades de justicia restaurativa en victimización terrorista. Describimos los elementos centrales de los encuentros restaurativos celebrados entre ex miembros de ETA y víctimas directas e indirectas. Y nos apoyamos en elementos teóricos y prácticos del trabajo social para nuestra intervención restaurativa.

  6. Terrorist Attacks in Mumbai, India, and Implications for U.S. Interests

    National Research Council Canada - National Science Library

    Kronstadt, K. A

    2008-01-01

    On the evening of November 26, 2008, a number of well-trained militants came ashore from the Arabian Sea on small boats and attacked numerous high-profile targets in Mumbai, India, with automatic weapons and explosives...

  7. 9/11, Act II: a fine-grained analysis of regional variations in traffic fatalities in the aftermath of the terrorist attacks.

    Science.gov (United States)

    Gaissmaier, Wolfgang; Gigerenzer, Gerd

    2012-12-01

    Terrorists can strike twice--first, by directly killing people, and second, through dangerous behaviors induced by fear in people's minds. Previous research identified a substantial increase in U.S. traffic fatalities subsequent to the September 11 terrorist attacks, which were accounted for as due to a substitution of driving for flying, induced by fear of dread risks. Here, we show that this increase in fatalities varied widely by region, a fact that was best explained by regional variations in increased driving. Two factors, in turn, explained these variations in increased driving. The weaker factor was proximity to New York City, where stress reactions to the attacks were previously shown to be greatest. The stronger factor was driving opportunity, which was operationalized both as number of highway miles and as number of car registrations per inhabitant. Thus, terrorists' second strike exploited both fear of dread risks and, paradoxically, an environmental structure conducive to generating increased driving, which ultimately increased fatalities.

  8. Efficacy and safety profile of a topical methyl salicylate and menthol patch in adult patients with mild to moderate muscle strain: a randomized, double-blind, parallel-group, placebo-controlled, multicenter study.

    Science.gov (United States)

    Higashi, Yoshinobu; Kiuchi, Takehito; Furuta, Kenichi

    2010-01-01

    An occlusive patch formulation containing 10% methyl salicylate and 3% l-menthol was recently approved by the US Food and Drug Administration for the treatment of mild to moderate pain. Despite widespread use of counterirritants, including methyl salicylate and menthol, for topical pain relief, published efficacy and safety data regarding the use of the agents alone or in combination are limited. The goal of this study was to determine the efficacy and safety profile of a patch containing 10% methyl salicylate and 3% l-menthol compared with a placebo patch in adult patients with mild to moderate muscle strain. Eligible patients were men or women aged >or=18 years with a clinical diagnosis of mild to moderate muscle strain. Patients were randomly assigned to receive either 1 active patch or 1 placebo patch applied to the skin at the affected area (ie, shoulder, upper back, upper arm, neck, calf, thigh, forearm, abdomen). Pain intensity was assessed on a 100-mm visual analog scale while at rest and with movement for 12 hours after patch application. The primary efficacy end point was the summed pain intensity difference score through 8 hours (SPID8) with movement. Analyses included use of descriptive statistics and an ANOVA model. Safety data, including adverse events, and secondary efficacy end points were also evaluated. A total of 208 patients (104 men, 104 women; age range, 18-78 years) were randomized to 1 of 2 study groups (105 in the active-patch group [mean age, 37.3 years], 103 in the placebo-patch group [mean age, 38.1 years]). The primary efficacy analysis (SPID8 with movement) indicated that patients receiving the active patch experienced significantly greater pain relief (approximately 40%) than those patients receiving a placebo patch (mean [SD], 182.6 [131.2] vs 130.1 [144.1]; P = 0.005). Analysis of the per-protocol population also found significantly more relief (P = 0.024) in the active-patch group (176.2 [131.4]; n = 92) versus the placebo

  9. Fear of Terrorism in New York After the September 11 Terrorist Attacks: Implications for Emergency Mental Health and Preparedness

    Science.gov (United States)

    Boscarino, Joseph A.; Figley, Charles R.; Adams, Richard E.

    2009-01-01

    To examine the public’s response to future terrorist attacks, we surveyed 1,001 New Yorkers in the community one year after the September 11 attacks. Overall, New Yorkers were very concerned about future terrorist attacks and also concerned about attacks involving biological or nuclear weapons. In addition, while most New Yorkers reported that if a biological or nuclear attack occurred they would evaluate available information before evacuating, a significant number reported they would immediately evacuate, regardless of police or public health communications to the contrary. The level of public concern was significantly higher on all measures among New York City and Long Island residents (downstate) compared to the rest of the state. A model predicting higher fear of terrorism indicated that downstate residents, women, those 45 to 64 years old, African Americans and Hispanics, those with less education/income, and those more likely to flee, were more fearful of future attacks. In addition, making disaster preparations and carefully evaluating emergency information also predicted a higher level of fear as well. A second model predicting who would flee suggested that those more likely to evaluate available information were less likely to immediately evacuate, while those with a higher fear of future attacks were more likely to flee the area. Given these findings and the possibility of future attacks, mental health professionals need to be more involved in preparedness efforts, especially related to the psychological impact of attacks involving weapons of mass destruction. PMID:14730761

  10. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: Case study of New Jersey

    International Nuclear Information System (INIS)

    Greenberg, Michael; Mantell, Nancy; Lahr, Michael; Felder, Frank; Zimmerman, Rae

    2007-01-01

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened

  11. Reducing Mortality from Terrorist Releases of Chemical and Biological Agents: I. Filtration for Ventilation Systems in Commercial Building

    Energy Technology Data Exchange (ETDEWEB)

    Thatcher, Tracy L.; Daisey, Joan M.

    1999-09-01

    There is growing concern about potential terrorist attacks involving releases of chemical and/or biological (CB) agents, such as sarin or anthrax, in and around buildings. For an external release, the CB agent can enter the building through the air intakes of a building's mechanical ventilation system and by infiltration through the building envelope. For an interior release in a single room, the mechanical ventilation system, which often recirculates some fraction of the air within a building, may distribute the released CB agent throughout the building. For both cases, installing building systems that remove chemical and biological agents may be the most effective way to protect building occupants. Filtration systems installed in the heating, ventilating and air-conditioning (HVAC) systems of buildings can significantly reduce exposures of building occupants in the event of a release, whether the release is outdoors or indoors. Reduced exposures can reduce the number of deaths from a terrorist attack. The purpose of this report is to provide information and examples of the design of filtration systems to help building engineers retrofit HVAC systems. The report also provides background information on the physical nature of CB agents and brief overviews of the basic principles of particle and vapor filtration.

  12. Narratives from caregivers of children surviving the terrorist attack in Beslan: issues of health, culture, and resilience.

    Science.gov (United States)

    Moscardino, Ughetta; Axia, Giovanna; Scrimin, Sara; Capello, Fabia

    2007-04-01

    Acts of terrorism have an extremely negative impact on the mental health of children and families. The school siege in Beslan, Russia, in 2004, represents a particularly traumatizing event as it was directed specifically at children and involved the entire community. This qualitative study aims to: (a) examine caregiver reactions to the terrorist attack in Beslan as reported 3 months after the traumatic event; (b) determine the extent to which indigenous cultural values and religious belief systems play a role in Beslan's caregivers' reactions to such event; and (c) identify variables that may function as sources of resilience to caregivers. A convenience sample of 17 primary caregivers from Beslan with at least one child who survived the school siege were asked to participate in semi-structured interviews. Narratives generated from the interviews were qualitatively analyzed using a thematic approach; nine major themes were identified. Caregivers' concerns centered on children's physical and psychological well-being, the reorganization of family life, and the disruption of community ties. Cultural values of pride, heroism, courage, and revenge emerged as relevant aspects shaping caregivers' reactions to the traumatic event. Possible sources of resilience included the willingness to return to normality, social support, and the reaffirmation of positive, culturally shared values in face of the perceived threat of future terrorist attacks. Findings are discussed in terms of their theoretical implications on the effects of trauma on children and families as well as interventions with highly traumatized populations in diverse cultural settings.

  13. Short and intermediate economic impacts of a terrorist-initiated loss of electric power: case study of New Jersey

    Energy Technology Data Exchange (ETDEWEB)

    Greenberg, M.; Mantell, N.; Lahr, M.; Felder, F. [Rutgers University, New Brunswick, NJ (United States). Edward J. Bloustein School; Zimmerman, R. [New York University (United States). Robert F. Wagner School of Public Service

    2007-01-15

    The economic impacts of potential terrorist attacks on the New Jersey electric power system are examined using a regional econometric model. The magnitude and duration of the effects vary by type of business and income measure. We assume damage is done during in the summer 2005 quarter, a peak period for energy use. The state economy recovers within a year, if we assume that economic activity is restored in the next time period. However, if the attacks prompt an absolute of loss of activity due to firm relocation, closing, and geographical changes in expansion plans, then the economy does not fully recover by the year 2010. Hence, the electrical power system's resiliency to damage is the key to the extent and duration of any economic consequences of a terrorist attack, at least in New Jersey. The policy implication is that the costs and benefits of making the electric power system more resilient to plausible attacks should be weighed and that the restorative capacity of the system should be strengthened. (author)

  14. The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups

    Science.gov (United States)

    2015-05-21

    terrorist attacks of September 11th, 2001 researchers have sought to better understand the macroeconomic consequences of terrorism. Despite a...The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups A Monograph by MAJ Joshua Glonek...SUBTITLE The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups 5a. CONTRACT NUMBER 5b. GRANT

  15. Economic impact profiling of CBRN events: focusing on biological incidents.

    Science.gov (United States)

    Cavallini, Simona; Bisogni, Fabio; Mastroianni, Marco

    2014-12-01

    Chemical, biological, radiological and nuclear (CBRN) incidents, both caused accidentally by human error or natural/technological events and determined intentionally as criminal/malicious/terroristic acts, have consequences that could be differently characterized. In the last years many efforts to analyze the economic impact of terrorist threat have been carried out, while researches specifically concerning CBRN events have not been extensively undertaken. This paper in particular aims at proposing a methodological approach for studying macro-level economic impact profiles of biological incidents caused by weaponized and non-weaponized materials. The suggested approach investigates the economic consequences of biological incidents according to two main dimensions: type of large-scale effect and persistence of effect. Biological incident economic impacts are analyzed taking into account the persistence of effect during time as short-term impact (i.e. immediately after the incident), medium-term impact (i.e. by a month) and long-term impact (i.e. by years). The costs due to preventive countermeasure against biological threats (e.g. prevention, protection and preparedness expenses) are not taken into account. To this purpose, information on the key features of past biological incidents can be used as case studies to try to build impact profiles taking into account the proposed two main dimensions. Consequence management and effect mitigation of CBRN emergencies and disasters may benefit from an ex ante definition of the impact profiling related to this kind of incidents. The final goal of this paper is to define an approach to organize information on possible biological events according to their impact profile for supporting more effective and efficient first responders' prompt actions and policy makers' strategic decisions after the event occurrence.

  16. Country nuclear power profiles

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-03-01

    The preparation of Country Nuclear Power Profiles was initiated within the framework of the IAEA`s programme for nuclear power plant performance assessment and feedback. It responded to a need for a database and a technical document containing a description of the energy and economic situation and the primary organizations involved in nuclear power in IAEA Member States. The task was included in the IAEA`s programmes for 1993/1994 and 1995/1996. In March 1993, the IAEA organized a Technical Committee meeting to discuss the establishment of country data ``profiles``, to define the information to be included in the profiles and to review the information already available in the IAEA. Two expert meetings were convened in November 1994 to provide guidance to the IAEA on the establishment of the country nuclear profiles, on the structure and content of the profiles, and on the preparation of the publication and the electronic database. In June 1995, an Advisory Group meeting provided the IAEA with comprehensive guidance on the establishment and dissemination of an information package on industrial and organizational aspects of nuclear power to be included in the profiles. The group of experts recommended that the profiles focus on the overall economic, energy and electricity situation in the country and on its nuclear power industrial structure and organizational framework. In its first release, the compilation would cover all countries with operating power plants by the end of 1995. It was also recommended to further promote information exchange on the lessons learned from the countries engaged in nuclear programmes. For the preparation of this publication, the IAEA received contributions from the 29 countries operating nuclear power plants and Italy. A database has been implemented and the profiles are supporting programmatic needs within the IAEA; it is expected that the database will be publicly accessible in the future. Refs, figs, tabs.

  17. Country nuclear power profiles

    International Nuclear Information System (INIS)

    1998-03-01

    The preparation of Country Nuclear Power Profiles was initiated within the framework of the IAEA's programme for nuclear power plant performance assessment and feedback. It responded to a need for a database and a technical document containing a description of the energy and economic situation and the primary organizations involved in nuclear power in IAEA Member States. The task was included in the IAEA's programmes for 1993/1994 and 1995/1996. In March 1993, the IAEA organized a Technical Committee meeting to discuss the establishment of country data ''profiles'', to define the information to be included in the profiles and to review the information already available in the IAEA. Two expert meetings were convened in November 1994 to provide guidance to the IAEA on the establishment of the country nuclear profiles, on the structure and content of the profiles, and on the preparation of the publication and the electronic database. In June 1995, an Advisory Group meeting provided the IAEA with comprehensive guidance on the establishment and dissemination of an information package on industrial and organizational aspects of nuclear power to be included in the profiles. The group of experts recommended that the profiles focus on the overall economic, energy and electricity situation in the country and on its nuclear power industrial structure and organizational framework. In its first release, the compilation would cover all countries with operating power plants by the end of 1995. It was also recommended to further promote information exchange on the lessons learned from the countries engaged in nuclear programmes. For the preparation of this publication, the IAEA received contributions from the 29 countries operating nuclear power plants and Italy. A database has been implemented and the profiles are supporting programmatic needs within the IAEA; it is expected that the database will be publicly accessible in the future

  18. Profiling cancer

    DEFF Research Database (Denmark)

    Ciro, Marco; Bracken, Adrian P; Helin, Kristian

    2003-01-01

    In the past couple of years, several very exciting studies have demonstrated the enormous power of gene-expression profiling for cancer classification and prediction of patient survival. In addition to promising a more accurate classification of cancer and therefore better treatment of patients......, gene-expression profiling can result in the identification of novel potential targets for cancer therapy and a better understanding of the molecular mechanisms leading to cancer....

  19. Comment on the first anniversary of the terrorist attacks in the United States of America. Vienna, 11 September 2002

    International Nuclear Information System (INIS)

    ElBaradei, M.

    2002-01-01

    The IAEA has long been active in encouraging States to make security an integral part of the management of their nuclear programmes. The attacks in September 2001 were, however, a wake-up call to the world nuclear community that more can and must be done. In the wake of the terrorist attacks, Member States of the IAEA meeting in the Agency's General Conference adopted a resolution requesting that the IAEA Director General initiate a thorough review of the Agency's activities and programmes relevant to preventing acts of terrorism involving nuclear and other radioactive materials. The Agency moved rapidly to respond. It devised and is presently implementing an integrated action plan which includes enhanced and new activities to upgrade nuclear security worldwide and to combat nuclear terrorism. The plan covers eight areas: (1) physical protection of nuclear material and nuclear facilities; (2) detection of malicious activities (such as illicit trafficking) involving nuclear and other radioactive materials; (3) strengthening of State systems for nuclear material accountancy and control; (4) security of radioactive sources; (5) the assessment of safety and security related vulnerabilities at nuclear facilities; (6) response to malicious acts or threats thereof; (7) the adherence to international agreements and guidelines; and (8) co-ordination and information management for nuclear security related matters. National measures for protecting nuclear material and facilities remain uneven in their substance and application. There is wide recognition that the international physical protection regime needs to be further strengthened. Through its International Physical Protection Advisory Service (IPPAS), the Agency provides Member States with assessment services, together with associated advice and follow up actions to improve security arrangements at nuclear facilities. It also provides training and workshops, notably in assessing threats, as well as other supporting

  20. Increased Incidence Rate of Trauma- and Stressor-Related Disorders in Denmark After the September 11, 2001, Terrorist Attacks in the United States

    DEFF Research Database (Denmark)

    Hansen, Bertel T; Østergaard, Søren D; Sønderskov, Kim M

    2016-01-01

    The terrorist attacks that occurred on September 11, 2001 (hereafter referred to as 9/11) in the United States had a profound impact on the physical and mental health of Americans, but the effects beyond the United States are largely unknown. To understand the wider aftermath, we examined...

  1. Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters

    Energy Technology Data Exchange (ETDEWEB)

    Denise Baclawski

    2010-03-08

    The University of Nevada, Reno Fire Science Academy (FSA) applied for grant funding to develop and deliver programs for municipal, rural, and volunteer firefighters. The FSA specializes in preparing responders for a variety of emergency events, including flammable liquid fires resulting from accidents, intentional acts, or natural disasters. Live fire training on full scale burnable props is the hallmark of FSA training, allowing responders to practice critical skills in a realistic, yet safe environment. Unfortunately, flammable liquid live fire training is often not accessible to municipal, rural, or volunteer firefighters due to limited department training budgets, even though most department personnel will be exposed to flammable liquid fire incidents during the course of their careers. In response to this training need, the FSA developed a course during the first year of the grant (Year One), Responding to Terrorist Incidents in Your Community: Flammable-Liquid Fire Fighting Techniques for Municipal and Rural Firefighters. During the three years of the grant, a total of 2,029 emergency responders received this training. In Year Three, two new courses, a train-the-trainer for Responding to Terrorist Incidents in Your Community and Management of Large-Scale Disasters for Public Officials were developed and pilot tested during the Real-World Disaster Management Conference held at the FSA in June of 2007. Two research projects were conducted during Years Two and Three. The first, conducted over a two year period, evaluated student surveys regarding the value of the flammable liquids training received. The second was a needs assessment conducted for rural Nevada. Both projects provided important feedback and a basis for curricula development and improvements.

  2. The Nexus among Terrorists, Narcotics Traffickers, Weapons Proliferators, and Organized Crime Networks in Western Europe

    National Research Council Canada - National Science Library

    Curtis, Glenn E; Karacan, Tara

    2002-01-01

    .... Based on that evidence, the report evaluates current trends in such transactions and analyzes the implications and structures of relationships formed by the types of groups under consideration...

  3. Qualitative Value Profiling

    DEFF Research Database (Denmark)

    Duus, Henrik Johannsen; Bjerre, Mogens

    2015-01-01

    allows the development of 1) profiles of the target country in which operations are to take place, 2) profiles of the buying center (i.e. the group of decision makers) in the partner company, and 3) profiles of the product/service offering. It also allows the development of a semantic scaling method...... for deeper analysis of all involved factors. This paper presents the method and compares and contrasts it with other similar methods like the PESTELE method known from corporate strategy, the STEEPAL method known from scenario analysis, and the Politics-Institutions-Economy (PIE) framework known from...... International Business. This comparison suggests that QVP on most accounts provides deeper insights than alternative methods and thus lays the foundation for better strategic planning in international business-to-business markets. Hence, it is a valuable addition to the toolbox of business strategists...

  4. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer

    2004-01-01

    ... to continually evade law enforcement. Exacerbating the growing problem is the fact that the groups involved in transnational crime operate with a level of sophistication previously only found in multinational corporations...

  5. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends

    National Research Council Canada - National Science Library

    Hesterman, Jennifer L

    2005-01-01

    ... to evade law enforcement continually. Exacerbating the growing problem is the fact that the groups involved in transnational crime operate with a level of sophistication previously only found in multinational corporations...

  6. [Defusing of victims of the terrorist attacks in Paris. Elements of assessment one-month post-event].

    Science.gov (United States)

    Prieto, N; Cheucle, E; Faure, P; Digard, F; Dalphin, C; Pachiaudi, V; Simond, M; Darbon, R; Collinet, C; Habibi, R; Gueugniaud, P-Y

    2018-04-01

    The terrorist attacks (fusillades and suicide attacks) in Paris on 13 November 2015 have had a major psychic impact on all individuals directly or secondarily exposed to them. Medico-psychological unit (CUMP) of the Paris Île-de-France region's immediate care services were immediately mobilized and rapidly strengthened by all regional medico-psychological units (CUMP) throughout the country. Psychological assistance has been provided in several key points of Paris and specifically in the 11th district City Hall of Paris where Lyon's Medico-psychological unit was located. These specific immediate psychological assistances, referred to as a "defusing process" by the medico-psychological unit (CUMP), are mostly devoted to provide the victims with an entry point to a psychological healthcare relationship and give them a first sense of soothing and relief even though they do not prevent further psychological care follow up for the victims. Nonetheless, the potential therapeutic effect of this "defusing process" has not yet been sufficiently established nor demonstrated by any scientific study. A phoning survey was carried out one-month post-terrorist attacks and interviewed the 129 victims who benefited from the "defusing process" conducted by Lyon's medico-psychological unit (CUMP) in order to collect data and assess its effects. These people, whether directly exposed, bereaved relatives or witnesses, whose average age is 35, are mostly living in the Île-de-France region. Most of them present a high score on the IES-R scale, whether they were directly exposed, bereaved relatives or witnesses. Almost all of them (96.5%) experienced at least one medical care contact within this one-month post-trauma period with psychotropic medication for 37% of them. Regarding the defusing conducted by Lyon's medico-psychological unit (CUMP) in the 11th district City Hall of Paris, it appears that 93% of the victims who were looked after indicated that they were satisfied and 87.4% of

  7. The correlation between diversion (Article 113 of the Criminal Code of Ukraine and terrorist act (Article 258 of the Criminal Code of Ukraine

    Directory of Open Access Journals (Sweden)

    Андрій Сергійович Климосюк

    2018-03-01

    During the investigating of the punishability for these crimes, it was found that in some cases the actual infliction of harm by a s diversion causes the necessity for additional qualifications by Part 2 of Art. 115 or Part 3 of Art. 258 of the Criminal Code of Ukraine. It is proved that the norm of diversion can be competed with the norm of a terrorist act as a whole (Article 113 of the Criminal Code of Ukraine and as part of the whole (Article 258 of the Criminal Code of Ukraine, and in such cases the preference in enforcement should be qualified as a diversion. Examples given in this article are an illustrations of an ideal and actual set of diversion e and terrorist act.

  8. Emergency communication and information issues in terrorist events involving radioactive materials.

    Science.gov (United States)

    Becker, Steven M

    2004-01-01

    With the threat posed by terrorism involving radioactive materials now high on the nation's agenda, local, state, and federal agencies are moving to enhance preparedness and response capabilities. Crucial to these efforts is the development of effective risk communication strategies. This article reports findings from an ongoing study of risk communication issues in nuclear/radiological terrorism situations. It is part of a larger CDC-funded effort that aims to better understand communication challenges associated with weapons of mass destruction terrorism incidents. Presented here are formative research findings from 16 focus groups (n = 163) in which a multi-part, hypothetical radioactive materials terrorism situation was discussed. Twelve of the focus groups were carried out with members of the general public (drawn from a variety of ethnic backgrounds and geographic locations), and four groups were composed of first responders, hospital emergency department personnel, and public health professionals. One aim of the focus groups was to elicit detailed information on people's knowledge, views, perceptions, reactions, and concerns related to a nuclear/radiological terrorism event, and to better understand people's specific information needs and preferred information sources. A second aim was to pretest draft informational materials prepared by CDC and NIOSH. Key findings for the public and professional groups are presented, and the implications of the research for developing messages in radiological/nuclear terrorism situations are explored.

  9. Terrorism and Counter-Terrorism Strategies in a Globalised World : alternative perceptiveness of terrorist emergence theory and policing strategies confrontation with human rights

    OpenAIRE

    Kikkas, Margit

    2015-01-01

    Globalisation and development in technology have advanced terrorism to reach a broader target audience. Especially focussing at the international co-operation strategies and combined social networks, terrorist activities have an direct- and indirect effect on private households, international commerce and local governments. Security institutions and state organisations use various combinations of counter- terrorism measures, that are mostly social-, political-, or financial in nature. Neverth...

  10. The EU Legislative Framework Against Money Laundering and Terrorist Finance:A Critical Analysis in the Light of Evolving Global Standards

    OpenAIRE

    Gilmore, William; Mitsilegas, Valsamis

    2007-01-01

    This article examines the evolution of the EU anti-money laundering legislative framework (which in recent years has also included measures to counter terrorist finance), by focusing in particular on recent legislation such as the third money laundering Directive and the Regulation on controls of cash entering the EU, both adopted in 2005. The analysis highlights the relationship between these instruments and international initiatives in the field (in particular FATF standards), and addresses...

  11. Long-Term Memory for the Terrorist Attack of September 11: Flashbulb Memories, Event Memories, and the Factors that Influence Their Retention

    Science.gov (United States)

    Hirst, William; Phelps, Elizabeth A.; Buckner, Randy L.; Budson, Andrew E.; Cuc, Alexandru; Gabrieli, John D. E.; Johnson, Marcia K.; Lustig, Cindy; Lyle, Keith B.; Mather, Mara; Meksin, Robert; Mitchell, Karen J.; Ochsner, Kevin N.; Schacter, Daniel L.; Simons, Jon S.; Vaidya, Chandan J.

    2009-01-01

    More than 3,000 individuals from 7 U.S. cities reported on their memories of learning of the terrorist attacks of September 11, as well as details about the attack, 1 week, 11 months, and/or 35 months after the assault. Some studies of flashbulb memories examining long-term retention show slowing in the rate of forgetting after a year, whereas…

  12. Developing Health-Based Pre-Planning Clearance Goals for Airport Remediation Following a Chemical Terrorist Attack: Decision Criteria for Multipathway Exposure Routes

    OpenAIRE

    Watson, Annetta; Dolislager, Fredrick; Hall, Linda; Raber, Ellen; Hauschild, Veronique D.; Love, Adam H.

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and de...

  13. Examining Changing American Perceptions of the Terrorist Threat: From the Oklahoma City Bombing to Al Qaeda

    Science.gov (United States)

    2017-12-01

    information. As a result, accountability measures, such as oversight by Congress or public debate by watchdog groups like the media are difficult to...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release. Distribution is unlimited. EXAMINING... Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instruction

  14. Occupational Practitioner's Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack.

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  15. Occupational Practitioner’s Role in the Management of a Crisis: Lessons Learned from the Paris November 2015 Terrorist Attack

    Science.gov (United States)

    Descatha, Alexis; Huynh Tuong, Alice; Coninx, Pierre; Baer, Michel; Loeb, Thomas; Despréaux, Thomas

    2016-01-01

    In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015. During and after the Paris attack, occupational practitioners, in collaboration with emergency and security professionals, were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans. Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events and participate in preventing, to the extent possible, posttraumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols. In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up. PMID:27703965

  16. Forecasting the “Arab Spring” of 2011: Terrorist Incident Data from 2000-2010 Offered No Early Warning

    Directory of Open Access Journals (Sweden)

    Richard J. Chasdi

    2013-04-01

    Full Text Available One of the single most predominant questions associated with the so-called “Arab Spring” is whether or not any social research indicators associated with terrorism data are available with predictive value for such profound structural political changes. The underlying aim of this “Research Note” is to take a first pass at the terrorism data and to compare certain terrorism data trends for four countries that experienced successful regime change in 2011, namely Tunisia, Egypt, Libya, and Yemen, to terrorism trends in nine countries where political strains and tensions did not result in full blown regime change. In this essay, those countries include Bahrain, Syria, Jordan, Morocco, Algeria, Kuwait, UAE, Lebanon, and Saudi Arabia. From the start, it should be clear that even though there was non-violent protest in many of these countries, this analysis places singular attention on what both Gurr and Ross and Miller call “oppositional” or “insurgent” terrorism where terrorist assaults are directed at state governments.

  17. Occupational practitioner's role in the management of a crisis: lessons learned from the Paris November 2015 terrorist attack

    Directory of Open Access Journals (Sweden)

    Alexis Descatha

    2016-09-01

    Full Text Available In massive catastrophic events, occupational health practitioners are more and more frequently involved in the management of such situations. We aim to describe the multiple aspects of the role that occupational health practitioners might play, by focusing on the recent example of the Paris terrorist attack of November 2015.During and after the Paris attack, occupational practitioners in collaboration with emergency and security professionals were involved in psychological care, assembling information, follow-up, return-to-work, and improving in-company safety plans.Based on this experience and other industrial disasters, we distinguish three phases: the critical phase, the post-critical phase, and the anticipation phase. In the critical phase, the occupational practitioner cares for patients before the emergency professionals take charge, initiates the psychological management, and may also play an organizational role for company health aspects. In the post-critical phase, he or she would be involved in monitoring those affected by the events, and participate in preventing, to the extent possible, post-traumatic stress disorder, helping victims in the return-to-work process, and improving procedures and organizing drills. In addition to their usual work of primary prevention, occupational practitioners should endeavor to improve preparedness in the anticipation phase, by taking part in contingency planning, training in first aid, and defining immediately applicable protocols.In conclusion, recent events have highlighted the essential role of occupational health services in anticipation of a crisis, management during the crisis, and follow-up.

  18. Urban logistics profile – Yogyakarta city, Indonesia

    Directory of Open Access Journals (Sweden)

    Maria Sri Asih Anna

    2018-01-01

    Full Text Available In recent years, more rural areas are becoming urban areas accompanied by escalation of logistics activities. Unlike passenger transport, the planning, policy and control of freight transport in developing countries have not been integrated into a reliable and efficient logistics system. Therefore, generating city logistics profile is necessary in order to support the planning of urban logistics system. This study aims to establish a logistics profile of Yogyakarta city, Indonesia, by dividing urban zones into several homogeneous groups, judging from several aspects, including city area features, product characteristics and agents/delivery profile. Logistics profile variables were calculated based on administrative boundaries, resulting in 45 areas to be investigated. Profiles were matched in groups of homogeneous stores (A, large commercial stores (C and residential areas with local trade (D,with one overlapping profile, i.e. profile A and profile D, in some locations in the middle of the city.

  19. Private Security Infrastructure Abroad: Criminal-Terrorist Agendas and the Operational Environment

    Science.gov (United States)

    2007-11-01

    for the legal or gray market acquisition of weapons—sometimes in huge quantities—and including far more than the side arms sometimes specified in...passing interest only—but reflecting the reputation for “gray market ,” legally questionable, or downright illegal private security initiatives in...these groups, some Licorne soldiers [deployed French “ Unicorn Force” peacekeep- ers], once their four-month commission is up, come knock- ing at their

  20. Transnational Crime and the Criminal-Terrorist Nexus: Synergies and Corporate Trends (Walker Paper, Number 1)

    Science.gov (United States)

    2005-05-01

    20,000 of those human beings are delivered annually by criminals to the United States and forced into prostitution, pornography , and sweatshop labor, it...economy. The Abu Sayyaf Group (ASG), an Islamic extremist organization in the Philippines, kid - napped two Americans and killed one of them in 2002. An ASG...eradication efforts told the author that cultivators, traf- fickers, and profit takers are now users and addicts —an alarming trend that will negatively impact

  1. An open, randomized, parallel-group study to compare the efficacy and safety profile of inhaled human insulin (exubera) with meformin as adjunctive therapy in patients with type 2 diabetes poorly controlled on a sulfonylurea: response to mikhail and cope

    DEFF Research Database (Denmark)

    Barnett, Anthony H.; Dreyer, Manfred; Lange, Peter

    2006-01-01

    OBJECTIVE: To compare the efficacy and safety profile of adding inhaled human insulin (INH; Exubera) or metformin to sulfonylurea monotherapy in patients with poorly controlled type 2 diabetes. RESEARCH DESIGN AND METHODS: We performed an open-label, parallel, 24-week, multicenter trial. At week -1......: In patients with type 2 diabetes poorly controlled on a sulfonylurea (A1C >9.5%), the addition of premeal INH significantly improves glycemic control compared with adjunctive metformin and is well tolerated....

  2. Terrorist attacks in the largest metropolitan city of Pakistan: Profile of soft tissue and skeletal injuries from a single trauma center.

    Science.gov (United States)

    Khan, Muhammad Shahid; Waheed, Shahan; Ali, Arif; Mumtaz, Narjis; Feroze, Asher; Noordin, Shahryar

    2015-01-01

    Pakistan has been hugely struck with massive bomb explosions (car and suicide bombs) resulting in multiple casualties in the past few years. The aim of this study is to present the patterns of skeletal and soft tissue injuries and to review the outcome of the victims who presented to our hospital. This is a retrospective chart review from January 2008 to December 2012. The medical record numbers of patients were obtained from the hospital Health Information and Management Sciences (HIMS) as per the ICD-9 coding. During the study period, more than 100 suicide and implanted bomb blast attacks took place in the public proceedings, government offices, residential areas and other places of the city. Altogether 262 patients were enrolled in the study. The mean age of the patients was 31±14 years. The shrapnel inflicted wounds were present on to the upper limb in 24 patients and the lower limb in 50. Long bone fractures were the most common skeletal injuries. The fractures were complicated by penetrating fragments and nails which result in post operative infections and prolonged hospital stay.

  3. Countering Al-Shabaab: A Case to Minimize Transnational Terrorist Threats Against Uganda

    Science.gov (United States)

    2011-12-01

    inception and the group’s major chronological events from 2006 to 2010. The study then analyzes the factors that may have contributed to Al-Shabaab joining...July 11, 2010. It provides a historical background of Al-Shabaab since its inception and the group’s major chronological events from 2006 to 2010. The...contrast, Audrey Cronin argues that military repression has caused the decline and end of groups like the Shining Path of Peru in 1992.49 In this study

  4. JIHADIST GROUPS IN THE SAHEL. AN ETYMOLOGICAL ANALYSIS

    Directory of Open Access Journals (Sweden)

    Francesco Saverio Angió

    2018-01-01

    Full Text Available The names of the insurgent groups include historical, cultural, ethnic, territorial and doctrinal references that appear too specific to be considered accidental and thus could be indicative of their strategy. The examples of terrorist attacks carried out by these groups support this argument, as they adopted or changed their name beforehand, shortly before a spinoff group, a new alliance or an offshoot emerged, or when an attack occurred in a non-traditional geographic area of action. Unfortunately, too often mass media and government officials utilise incorrect and/or superficial translations of these names, thus contributing to a lack of detailed information on the jihadists. The etymological analysis of the Arabic names of the Sahelian jihadist insurgents intends to and contributes to increase the knowledge on the nature and actions of these groups

  5. The state of physical and mental health of children from the anti-terrorist operation zone

    Directory of Open Access Journals (Sweden)

    N.M. Korenev

    2017-02-01

    Full Text Available The aim of the study was the assessment of physical and mental health of school-age children from the war zone in the Eastern Ukraine. Materials and methods. Clinical and instrumental examination was performed in 286 children aged 7–18 years, of which 209 were from the zone of the antiterrorist operation, and 77 — children of migrants from the Donetsk and Luhansk regions. The comparison group consisted of 672 children of the same age of the Kharkiv region and Kharkiv. To determine the characteristics of violations of children’s mental health, there was conducted a clinical and psychological examination by fil­ling a special form. Results. It was found that most of the children from the war zone in the Eastern Ukraine and migrants had somatic and psychosomatic complaints. The data were obtained on polymorphism of clinical symptoms regarding psychopathological disorders in this cohort, with predominance in the clinical structure of fatigue, emotional instability, stress, and increased physical fatigue, recurrent headaches, dizziness. Conclusions. It was found that in terms of the incidence of most clinical entities with respect to somatic and psychiatric pathologies, the differences between the study group and population controls are absent. One of the priorities of maintaining and strengthening the health of children during the military conflict in the East of Ukraine is the need to develop and put into practice active psychoprophylactic activities regarding adaptation disorders.

  6. An open, randomized, parallel-group study to compare the efficacy and safety profile of inhaled human insulin (Exubera) with glibenclamide as adjunctive therapy in patients with type 2 diabetes poorly controlled on metformin

    DEFF Research Database (Denmark)

    Barnett, AH; Dreyer, M; Lange, Peter

    2006-01-01

    OBJECTIVE: To compare the efficacy and safety profile of adding inhaled human insulin (INH) (Exubera) or glibenclamide to metformin monotherapy in patients with poorly controlled type 2 diabetes. RESEARCH DESIGN AND METHODS: We conducted an open-label, parallel, 24-week multicenter trial. Patients...... associated clinical manifestations. CONCLUSIONS: In patients with type 2 diabetes poorly controlled on metformin, adding INH or glibenclamide was similarly effective in improving glycemic control, and both were well tolerated. A predefined subgroup with very high A1C (>9.5%) was more effectively treated...

  7. Group X

    Energy Technology Data Exchange (ETDEWEB)

    Fields, Susannah

    2007-08-16

    This project is currently under contract for research through the Department of Homeland Security until 2011. The group I was responsible for studying has to remain confidential so as not to affect the current project. All dates, reference links and authors, and other distinguishing characteristics of the original group have been removed from this report. All references to the name of this group or the individual splinter groups has been changed to 'Group X'. I have been collecting texts from a variety of sources intended for the use of recruiting and radicalizing members for Group X splinter groups for the purpose of researching the motivation and intent of leaders of those groups and their influence over the likelihood of group radicalization. This work included visiting many Group X websites to find information on splinter group leaders and finding their statements to new and old members. This proved difficult because the splinter groups of Group X are united in beliefs, but differ in public opinion. They are eager to tear each other down, prove their superiority, and yet remain anonymous. After a few weeks of intense searching, a list of eight recruiting texts and eight radicalizing texts from a variety of Group X leaders were compiled.

  8. Spiking the expectancy profiles

    DEFF Research Database (Denmark)

    Hansen, Niels Chr.; Loui, Psyche; Vuust, Peter

    Melodic expectations have long been quantified using expectedness ratings. Motivated by statistical learning and sharper key profiles in musicians, we model musical learning as a process of reducing the relative entropy between listeners' prior expectancy profiles and probability distributions...... of a given musical style or of stimuli used in short-term experiments. Five previous probe-tone experiments with musicians and non-musicians are revisited. Exp. 1-2 used jazz, classical and hymn melodies. Exp. 3-5 collected ratings before and after exposure to 5, 15 or 400 novel melodies generated from...... a finite-state grammar using the Bohlen-Pierce scale. We find group differences in entropy corresponding to degree and relevance of musical training and within-participant decreases after short-term exposure. Thus, whereas inexperienced listeners make high-entropy predictions by default, statistical...

  9. Group Flow and Group Genius

    Science.gov (United States)

    Sawyer, Keith

    2015-01-01

    Keith Sawyer views the spontaneous collaboration of group creativity and improvisation actions as "group flow," which organizations can use to function at optimum levels. Sawyer establishes ideal conditions for group flow: group goals, close listening, complete concentration, being in control, blending egos, equal participation, knowing…

  10. Politics of Feminine Abuse: Political Oppression and Masculine Obstinacy in Doris Lessing’s The Good Terrorist

    Directory of Open Access Journals (Sweden)

    Pedram Lalbakhsh

    2012-07-01

    Full Text Available This paper studies the male-dominated world of Doris Lessing’s novel The Good Terrorist. Alice Mellings, the protagonist of the novel, is a political activist whose reliance on male figures in the story—the leaders of a subdivision of a political party—ends in disillusionment and frustration. Looking at this novel from a socialist feminist point of view, Alice Mellings is found to be a minor member, exploited and abused, who has to follow the orders and instructions of her inept superiors—all male. While Alice is the one who guarantees the continuation of activism (doing all kinds of jobs needed to keep the squat alive, she is never allowed to have a role in decision making. She is a member whose identity is defined by male superiors and is considered as a half-human whose services are to be enjoyed only. However, the findings of this study prove Alice as one who has her own voice at the end. The novel’s closing is marked with an engendered New Woman who is aware of the political abuse and whose independent unbound identity stands much higher than the political oppression and masculine obstinacy that had imprisoned her for so long. She is a different woman at the end; one who knows her power, believes in it and decides to fight and not to surrender. And this is a new consciousness that Lessing raises: discover your feminine power, have a firm belief in it and use it to win.

  11. Permutation groups

    CERN Document Server

    Passman, Donald S

    2012-01-01

    This volume by a prominent authority on permutation groups consists of lecture notes that provide a self-contained account of distinct classification theorems. A ready source of frequently quoted but usually inaccessible theorems, it is ideally suited for professional group theorists as well as students with a solid background in modern algebra.The three-part treatment begins with an introductory chapter and advances to an economical development of the tools of basic group theory, including group extensions, transfer theorems, and group representations and characters. The final chapter feature

  12. The day Norway cried: Proximity and distress in Norwegian citizens following the 22nd July 2011 terrorist attacks in Oslo and on Utøya Island.

    Science.gov (United States)

    Thoresen, Siri; Aakvaag, Helene Flood; Wentzel-Larsen, Tore; Dyb, Grete; Hjemdal, Ole Kristian

    2012-01-01

    Terrorism may create fear and stress reactions not only in the direct victims, but also in the general population. This study investigated emotional responses in the Norwegian population following the 22nd July 2011 terrorist attacks. We hypothesized that Oslo residents would report a higher level of fear responses compared with people living outside Oslo and that proximity would be associated with early distress and later post-traumatic stress reactions. Representative samples were drawn from the Norwegian Population Registry. Telephone interviews were conducted 4-5 months after the attacks. The response rate for the Oslo sample (N=465) was 24% of the total sample, and 43% of those who were actually reached by phone and asked to participate. Corresponding figures for the sample living outside Oslo (N=716) were 19% and 30%. Our results show strong immediate emotional responses, particularly sadness and a feeling of unreality, in both samples. Jumpiness and other fear responses were significantly higher among Oslo residents. Current level of risk perception was low 4-5 months after the attacks; however, a significant minority reported to feel less safe than before. Geographical and psychological proximity were associated with early emotional responses. Psychological proximity was significantly associated with post-traumatic stress reactions, while measures of geographical proximity were not. Immediate emotional responses, first-week reactions, and first-week jumpiness were uniquely and significantly associated with post-traumatic stress reactions. Post-traumatic stress reactions were elevated in ethnic minorities. The terrorist attacks seem to have had a significant effect on the Norwegian population, creating sadness and insecurity, at least in the short term. Proximity to the terrorist attacks was strongly associated with distress in the population, and early distress was strongly related to later post-traumatic stress reactions. Our results indicate that

  13. Group devaluation and group identification

    NARCIS (Netherlands)

    Leach, C.W.; Rodriguez Mosquera, P.M.; Vliek, M.L.W.; Hirt, E.

    2010-01-01

    In three studies, we showed that increased in-group identification after (perceived or actual) group devaluation is an assertion of a (preexisting) positive social identity that counters the negative social identity implied in societal devaluation. Two studies with real-world groups used order

  14. Lie groups and algebraic groups

    Indian Academy of Sciences (India)

    We give an exposition of certain topics in Lie groups and algebraic groups. This is not a complete ... of a polynomial equation is equivalent to the solva- bility of the equation ..... to a subgroup of the group of roots of unity in k (in particular, it is a ...

  15. Golf Tourism: A Research Profile and Security Perceptions in Belek, Antalya, Turkey.

    Directory of Open Access Journals (Sweden)

    Akın Aksu

    2017-01-01

    Full Text Available Our study aim to determine the current profile of sampled golf tourists visiting Belek, Antalya in high season and their perceptions of security using questionnaires to survey golf tourists in the sample were evaluated separately. The sample consisted of a survey profile of 280 golf tourists and their responses regarding security perceptions for Belek, Antalya. Chi-square testing and descriptive statistics were used to analyze the data. Despite some negative developments in Turkey (such as terrorist attacks, the majority of golf tourists still remain satisfied and motivated to recommend the destination to others. The results of the study would be of help for tourism professionals, academicians and decision makers especially in developing future marketing strategies for Belek.

  16. "Second class loss": political culture as a recovery barrier--the families of terrorist casualties' struggle for national honors, recognition, and belonging.

    Science.gov (United States)

    Lebel, Udi

    2014-01-01

    Israeli families of terrorist victims have undertaken initiatives to include their dearest in the national pantheon. The objections opposed the penetration of "second-class loss" into the symbolic closure of heroic national bereavement. The "hierarchy of bereavement" is examined through the lens of political culture organized around the veneration held for the army fallen and their families, which has symbolic as well as rehabilitative outcomes. Families of civilian terror victims claims for similar status and treatment had to frame their loss as national in the eyes of the social policy. The article claimed linkage between collective memory and rehabilitation.

  17. Profile of organic food consumers

    Directory of Open Access Journals (Sweden)

    Kranjac Mirjana

    2017-01-01

    Full Text Available The aim of this study is to prove that profile of organic food consumers is dependent on their socio-demographic characteristics as well as to shape universal organic food consumer profile. The survey included 398 consumers in Serbia. Results indicate existence of typical consumer's profile. The findings could be generalized proving that socio-demographic profiles in a larger population are strictly related to the decision to utilize organic food. The study finally contributes to the stakeholders in general, since the knowledge of the attributes can help all of them to play more active role in this supply chain. It should stimulate the personalized approach to the particular groups of consumers based on socio-demographic characteristics in order to intensify consumption of organic food and to create different marketing plans dependent on the particular countries or areas.

  18. Lipid profile in cerebrovascular accidents.

    Science.gov (United States)

    Togha, Mansoureh; Gheini, Mohamad Reza; Ahmadi, Babak; Khashaiar, Patricia; Razeghi, Soodeh

    2011-01-01

    Changes in the lipid profile have been suggested as a risk factor for developing ischemic stroke. Their role in intra-cerebral hemorrhage, however, is not clear. The present study was designed to evaluate the lipid profile levels of patients who had experienced an acute stroke during the first 24-hour and to compare these levels in different patients suffering from the stroke, either hemorrhagic or ischemic, and healthy individuals. In this cross-sectional study, 258 consecutive patients with acute stroke admitted to the neurology department of our center during September 2006 and September 2007 were studied. As for the control group, 187 apparently healthy subjects living in the same community and matched for age and sex were selected. Lipid profile was measured and compared between the three groups. In the patients' group, 65 suffered from hemorrhagic stroke (group 1) and the other 193 had ischemic stroke (group 2). Except for TG values, there was no significant difference among the ischemic and hemorrhagic lipid profile. Age, cholesterol, and LDL influenced the risk of developing an ischemic stroke; TG was not reported as a risk factor or a protective one. While the comparison of data retrieved from patients suffering from hemorrhagic strokes with the controls, revealed LDL as the risk factor contributing to the development of ICH whereas TG was reported as a protective factor. It could be concluded that LDL level can be considered as a risk factor for both ischemic and hemorrhagic cerebral events.

  19. Group Work

    Science.gov (United States)

    Wilson, Kristy J.; Brickman, Peggy; Brame, Cynthia J.

    2018-01-01

    Science, technology, engineering, and mathematics faculty are increasingly incorporating both formal and informal group work in their courses. Implementing group work can be improved by an understanding of the extensive body of educational research studies on this topic. This essay describes an online, evidence-based teaching guide published by…

  20. Reflection groups

    International Nuclear Information System (INIS)

    Eggermont, G.

    2006-01-01

    In 2005, PISA organised proactive meetings of reflection groups on involvement in decision making, expert culture and ethical aspects of radiation protection.All reflection group meetings address particular targeted audiences while the output publication in book form is put forward