WorldWideScience

Sample records for traditional threat vectors

  1. An overview of non-traditional nuclear threats

    International Nuclear Information System (INIS)

    Geelhood, B.D.; Wogman, N.A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or 'dirty' bombs. The consequences of these nuclear and radiological threats are both economic and life threatening. The defense against undesirable materials entering our borders involves extensive radiation monitoring at ports of entry. The radiation and other signatures of potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve radiation detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo. (author)

  2. Vector-borne disease intelligence: strategies to deal with disease burden and threats

    Czech Academy of Sciences Publication Activity Database

    Braks, M.; Medlock, J. M.; Hubálek, Zdeněk; Hjertqvist, M.; Perrin, Y.; Lancelot, R.; Duchyene, E.; Hendrickx, G.; Stroo, A.; Heyman, P.; Sprong, H.

    2014-01-01

    Roč. 2, č. 280 (2014), s. 280 ISSN 2296-2565 Institutional support: RVO:68081766 Keywords : disease burden * emerging diseases * one health * surveillance * threat * vector-borne diseases Subject RIV: EE - Microbiology, Virology

  3. Promoting dental hygiene to children: comparing traditional and interactive media following threat appeals.

    Science.gov (United States)

    Panic, Katarina; Cauberghe, Veroline; De Pelsmacker, Patrick

    2014-01-01

    Until now, social marketing campaigns mainly targeted children using traditional media. However, little is known about the effectiveness of computer games to communicate health-related information to children. This study compares the impact of an interactive game as a medium to provide health information and improve children's dietary habits to the impact of more traditional media. Using a 2 × 3 between-subject factorial design with 190 children (7-9 years old), this study investigates the effect of threat messages (weak vs. strong) concerning dental hygiene on behavioral outcome (snack choice), and how this effect is moderated by the type of medium used to communicate subsequent health information after the threat appeal (computer game, information brochure, narrative story). Results show a positive significant effect of perceived threat on children's adaptive behavior. However, this effect only remains significant when afterwards children are exposed to a narrative health-related story. When children play a game or read a brochure, they need to devote more attention to process this content, distracting them from the original threat message. In sum, when a threat message is followed by additional health information, the medium through which this information is presented influences the effectiveness of the preceding threat message.

  4. Traditional and robust vector selection methods for use with similarity based models

    International Nuclear Information System (INIS)

    Hines, J. W.; Garvey, D. R.

    2006-01-01

    Vector selection, or instance selection as it is often called in the data mining literature, performs a critical task in the development of nonparametric, similarity based models. Nonparametric, similarity based modeling (SBM) is a form of 'lazy learning' which constructs a local model 'on the fly' by comparing a query vector to historical, training vectors. For large training sets the creation of local models may become cumbersome, since each training vector must be compared to the query vector. To alleviate this computational burden, varying forms of training vector sampling may be employed with the goal of selecting a subset of the training data such that the samples are representative of the underlying process. This paper describes one such SBM, namely auto-associative kernel regression (AAKR), and presents five traditional vector selection methods and one robust vector selection method that may be used to select prototype vectors from a larger data set in model training. The five traditional vector selection methods considered are min-max, vector ordering, combination min-max and vector ordering, fuzzy c-means clustering, and Adeli-Hung clustering. Each method is described in detail and compared using artificially generated data and data collected from the steam system of an operating nuclear power plant. (authors)

  5. Traditional vectors as an introduction to geometric algebra

    International Nuclear Information System (INIS)

    Carroll, J E

    2003-01-01

    The 2002 Oersted Medal Lecture by David Hestenes concerns the many advantages for education in physics if geometric algebra were to replace standard vector algebra. However, such a change has difficulties for those who have been taught traditionally. A new way of introducing geometric algebra is presented here using a four-element array composed of traditional vector and scalar products. This leads to an explicit 4 x 4 matrix representation which contains key requirements for three-dimensional geometric algebra. The work can be extended to include Maxwell's equations where it is found that curl and divergence appear naturally together. However, to obtain an explicit representation of space-time algebra with the correct behaviour under Lorentz transformations, an 8 x 8 matrix representation has to be formed. This leads to a Dirac representation of Maxwell's equations showing that space-time algebra has hidden within its formalism the symmetry of 'parity, charge conjugation and time reversal'

  6. Hidden sylvatic foci of the main vector of Chagas disease Triatoma infestans: threats to the vector elimination campaign?

    Directory of Open Access Journals (Sweden)

    Leonardo A Ceballos

    2011-10-01

    Full Text Available Establishing the sources of reinfestation after residual insecticide spraying is crucial for vector elimination programs. Triatoma infestans, traditionally considered to be limited to domestic or peridomestic (abbreviated as D/PD habitats throughout most of its range, is the target of an elimination program that has achieved limited success in the Gran Chaco region in South America.During a two-year period we conducted semi-annual searches for triatomine bugs in every D/PD site and surrounding sylvatic habitats after full-coverage spraying of pyrethroid insecticides of all houses in a well-defined rural area in northwestern Argentina. We found six low-density sylvatic foci with 24 T. infestans in fallen or standing trees located 110-2,300 m from the nearest house or infested D/PD site detected after insecticide spraying, when house infestations were rare. Analysis of two mitochondrial gene fragments of 20 sylvatic specimens confirmed their species identity as T. infestans and showed that their composite haplotypes were the same as or closely related to D/PD haplotypes. Population studies with 10 polymorphic microsatellite loci and wing geometric morphometry consistently indicated the occurrence of unrestricted gene flow between local D/PD and sylvatic populations. Mitochondrial DNA and microsatellite sibship analyses in the most abundant sylvatic colony revealed descendents from five different females. Spatial analysis showed a significant association between two sylvatic foci and the nearest D/PD bug population found before insecticide spraying.Our study shows that, despite of its high degree of domesticity, T. infestans has sylvatic colonies with normal chromatic characters (not melanic morphs highly connected to D/PD conspecifics in the Argentinean Chaco. Sylvatic habitats may provide a transient or permanent refuge after control interventions, and function as sources for D/PD reinfestation. The occurrence of sylvatic foci of T. infestans in

  7. Speaking up about traditional and professionalism-related patient safety threats: a national survey of interns and residents.

    Science.gov (United States)

    Martinez, William; Lehmann, Lisa Soleymani; Thomas, Eric J; Etchegaray, Jason M; Shelburne, Julia T; Hickson, Gerald B; Brady, Donald W; Schleyer, Anneliese M; Best, Jennifer A; May, Natalie B; Bell, Sigall K

    2017-11-01

    Open communication between healthcare professionals about care concerns, also known as 'speaking up', is essential to patient safety. Compare interns' and residents' experiences, attitudes and factors associated with speaking up about traditional versus professionalism-related safety threats. Anonymous, cross-sectional survey. Six US academic medical centres, 2013-2014. 1800 medical and surgical interns and residents (47% responded). Attitudes about, barriers and facilitators for, and self-reported experience with speaking up. Likelihood of speaking up and the potential for patient harm in two vignettes. Safety Attitude Questionnaire (SAQ) teamwork and safety scales; and Speaking Up Climate for Patient Safety (SUC-Safe) and Speaking Up Climate for Professionalism (SUC-Prof) scales. Respondents more commonly observed unprofessional behaviour (75%, 628/837) than traditional safety threats (49%, 410/837); pbarrier to speaking up about unprofessional behaviour compared with traditional safety threats (58%, 482/837 vs 42%, 348/837; psafety vignette, even when they perceived high potential patient harm (20%, 49/251 vs 71%, 179/251; psafety vignette (OR 1.90, 99% CI 1.36 to 2.66 and 1.46, 1.02 to 2.09, respectively), while only a positive perception of SUC-Prof was associated with speaking up in the professionalism vignette (1.76, 1.23 to 2.50). Interns and residents commonly observed unprofessional behaviour yet were less likely to speak up about it compared with traditional safety threats even when they perceived high potential patient harm. Measuring SUC-Safe, and particularly SUC-Prof, may fill an existing gap in safety culture assessment. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  8. Non-Traditional Security Threats in the Border Areas: Terrorism, Piracy, Environmental Degradation in Southeast Asian Maritime Domain

    Science.gov (United States)

    Dabova, E. L.

    2013-11-01

    In addition to facilitating peaceful trade and economic development, sovereign territory, territorial waters and international waters are being used by various criminal groups that pose threats to governments, businesses and civilian population in Southeast Asia. Nonstate criminal maritime activities were not receiving appropriate attention as they were overshadowed by traditional military security challenges. Yet more and more frequently, the non-traditional actors challenge lines of communication, jeopardize access to strategic resources, complicate traditional defence tasks, and harm the environment. Understanding the nature of non-traditional threats, and the ways to combat them, requires international legal, historical and political science analysis within a united problem-oriented approach. A fair critique to pure interest, power and knowledge -based theories of regime formation was developed by E.K. Leonard's1, who explained the evolution of the international system from the global governance perspective. The present study is based on the premise that pure nation-state approaches are incapable of providing a theoretical ground for addressing the growing influence of international criminal networks in South East Asia. From an international relations theory perspective, the author of this study agrees with D.Snidal2 that the hegemonic stability theory has "limits" and is insufficient in describing modern challenges to sustainable international security regime, including non-traditional threats, where collective action is more efficient from an interest and capability standpoint. At the same time the author of this study does not share the viewpoint on "marginalization"3 of international law in current international order due to its fragmentation and regionalization4 and "global power shifts"5 . The United Nations, as a global institution at the top of the vertical hierarchy of international legal order, and the EU as an example of "self-contained" regime along

  9. Different groups, different threats: a multi-threat approach to the experience of stereotype threats.

    Science.gov (United States)

    Shapiro, Jenessa R

    2011-04-01

    Two studies demonstrated that different negatively stereotyped groups are at risk for distinct forms of stereotype threats. The Multi-Threat Framework articulates six distinct stereotype threats and the unique constellations of variables (e.g., group identification, stereotype endorsement) that elicit each stereotype threat. Previous research suggests that different negatively stereotyped groups systematically vary across these stereotype threat elicitors; a pilot study confirms these differences. Across two studies, groups that tend to elicit low stereotype endorsement (religion, race/ethnicity, congenital blindness) were less likely to report experiencing self-as-source stereotype threats (stereotype threats requiring stereotype endorsement) and groups that tend to elicit low group identification (mental illness, obesity, blindness later in life) were less likely to report experiencing group-as-target stereotype threats (stereotype threats requiring group identification). This research suggests that traditional models may overlook the experiences of stereotype threats within some groups and that interventions tailored to address differences between stereotype threats will be most effective.

  10. Data fusion and machine learning to identify threat vectors for the Zika virus and classify vulnerability

    Science.gov (United States)

    Gentle, J. N., Jr.; Kahn, A.; Pierce, S. A.; Wang, S.; Wade, C.; Moran, S.

    2016-12-01

    With the continued spread of the zika virus in the United States in both Florida and Virginia, increased public awareness, prevention and targeted prediction is necessary to effectively mitigate further infection and propagation of the virus throughout the human population. The goal of this project is to utilize publicly accessible data and HPC resources coupled with machine learning algorithms to identify potential threat vectors for the spread of the zika virus in Texas, the United States and globally by correlating available zika case data collected from incident reports in medical databases (e.g., CDC, Florida Department of Health) with known bodies of water in various earth science databases (e.g., USGS NAQWA Data, NASA ASTER Data, TWDB Data) and by using known mosquito population centers as a proxy for trends in population distribution (e.g., WHO, European CDC, Texas Data) while correlating historical trends in the spread of other mosquito borne diseases (e.g., chikungunya, malaria, dengue, yellow fever, west nile, etc.). The resulting analysis should refine the identification of the specific threat vectors for the spread of the virus which will correspondingly increase the effectiveness of the limited resources allocated towards combating the disease through better strategic implementation of defense measures. The minimal outcome of this research is a better understanding of the factors involved in the spread of the zika virus, with the greater potential to save additional lives through more effective resource utilization and public outreach.

  11. Brazil’s fight against narcotraffic in the border with Colombia. An approach to the restrains of non-traditional threats over foreign policy

    Directory of Open Access Journals (Sweden)

    Emilse Calderón

    2014-05-01

    Full Text Available In the post-Cold War international scenario, the non-traditional nature of security threats conditions the states’ foreign policies. An example of the above is the policy employed by Brazil regarding the border shared with Colombia regarding the development that narcotraffic has been having since the end of the 20th century. Therefore, this article proposes a brief analysis around the influence exercised by the non-traditional nature of the drug traffic threat over the design of Brazilian foreign policy between 1999 and 2010.

  12. Syrian Refugees: Are They a Non Traditional Threat to Water Supplies in Lebanon and Jordan

    Science.gov (United States)

    2016-09-01

    effects of Syrian refugees on the water supplies of each country as a non-traditional security threat. Political stability is the ultimate goal of each...security.html. 11 against Syrians sets the stage for political instability because the Syrians represent an increasing portion of the population, if...of political instability could send shockwaves through the region and drastically alter U.S. foreign policy in the Middle East. Though the stakes

  13. Recommendation on vectors and vector-transmitted diseases

    OpenAIRE

    Netherlands Food and Consumer Product Safety Authority

    2009-01-01

    In view of their increasing risk of introduction and their possible implications in causing major disease outbreaks, vectors, as well as vector-transmitted diseases like dengue, West Nile disease, Lyme disease and bluetongue need to be recognised as a threat to public and animal health and to the economy, also in the Netherlands. There has been an increase in the incidence of these diseases in the past two to three decades. Climate changes and changes in the use of land, water managemen...

  14. Viral Vectors for Use in the Development of Biodefense Vaccines

    National Research Council Canada - National Science Library

    Lee, John S; Hadjipanayis, Angela G; Parker, Michael D

    2005-01-01

    ... agents of bioterrorism or biowarfare. The use of viruses, for example adenovirus, vaccinia virus, and Venezuelan equine encephalitis virus, as vaccine-vectors has enabled researchers to develop effective means for countering the threat of bioterrorism and biowarfare. An overview of the different viral vectors and the threats they counter will be discussed.

  15. Tensor Calculus: Unlearning Vector Calculus

    Science.gov (United States)

    Lee, Wha-Suck; Engelbrecht, Johann; Moller, Rita

    2018-01-01

    Tensor calculus is critical in the study of the vector calculus of the surface of a body. Indeed, tensor calculus is a natural step-up for vector calculus. This paper presents some pitfalls of a traditional course in vector calculus in transitioning to tensor calculus. We show how a deeper emphasis on traditional topics such as the Jacobian can…

  16. Distance Measurement Methods for Improved Insider Threat Detection

    Directory of Open Access Journals (Sweden)

    Owen Lo

    2018-01-01

    Full Text Available Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can provide a solution, but these methods often fail to take into account changes of behaviour of users. This work builds on a published method of detecting insider threats and applies Hidden Markov method on a CERT data set (CERT r4.2 and analyses a number of distance vector methods (Damerau–Levenshtein Distance, Cosine Distance, and Jaccard Distance in order to detect changes of behaviour, which are shown to have success in determining different insider threats.

  17. The threat from without

    Directory of Open Access Journals (Sweden)

    Lassi Saressalo

    1987-01-01

    Full Text Available Of greatest importance in ethnic folklore are the recognised and unrecognised elements that are used when founding identity on tradition. For the aim of ethnic identification is to note and know the cultural features that connect me with people like me and separate me from people who are not like me. Every group and each of its members thus needs an opponent, a contact partner in order to identify itself. What about the Lapps? The ethnocentric values of ethnic folklore provide a model for this generalising comparison. 'They' are a potential danger, are unknown, strange, a threat from beyond the fells. They are sufficiently common for the group's ethnic feeling. It is here that we find tradition, folk tales, describing the community's traditional enemies, describing the threat from without, engendering preconceived ideas, conflicts and even war. The Lapps have never had an empire, they have never conquered others' territory, they have never engaged in systematic warfare against other peoples. For this reason Lapp tradition lacks an offensive ethnic folklore proper with emphasis on aggression, power, violence, heroism and an acceptance of the ideology of subordinating others. On the contrary,Lapp folklore is familiar with a tradition in which strangers are always threatening the Lapps' existence, plundering their territories, burning and destroying. The Lapp has always had to fight against alien powers, to give in or to outwit the great and powerful enemy. In the Lapp tradition the staalo represents an outside threat that cannot be directly concretised. If foes are regarded as concrete enemies that may be defeated in physical combat or that can be made to look ridiculous, a staalo is more mythical, more supranormal, more vague. One basic feature of the staalo tradition is that it only appears as one party to a conflict. The stories about the Lapp who succeeds in driving away a staalo threatening the community, to outwit the stupid giant or to kill

  18. Environmental statistical modelling of mosquito vectors at different geographical scales

    NARCIS (Netherlands)

    Cianci, D.

    2015-01-01

    Vector-borne diseases are infections transmitted by the bite of infected arthropod vectors, such as mosquitoes, ticks, fleas, midges and flies. Vector-borne diseases pose an increasingly wider threat to global public health, both in terms of people affected and their geographical spread. Mosquitoes

  19. Malaria vectors in a traditional dry zone village in Sri Lanka

    DEFF Research Database (Denmark)

    Amerasinghe, P H; Amerasinghe, F P; Konradsen, F

    1999-01-01

    Malaria transmission by anopheline mosquitoes was studied in a traditional tank-irrigation-based rice-producing village in the malaria-endemic low country dry zone of northcentral Sri Lanka during the period August 1994-February 1997. Adult mosquitoes were collected from human and bovid bait...... catches, bovid-baited trap huts, indoor catches, and pit traps. Mosquito head-thoraces were tested for the presence of Plasmodium falciparum and P. vivax, and blood-engorged abdomens for the presence of human blood by ELISAs. House surveys were done at two-day intervals to record cases of blood film...... in An. culicifacies and An. peditaeniatus. Malaria parasite infections were seen in seven mosquito species, with 75% of the positive mosquitoes containing P. falciparum and 25% P. vivax. Polymorph PV247 was recorded from a vector (i.e., An. varuna) for the first time in Sri Lanka. Computations of mean...

  20. Portunes: analyzing multi-domain insider threats

    NARCIS (Netherlands)

    Dimkov, T.; Pieters, Wolter; Hartel, Pieter H.

    2010-01-01

    The insider threat is an important problem in securing information systems. Skilful insiders use attack vectors that yield the greatest chance of success, and thus do not limit themselves to a restricted set of attacks. They may use access rights to the facility where the system of interest resides,

  1. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    Science.gov (United States)

    Greitzer, Frank L.; Frincke, Deborah A.

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, to support a move from an insider threat detection stance to one that enables prediction of potential insider presence. Twodistinctiveaspects of the approach are the objectiveof predicting or anticipating potential risksandthe useoforganizational datain additiontocyber datato support the analysis. The chapter describes the challenges of this endeavor and reports on progressin definingausablesetof predictiveindicators,developingaframeworkfor integratingthe analysisoforganizationalandcyber securitydatatoyield predictions about possible insider exploits, and developing the knowledge base and reasoning capabilityof the system.We also outline the typesof errors that oneexpectsina predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  2. Vector-borne disease intelligence: Strategies to deal with disease burden and threats

    Directory of Open Access Journals (Sweden)

    Marieta eBraks

    2014-12-01

    Full Text Available Owing to the complex nature of vector-borne diseases, whereby monitoring of human case patients does not suffice, public health authorities experience challenges in surveillance and control of vector-borne diseases. Knowledge on the presence and distribution of vectors and the pathogens they transmit is vital to a risk assessment process to permit effective early warning, surveillance and control of vector-borne diseases. Upon accepting this reality, public health authorities face the phenomenon of an exponential rise in the number of possible surveillance targets and how to decide which are essential. Here, . we propose a comprehensive approach that integrates three surveillance strategies: population-based surveillance, disease-based surveillance and context-based surveillance for EU member states to tailor the best surveillance strategy for control of vector-borne diseases in their geographic region. By classifying the surveillance structure into 5 different contexts, we hope to provide guidance in optimizing surveillance efforts. Contextual surveillance strategies for vector-borne diseases entail combining organization and data collection approaches that result in disease intelligence rather than a preset static structure.

  3. Chinese Perceptions of Traditional and Nontraditional Security Threats

    Science.gov (United States)

    2007-03-01

    will not be challenged.) For example, during a speech in Singapore in June 2005, the U.S. Secretary of Defense Donald Rumsfeld expressed the belief ...right answer. The individual is paramount and is in control of events around him. Easterners, on the other hand, products of the teachings of Taoism ...seen as American scholars who refute the China threat theory. Their belief in power politics supports the perception that America’s goal is hegemony

  4. Emerging Vector-Borne Diseases - Incidence through Vectors.

    Science.gov (United States)

    Savić, Sara; Vidić, Branka; Grgić, Zivoslav; Potkonjak, Aleksandar; Spasojevic, Ljubica

    2014-01-01

    Vector-borne diseases use to be a major public health concern only in tropical and subtropical areas, but today they are an emerging threat for the continental and developed countries also. Nowadays, in intercontinental countries, there is a struggle with emerging diseases, which have found their way to appear through vectors. Vector-borne zoonotic diseases occur when vectors, animal hosts, climate conditions, pathogens, and susceptible human population exist at the same time, at the same place. Global climate change is predicted to lead to an increase in vector-borne infectious diseases and disease outbreaks. It could affect the range and population of pathogens, host and vectors, transmission season, etc. Reliable surveillance for diseases that are most likely to emerge is required. Canine vector-borne diseases represent a complex group of diseases including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, ehrlichiosis, and leishmaniosis. Some of these diseases cause serious clinical symptoms in dogs and some of them have a zoonotic potential with an effect to public health. It is expected from veterinarians in coordination with medical doctors to play a fundamental role at primarily prevention and then treatment of vector-borne diseases in dogs. The One Health concept has to be integrated into the struggle against emerging diseases. During a 4-year period, from 2009 to 2013, a total number of 551 dog samples were analyzed for vector-borne diseases (borreliosis, babesiosis, ehrlichiosis, anaplasmosis, dirofilariosis, and leishmaniasis) in routine laboratory work. The analysis was done by serological tests - ELISA for borreliosis, dirofilariosis, and leishmaniasis, modified Knott test for dirofilariosis, and blood smear for babesiosis, ehrlichiosis, and anaplasmosis. This number of samples represented 75% of total number of samples that were sent for analysis for different diseases in dogs. Annually, on average more then half of the samples

  5. Speculative dynamic vectorization to assist static vectorization in a HW/SW co-designed environment

    OpenAIRE

    Kumar, R.; Martinez, A.; Gonzalez, A.

    2013-01-01

    Compiler based static vectorization is used widely to extract data level parallelism from computation intensive applications. Static vectorization is very effective in vectorizing traditional array based applications. However, compilers inability to reorder ambiguous memory references severely limits vectorization opportunities, especially in pointer rich applications. HW/SW co-designed processors provide an excellent opportunity to optimize the applications at runtime. The availability of dy...

  6. The Smallpox Threat: The School Nurse's Role

    Science.gov (United States)

    Martin, Mary E.; Didion, Judy

    2003-01-01

    Today, with the threat of bioterrorism and war, there is a new dimension to the traditional role of the school nurse. The smallpox threat to public health will invoke the school nurse's role as an educator, liaison, and consultant in the community. This article discusses smallpox, the vaccination process, adverse effects, and postvaccination care.…

  7. Emerging vector borne diseases – incidence through vectors

    Directory of Open Access Journals (Sweden)

    Sara eSavic

    2014-12-01

    Full Text Available Vector borne diseases use to be a major public health concern only in tropical and subtropical areas, but today they are an emerging threat for the continental and developed countries also. Nowdays, in intercontinetal countries, there is a struggle with emerging diseases which have found their way to appear through vectors. Vector borne zoonotic diseases occur when vectors, animal hosts, climate conditions, pathogens and susceptible human population exist at the same time, at the same place. Global climate change is predicted to lead to an increase in vector borne infectious diseases and disease outbreaks. It could affect the range and popultion of pathogens, host and vectors, transmission season, etc. Reliable surveilance for diseases that are most likely to emerge is required. Canine vector borne diseases represent a complex group of diseases including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, erlichiosis, leishmaniosis. Some of these diseases cause serious clinical symptoms in dogs and some of them have a zoonotic potential with an effect to public health. It is expected from veterinarians in coordination with medical doctors to play a fudamental role at primeraly prevention and then treatment of vector borne diseases in dogs. The One Health concept has to be integrated into the struggle against emerging diseases.During a four year period, from 2009-2013, a total number of 551 dog samples were analysed for vector borne diseases (borreliosis, babesiosis, erlichiosis, anaplasmosis, dirofilariosis and leishmaniasis in routine laboratory work. The analysis were done by serological tests – ELISA for borreliosis, dirofilariosis and leishmaniasis, modified Knott test for dirofilariosis and blood smear for babesiosis, erlichiosis and anaplasmosis. This number of samples represented 75% of total number of samples that were sent for analysis for different diseases in dogs. Annually, on avarege more then half of the samples

  8. Web threat and its implication for E-business in Nigeria ...

    African Journals Online (AJOL)

    Web threat is any threat that uses the internet to facilitate identity theft , fraud, espionage and intelligence gathering. Web -based vulnerabilities now outnumber traditional computer security concerns. Such threats use multiple types of malware and fraud, all of which utilize HTTP or HTTPS protocols, but may also employ ...

  9. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    OpenAIRE

    E.O.S. ODHIAMBO; J. KASSILLY; L.T. MAITO; K. ONKWARE; W. A. OBOKA

    2012-01-01

    Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and ...

  10. Measuring Transnational Organized Crime Threats to US National Security

    Science.gov (United States)

    2016-05-26

    interests. These threats were separate from traditional regional or state-centered threats, and included such diverse issues as terrorism, mass migrations ...organizations as examples of TOC; the Sinaloa Cartel, the Yakuza, the Camorra. This conceptual framework leads to the conclusion that the best way to deal

  11. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  12. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  13. Malaria Vector Control Still Matters despite Insecticide Resistance.

    Science.gov (United States)

    Alout, Haoues; Labbé, Pierrick; Chandre, Fabrice; Cohuet, Anna

    2017-08-01

    Mosquito vectors' resistance to insecticides is usually considered a major threat to the recent progresses in malaria control. However, studies measuring the impact of interventions and insecticide resistance reveal inconsistencies when using entomological versus epidemiological indices. First, evaluation tests that do not reflect the susceptibility of mosquitoes when they are infectious may underestimate insecticide efficacy. Moreover, interactions between insecticide resistance and vectorial capacity reveal nonintuitive outcomes of interventions. Therefore, considering ecological interactions between vector, parasite, and environment highlights that the impact of insecticide resistance on the malaria burden is not straightforward and we suggest that vector control still matters despite insecticide resistance. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. KENYA’S CONSTITUTION AND CHILD TRAFFICKING AS A SECURITY THREAT

    Directory of Open Access Journals (Sweden)

    E.O.S. ODHIAMBO

    2012-01-01

    Full Text Available Human trafficking also referred to as modern-day slavery is seen as a security threat. Traditional security approaches to human trafficking call for analysis of trafficking as a threat to the Kenyan state and to Kenya’s control of its borders. Traditional security analyses of trafficking emphasize border security, migration controls, and international law enforcement cooperation. This article discusses three forms of child trafficking: sexual exploitation, forced labor and child soldiers and argues that the newly promulgated Kenyan constitution in chapter three on citizenship has a provision that can be interpreted as encouraging child trafficking.

  15. Sustainable Traditional Medicine: Taking the Inspirations from Ancient Veterinary Science

    Directory of Open Access Journals (Sweden)

    Sanjeev Rastogi

    2011-01-01

    Full Text Available Rapid reduction in natural resources as a consequence to the expanded urbanization, global warming and reduced natural habitat posed a considerable threat to the sustainability of traditional medicine. Being completely dependent upon natural resources like herbs, minerals and animal products, traditional medicine would possibly rank first in order of extinction of heritage if an alternative way is not considered well in time. In reference to the use of animal products, Ayurveda presents some unique examples where animals are used without causing harm to them and so without posing a threat to their existence. In the current context, when natural resources are facing a threat to their existence, a revisit to these ideas may give us a new insight to refine our look at natural resources used in traditional medicine.

  16. A combined emitter threat assessment method based on ICW-RCM

    Science.gov (United States)

    Zhang, Ying; Wang, Hongwei; Guo, Xiaotao; Wang, Yubing

    2017-08-01

    Considering that the tradition al emitter threat assessment methods are difficult to intuitively reflect the degree of target threaten and the deficiency of real-time and complexity, on the basis of radar chart method(RCM), an algorithm of emitter combined threat assessment based on ICW-RCM (improved combination weighting method, ICW) is proposed. The coarse sorting is integrated with fine sorting in emitter combined threat assessment, sequencing the emitter threat level roughly accordance to radar operation mode, and reducing task priority of the low-threat emitter; On the basis of ICW-RCM, sequencing the same radar operation mode emitter roughly, finally, obtain the results of emitter threat assessment through coarse and fine sorting. Simulation analyses show the correctness and effectiveness of this algorithm. Comparing with classical method of emitter threat assessment based on CW-RCM, the algorithm is visual in image and can work quickly with lower complexity.

  17. Threats and countermeasures for network security

    Science.gov (United States)

    Denning, Peter J.

    1991-01-01

    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented.

  18. Security Threat Assessment of an Internet Security System Using Attack Tree and Vague Sets

    OpenAIRE

    Kuei-Hu Chang

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system’s elementary event are incomplete—the traditional approach for ca...

  19. Security threat assessment of an Internet security system using attack tree and vague sets.

    Science.gov (United States)

    Chang, Kuei-Hu

    2014-01-01

    Security threat assessment of the Internet security system has become a greater concern in recent years because of the progress and diversification of information technology. Traditionally, the failure probabilities of bottom events of an Internet security system are treated as exact values when the failure probability of the entire system is estimated. However, security threat assessment when the malfunction data of the system's elementary event are incomplete--the traditional approach for calculating reliability--is no longer applicable. Moreover, it does not consider the failure probability of the bottom events suffered in the attack, which may bias conclusions. In order to effectively solve the problem above, this paper proposes a novel technique, integrating attack tree and vague sets for security threat assessment. For verification of the proposed approach, a numerical example of an Internet security system security threat assessment is adopted in this paper. The result of the proposed method is compared with the listing approaches of security threat assessment methods.

  20. Possible impact of rising sea levels on vector-borne infectious diseases

    Directory of Open Access Journals (Sweden)

    Surendran Sinnathamby N

    2011-01-01

    Full Text Available Abstract Background Vector-borne infectious diseases are a significant cause of human and animal mortality and morbidity. Modeling studies predict that changes in climate that accompany global warming will alter the transmission risk of many vector-borne infectious diseases in different parts of the world. Global warming will also raise sea levels, which will lead to an increase in saline and brackish water bodies in coastal areas. The potential impact of rising sea levels, as opposed to climate change, on the prevalence of vector-borne infectious diseases has hitherto been unrecognised. Presentation of the hypothesis Mosquito species possessing salinity-tolerant larvae and pupae, and capable of transmitting arboviruses and parasites are found in many parts of the world. An expansion of brackish and saline water bodies in coastal areas, associated with rising sea levels, can increase densities of salinity-tolerant vector mosquitoes and lead to the adaptation of freshwater vectors to breed in brackish and saline waters. The breeding of non-mosquito vectors may also be influenced by salinity changes in coastal habitats. Higher vector densities can increase transmission of vector-borne infectious diseases in coastal localities, which can then spread to other areas. Testing the hypothesis The demonstration of increases in vector populations and disease prevalence that is related to an expansion of brackish/saline water bodies in coastal areas will provide the necessary supportive evidence. However the implementation of specific vector and disease control measures to counter the threat will confound the expected findings. Implications of the hypothesis Rising sea levels can act synergistically with climate change and then interact in a complex manner with other environmental and socio-economic factors to generate a greater potential for the transmission of vector-borne infectious diseases. The resulting health impacts are likely to be particularly

  1. NON-TRADITIONAL SECURITY THREATS IN CENTRAL ASIA REGIONAL PERSPECTIVE OF COMPARATIVE PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    Ramakant Trivedi

    2011-01-01

    Full Text Available Abstract: The article explores the roots and current state of religious extremism in Central Asia, as well as investigates its connections with the global salafi movement. It evaluates attempts of the regional players and external stakeholders to address the existing threats, and provides recommendations for their advancement.

  2. A Wavelet Kernel-Based Primal Twin Support Vector Machine for Economic Development Prediction

    Directory of Open Access Journals (Sweden)

    Fang Su

    2013-01-01

    Full Text Available Economic development forecasting allows planners to choose the right strategies for the future. This study is to propose economic development prediction method based on the wavelet kernel-based primal twin support vector machine algorithm. As gross domestic product (GDP is an important indicator to measure economic development, economic development prediction means GDP prediction in this study. The wavelet kernel-based primal twin support vector machine algorithm can solve two smaller sized quadratic programming problems instead of solving a large one as in the traditional support vector machine algorithm. Economic development data of Anhui province from 1992 to 2009 are used to study the prediction performance of the wavelet kernel-based primal twin support vector machine algorithm. The comparison of mean error of economic development prediction between wavelet kernel-based primal twin support vector machine and traditional support vector machine models trained by the training samples with the 3–5 dimensional input vectors, respectively, is given in this paper. The testing results show that the economic development prediction accuracy of the wavelet kernel-based primal twin support vector machine model is better than that of traditional support vector machine.

  3. Vector-borne disease surveillance in livestock populations: a critical review of literature recommendations and implemented surveillance (BTV-8) in five European countries

    DEFF Research Database (Denmark)

    Dórea, Fernanda C.; Elbers, Armin R.W.; Hendrikx, Pascal

    2016-01-01

    Preparedness against vector-borne threats depends on the existence of a long-term, sustainable surveillance of vector-borne disease and their relevant vectors. This work reviewed the availability of such surveillance systems in five European countries (Denmark, France, The Netherlands, Sweden and...

  4. Automated cyber threat analysis and specified process using vector relational data modeling

    OpenAIRE

    Kelly, Ryan Forrest

    2014-01-01

    Approved for public release; distribution is unlimited Computer network defense systems should be sufficiently integrated to pull data from any information source, model an expert cyber analyst’s decision process, continuously adapt to an evolving cyber threat environment, and amalgamate with industry standard network hardware. Unfortunately, cyber defense systems are generally stovepipe solutions that do not natively integrate disparate network systems. Correlation engines are generally l...

  5. A Cyber Security Risk Assessment of Hospital Infrastructure including TLS/SSL and other Threats

    OpenAIRE

    Millar, Stuart

    2016-01-01

    Cyber threats traditionally target governments, financial institutions and businesses. However, of growing concern is the threat to healthcare organizations. This study conducts a cyber security risk assessment of a theoretical hospital environment, to include TLS/SSL, which is an encryption protocol for network communications, plus other physical, logical and human threats. Despite significant budgets in the UK for the NHS, the spend on cyber security appears worryingly low and many hospital...

  6. Vector-model-supported approach in prostate plan optimization

    International Nuclear Information System (INIS)

    Liu, Eva Sau Fan; Wu, Vincent Wing Cheung; Harris, Benjamin; Lehman, Margot; Pryor, David; Chan, Lawrence Wing Chi

    2017-01-01

    Lengthy time consumed in traditional manual plan optimization can limit the use of step-and-shoot intensity-modulated radiotherapy/volumetric-modulated radiotherapy (S&S IMRT/VMAT). A vector model base, retrieving similar radiotherapy cases, was developed with respect to the structural and physiologic features extracted from the Digital Imaging and Communications in Medicine (DICOM) files. Planning parameters were retrieved from the selected similar reference case and applied to the test case to bypass the gradual adjustment of planning parameters. Therefore, the planning time spent on the traditional trial-and-error manual optimization approach in the beginning of optimization could be reduced. Each S&S IMRT/VMAT prostate reference database comprised 100 previously treated cases. Prostate cases were replanned with both traditional optimization and vector-model-supported optimization based on the oncologists' clinical dose prescriptions. A total of 360 plans, which consisted of 30 cases of S&S IMRT, 30 cases of 1-arc VMAT, and 30 cases of 2-arc VMAT plans including first optimization and final optimization with/without vector-model-supported optimization, were compared using the 2-sided t-test and paired Wilcoxon signed rank test, with a significance level of 0.05 and a false discovery rate of less than 0.05. For S&S IMRT, 1-arc VMAT, and 2-arc VMAT prostate plans, there was a significant reduction in the planning time and iteration with vector-model-supported optimization by almost 50%. When the first optimization plans were compared, 2-arc VMAT prostate plans had better plan quality than 1-arc VMAT plans. The volume receiving 35 Gy in the femoral head for 2-arc VMAT plans was reduced with the vector-model-supported optimization compared with the traditional manual optimization approach. Otherwise, the quality of plans from both approaches was comparable. Vector-model-supported optimization was shown to offer much shortened planning time and iteration

  7. Vector-model-supported approach in prostate plan optimization

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Eva Sau Fan [Department of Radiation Oncology, Princess Alexandra Hospital, Brisbane (Australia); Department of Health Technology and Informatics, The Hong Kong Polytechnic University (Hong Kong); Wu, Vincent Wing Cheung [Department of Health Technology and Informatics, The Hong Kong Polytechnic University (Hong Kong); Harris, Benjamin [Department of Radiation Oncology, Princess Alexandra Hospital, Brisbane (Australia); Lehman, Margot; Pryor, David [Department of Radiation Oncology, Princess Alexandra Hospital, Brisbane (Australia); School of Medicine, University of Queensland (Australia); Chan, Lawrence Wing Chi, E-mail: wing.chi.chan@polyu.edu.hk [Department of Health Technology and Informatics, The Hong Kong Polytechnic University (Hong Kong)

    2017-07-01

    Lengthy time consumed in traditional manual plan optimization can limit the use of step-and-shoot intensity-modulated radiotherapy/volumetric-modulated radiotherapy (S&S IMRT/VMAT). A vector model base, retrieving similar radiotherapy cases, was developed with respect to the structural and physiologic features extracted from the Digital Imaging and Communications in Medicine (DICOM) files. Planning parameters were retrieved from the selected similar reference case and applied to the test case to bypass the gradual adjustment of planning parameters. Therefore, the planning time spent on the traditional trial-and-error manual optimization approach in the beginning of optimization could be reduced. Each S&S IMRT/VMAT prostate reference database comprised 100 previously treated cases. Prostate cases were replanned with both traditional optimization and vector-model-supported optimization based on the oncologists' clinical dose prescriptions. A total of 360 plans, which consisted of 30 cases of S&S IMRT, 30 cases of 1-arc VMAT, and 30 cases of 2-arc VMAT plans including first optimization and final optimization with/without vector-model-supported optimization, were compared using the 2-sided t-test and paired Wilcoxon signed rank test, with a significance level of 0.05 and a false discovery rate of less than 0.05. For S&S IMRT, 1-arc VMAT, and 2-arc VMAT prostate plans, there was a significant reduction in the planning time and iteration with vector-model-supported optimization by almost 50%. When the first optimization plans were compared, 2-arc VMAT prostate plans had better plan quality than 1-arc VMAT plans. The volume receiving 35 Gy in the femoral head for 2-arc VMAT plans was reduced with the vector-model-supported optimization compared with the traditional manual optimization approach. Otherwise, the quality of plans from both approaches was comparable. Vector-model-supported optimization was shown to offer much shortened planning time and iteration

  8. A Novel Method for Evaluating the Cardiotoxicity of Traditional Chinese Medicine Compatibility by Using Support Vector Machine Model Combined with Metabonomics

    Directory of Open Access Journals (Sweden)

    Yubo Li

    2016-01-01

    Full Text Available Traditional biochemical and histopathological tests have been used to evaluate the safety of traditional Chinese medicine (TCM compatibility for a long time. But these methods lack high sensitivity and specificity. In the previous study, we have found ten biomarkers related to cardiotoxicity and established a support vector machine (SVM prediction model. Results showed a good sensitivity and specificity. Therefore, in this study, we used SVM model combined with metabonomics UPLC/Q-TOF-MS technology to build a rapid and sensitivity and specificity method to predict the cardiotoxicity of TCM compatibility. This study firstly applied SVM model to the prediction of cardiotoxicity in TCM compatibility containing Aconiti Lateralis Radix Praeparata and further identified whether the cardiotoxicity increased after Aconiti Lateralis Radix Praeparata combined with other TCM. This study provides a new idea for studying the evaluation of the cardiotoxicity caused by compatibility of TCM.

  9. Plasmodium knowlesi in humans: a review on the role of its vectors in Malaysia.

    Science.gov (United States)

    Vythilingam, Indra

    2010-04-01

    Plasmodium knowlesi in humans is life threatening, is on the increase and has been reported from most states in Malaysia. Anopheles latens and Anopheles cracens have been incriminated as vectors. Malaria is now a zoonoses and is occurring in malaria free areas of Malaysia. It is also a threat to eco-tourism. The importance of the vectors and possible control measures is reviewed here.

  10. Identification of threats using linguistics-based knowledge extraction.

    Energy Technology Data Exchange (ETDEWEB)

    Chew, Peter A.

    2008-09-01

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe

  11. The Threat Among Us: Insiders Intensify Aviation Terrorism

    Energy Technology Data Exchange (ETDEWEB)

    Krull, Katie E. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-08-19

    Aviation terrorism is powerful and symbolic, and will likely remain a staple target for terrorists aiming to inflict chaos and cause mass casualties similar to the 9/11 attacks on the U.S. The majority of international and domestic aviation terrorist attacks involves outsiders, or people who do not have direct access to or affiliation with a target through employment. However, several significant attacks and plots against the industry involved malicious employees motivated by suicide or devotion to a terrorist organization. Malicious insiders’ access and knowledge of aviation security, systems, networks, and infrastructure is valuable to terrorists, providing a different pathway for attacking the industry through the insider threat. Indicators and warnings of insider threats in these cases exist, providing insight into how security agencies, such as the Transportation Security Administration, can better predict and identify insider involvement. Understanding previous aviation insider threat events will likely aid in stimulating proactive security measures, rather than reactive responses. However, similar to traditional airport security measures, there are social, political, and economic challenges in protecting against the insider threat, including privacy concerns and cost-benefit analysis.

  12. Diversity of medicinal plants and anthropogenic threats in the ...

    African Journals Online (AJOL)

    Diversity of medicinal plants and anthropogenic threats in the Samburu Central Sub-County of Kenya. ... Biodiversity of medicinal plants and effects of human activities on availability of traditional ... There is, therefore need to adopt management strategies that enhance the conservation of these valuable natural resources.

  13. Vector control programs in Saint Johns County, Florida and Guayas, Ecuador: successes and barriers to integrated vector management.

    Science.gov (United States)

    Naranjo, Diana P; Qualls, Whitney A; Jurado, Hugo; Perez, Juan C; Xue, Rui-De; Gomez, Eduardo; Beier, John C

    2014-07-02

    Vector-borne diseases (VBDs) and mosquito control programs (MCPs) diverge in settings and countries, and lead control specialists need to be aware of the most effective control strategies. Integrated Vector Management (IVM) strategies, once implemented in MCPs, aim to reduce cost and optimize protection of the populations against VBDs. This study presents a strengths, weaknesses, opportunities, and threats (SWOT) analysis to compare IVM strategies used by MCPs in Saint Johns County, Florida and Guayas, Ecuador. This research evaluates MCPs strategies to improve vector control activities. Methods included descriptive findings of the MCP operations. Information was obtained from vector control specialists, directors, and residents through field trips, surveys, and questionnaires. Evaluations of the strategies and assets of the control programs where obtained through SWOT analysis and within an IVM approach. Organizationally, the Floridian MCP is a tax-based District able to make decisions independently from county government officials, with the oversight of an elected board of commissioners. The Guayas program is directed by the country government and assessed by non-governmental organizations like the World health Organization. Operationally, the Floridian MCP conducts entomological surveillance and the Ecuadorian MCP focuses on epidemiological monitoring of human disease cases. Strengths of both MCPs were their community participation and educational programs. Weaknesses for both MCPs included limitations in budgets and technical capabilities. Opportunities, for both MCPs, are additional funding and partnerships with private, non-governmental, and governmental organizations. Threats experienced by both MCPs included political constraints and changes in the social and ecological environment that affect mosquito densities and control efforts. IVM pillars for policy making were used to compare the information among the programs. Differences included how the Ecuadorian

  14. Vector control programs in Saint Johns County, Florida and Guayas, Ecuador: successes and barriers to integrated vector management

    Science.gov (United States)

    2014-01-01

    Background Vector-borne diseases (VBDs) and mosquito control programs (MCPs) diverge in settings and countries, and lead control specialists need to be aware of the most effective control strategies. Integrated Vector Management (IVM) strategies, once implemented in MCPs, aim to reduce cost and optimize protection of the populations against VBDs. This study presents a strengths, weaknesses, opportunities, and threats (SWOT) analysis to compare IVM strategies used by MCPs in Saint Johns County, Florida and Guayas, Ecuador. This research evaluates MCPs strategies to improve vector control activities. Methods Methods included descriptive findings of the MCP operations. Information was obtained from vector control specialists, directors, and residents through field trips, surveys, and questionnaires. Evaluations of the strategies and assets of the control programs where obtained through SWOT analysis and within an IVM approach. Results Organizationally, the Floridian MCP is a tax-based District able to make decisions independently from county government officials, with the oversight of an elected board of commissioners. The Guayas program is directed by the country government and assessed by non-governmental organizations like the World health Organization. Operationally, the Floridian MCP conducts entomological surveillance and the Ecuadorian MCP focuses on epidemiological monitoring of human disease cases. Strengths of both MCPs were their community participation and educational programs. Weaknesses for both MCPs included limitations in budgets and technical capabilities. Opportunities, for both MCPs, are additional funding and partnerships with private, non-governmental, and governmental organizations. Threats experienced by both MCPs included political constraints and changes in the social and ecological environment that affect mosquito densities and control efforts. IVM pillars for policy making were used to compare the information among the programs. Differences

  15. Non-Replicating Adenovirus-Vectored Anthrax Vaccine

    International Nuclear Information System (INIS)

    Van Kampen, K. R.; Zhang, J.; Jex, E.; Tang, D. C.

    2007-01-01

    As bioterrorism is emerging as a national threat, it is urgent to develop a new generation of anthrax vaccines that can be rapidly produced and mass administered in an emergency setting. We have demonstrated that protective immunity against anthrax spores could be elicited in mice by intranasal administration of a non-replicating human adenovirus serotype 5 (Ad5)-derived vector encoding Bacillus anthracis protective antigen (PA) in a single-dose regimen. The potency of an Ad5 vector encoding PA was remarkably enhanced by codon optimization of the PA gene to match the tRNA pool found in human cells. This nasal vaccine can be mass-administered by non-medical personnel during a bioterrorist attack. In addition, replication-competent adenovirus (RCA)-free Ad5-vectored anthrax vaccines can be mass produced in PER.C6 cells in serum-free wave bioreactors and purified by column chromatography to meet a surge in demand. The non-replicating nature of this new generation of anthrax vaccine ensures an excellent safety profile for vaccines and the environment.(author)

  16. Assessment of terrorist threats to the Canadian energy sector

    Energy Technology Data Exchange (ETDEWEB)

    Shull, A. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs]|[Ottawa Univ., ON (Canada). Faculty of Law

    2006-03-15

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs.

  17. Assessment of terrorist threats to the Canadian energy sector

    International Nuclear Information System (INIS)

    Shull, A.

    2006-01-01

    A critical terrorist threat assessment of Canadian energy systems was presented, as well as an analysis of integrated continental systems. Recent responses to heightened threat levels on the part of the Canadian government have ranged from information sharing to emergency preparedness and disaster mitigation strategies. This paper examined threats that the energy sector has traditionally encountered and argued that response capabilities do not match current threats posed by terrorism. The potential of a terrorist attack on the Canadian energy infrastructure is significant and has been referred to as a possible target by terrorist organizations. Actions taken by the Canadian government in response to heightened threat levels were examined. A review of energy industry security measures included outlines of: the natural gas industry, the electric sector, and nuclear reactors and waste. It was noted that not all elements of the critical energy infrastructure share the same level of risk. Recommendations included increased information sharing between government agencies and the private sector; resiliency standards in densely populated areas; and insulating the energy grid against a cascading blackout through the use of DC rather than AC lines. 59 refs

  18. An Ecological Assessment of the Pandemic Threat of Zika Virus.

    Science.gov (United States)

    Carlson, Colin J; Dougherty, Eric R; Getz, Wayne

    2016-08-01

    The current outbreak of Zika virus poses a severe threat to human health. While the range of the virus has been cataloged growing slowly over the last 50 years, the recent explosive expansion in the Americas indicates that the full potential distribution of Zika remains uncertain. Moreover, many studies rely on its similarity to dengue fever, a phylogenetically closely related disease of unknown ecological comparability. Here we compile a comprehensive spatially-explicit occurrence dataset from Zika viral surveillance and serological surveys based in its native range, and construct ecological niche models to test basic hypotheses about its spread and potential establishment. The hypothesis that the outbreak of cases in Mexico and North America are anomalous and outside the native ecological niche of the disease, and may be linked to either genetic shifts between strains, or El Nino or similar climatic events, remains plausible at this time. Comparison of the Zika niche against the known distribution of dengue fever suggests that Zika is more constrained by the seasonality of precipitation and diurnal temperature fluctuations, likely confining autochthonous non-sexual transmission to the tropics without significant evolutionary change. Projecting the range of the diseases in conjunction with three major vector species (Aedes africanus, Ae. aegypti, and Ae. albopictus) that transmit the pathogens, under climate change, suggests that Zika has potential for northward expansion; but, based on current knowledge, our models indicate Zika is unlikely to fill the full range its vectors occupy, and public fear of a vector-borne Zika epidemic in the mainland United States is potentially informed by biased or limited scientific knowledge. With recent sexual transmission of the virus globally, we caution that our results only apply to the vector-borne transmission route of the pathogen, and while the threat of a mosquito-carried Zika pandemic may be overstated in the media

  19. Competence of Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus Mosquitoes as Zika Virus Vectors, China

    Science.gov (United States)

    Liu, Zhuanzhuan; Zhou, Tengfei; Lai, Zetian; Zhang, Zhenhong; Jia, Zhirong; Zhou, Guofa; Williams, Tricia; Xu, Jiabao; Gu, Jinbao; Zhou, Xiaohong; Lin, Lifeng; Yan, Guiyun

    2017-01-01

    In China, the prevention and control of Zika virus disease has been a public health threat since the first imported case was reported in February 2016. To determine the vector competence of potential vector mosquito species, we experimentally infected Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus mosquitoes and determined infection rates, dissemination rates, and transmission rates. We found the highest vector competence for the imported Zika virus in Ae. aegypti mosquitoes, some susceptibility of Ae. albopictus mosquitoes, but no transmission ability for Cx. quinquefasciatus mosquitoes. Considering that, in China, Ae. albopictus mosquitoes are widely distributed but Ae. aegypti mosquito distribution is limited, Ae. albopictus mosquitoes are a potential primary vector for Zika virus and should be targeted in vector control strategies. PMID:28430562

  20. Competence of Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus Mosquitoes as Zika Virus Vectors, China.

    Science.gov (United States)

    Liu, Zhuanzhuan; Zhou, Tengfei; Lai, Zetian; Zhang, Zhenhong; Jia, Zhirong; Zhou, Guofa; Williams, Tricia; Xu, Jiabao; Gu, Jinbao; Zhou, Xiaohong; Lin, Lifeng; Yan, Guiyun; Chen, Xiao-Guang

    2017-07-01

    In China, the prevention and control of Zika virus disease has been a public health threat since the first imported case was reported in February 2016. To determine the vector competence of potential vector mosquito species, we experimentally infected Aedes aegypti, Ae. albopictus, and Culex quinquefasciatus mosquitoes and determined infection rates, dissemination rates, and transmission rates. We found the highest vector competence for the imported Zika virus in Ae. aegypti mosquitoes, some susceptibility of Ae. albopictus mosquitoes, but no transmission ability for Cx. quinquefasciatus mosquitoes. Considering that, in China, Ae. albopictus mosquitoes are widely distributed but Ae. aegypti mosquito distribution is limited, Ae. albopictus mosquitoes are a potential primary vector for Zika virus and should be targeted in vector control strategies.

  1. Mosquitoes and Culicoides biting midges: vector range and the influence of climate change

    NARCIS (Netherlands)

    Elbers, A.R.W.; Koenraadt, C.J.M.; Meiswinkel, R.

    2015-01-01

    Vector-borne animal diseases pose a continuous and substantial threat to livestock economies around the globe. Increasing international travel, the globalisation of trade, and climate change are likely to play a progressively more important role in the introduction, establishment and spread of

  2. The unique character of traditional forest-related knowledge: threats and challenges ahead

    Science.gov (United States)

    Ronald L. Trosper; John A. Parrotta; Mauro Agnoletti; Vladimir Bocharnikov; Suzanne A. Feary; Monica Gabay; Christian Gamborg; Jesus García Latorre; Elisabeth Johann; Andrey Laletin; Hin Fui Lim; Alfred Oteng-Yeboah; Miguel A. Pinedo-Vasquez; P.S. Ramakrishnan; Yeo-Chang. Youn

    2012-01-01

    This chapter refl ects on the major fi ndings of the lead authors of this book regarding traditional forest-related knowledge (TFRK) using five criteria for distinguishing the unique character of traditional knowledge: (1) its attention to sustainability; (2) relationships to land; (3) identity; (4) reciprocity; and (5) limitations on market involvement. Following an...

  3. Truck bomb and insider threats to nuclear facilities

    International Nuclear Information System (INIS)

    Hirsch, D.

    1987-01-01

    In the nuclear field, two the these weak links in the security chain are the truck bomb threat and the insider threat. The risks associated with terrorist use of vehicular bombs against nuclear targets surfaced (actually, resurfaced) followed the terrorist attacks on the US Embassy annex and the Marine compound in Leb Concern was expressed that similar attacks against nuclear facilities could result in substantial damage and release of radioactivity. Since the current regulations of the NRC require licensees to protect only against attacks on foot (and even then, only against very small attacking forces), shortly after the Lebanon bombings, that agency commenced an urgent rulemaking to require its licensees to protect against truck bombs. Inexplicably, that rulemaking was called off after research results indicated that the truck bomb threat to nuclear facilities was even more serious than previously thought. Even were nuclear facilities adequately protected against external attack, be the aim theft or sabotage, the greatest security risk to these sites - the threat of action by insiders - would remain. The traditional methods of protecting against the insider threat - such as the two-person rule, strict compartmentalization of vital areas, and design features that make damage to two or more redundant systems by one individual difficult - are generally expensive and have encountered substantial resistance from the nuclear industry, which has restrained the NRC from requiring them

  4. Co-occurrence of viruses and mosquitoes at the vectors' optimal climate range: An underestimated risk to temperate regions?

    Science.gov (United States)

    Blagrove, Marcus S C; Caminade, Cyril; Waldmann, Elisabeth; Sutton, Elizabeth R; Wardeh, Maya; Baylis, Matthew

    2017-06-01

    Mosquito-borne viruses have been estimated to cause over 100 million cases of human disease annually. Many methodologies have been developed to help identify areas most at risk from transmission of these viruses. However, generally, these methodologies focus predominantly on the effects of climate on either the vectors or the pathogens they spread, and do not consider the dynamic interaction between the optimal conditions for both vector and virus. Here, we use a new approach that considers the complex interplay between the optimal temperature for virus transmission, and the optimal climate for the mosquito vectors. Using published geolocated data we identified temperature and rainfall ranges in which a number of mosquito vectors have been observed to co-occur with West Nile virus, dengue virus or chikungunya virus. We then investigated whether the optimal climate for co-occurrence of vector and virus varies between "warmer" and "cooler" adapted vectors for the same virus. We found that different mosquito vectors co-occur with the same virus at different temperatures, despite significant overlap in vector temperature ranges. Specifically, we found that co-occurrence correlates with the optimal climatic conditions for the respective vector; cooler-adapted mosquitoes tend to co-occur with the same virus in cooler conditions than their warmer-adapted counterparts. We conclude that mosquitoes appear to be most able to transmit virus in the mosquitoes' optimal climate range, and hypothesise that this may be due to proportionally over-extended vector longevity, and other increased fitness attributes, within this optimal range. These results suggest that the threat posed by vector-competent mosquito species indigenous to temperate regions may have been underestimated, whilst the threat arising from invasive tropical vectors moving to cooler temperate regions may be overestimated.

  5. Categorizing threat : building and using a generic threat matrix.

    Energy Technology Data Exchange (ETDEWEB)

    Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

    2007-09-01

    The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

  6. Integrating Transgenic Vector Manipulation with Clinical Interventions to Manage Vector-Borne Diseases.

    Directory of Open Access Journals (Sweden)

    Kenichi W Okamoto

    2016-03-01

    Full Text Available Many vector-borne diseases lack effective vaccines and medications, and the limitations of traditional vector control have inspired novel approaches based on using genetic engineering to manipulate vector populations and thereby reduce transmission. Yet both the short- and long-term epidemiological effects of these transgenic strategies are highly uncertain. If neither vaccines, medications, nor transgenic strategies can by themselves suffice for managing vector-borne diseases, integrating these approaches becomes key. Here we develop a framework to evaluate how clinical interventions (i.e., vaccination and medication can be integrated with transgenic vector manipulation strategies to prevent disease invasion and reduce disease incidence. We show that the ability of clinical interventions to accelerate disease suppression can depend on the nature of the transgenic manipulation deployed (e.g., whether vector population reduction or replacement is attempted. We find that making a specific, individual strategy highly effective may not be necessary for attaining public-health objectives, provided suitable combinations can be adopted. However, we show how combining only partially effective antimicrobial drugs or vaccination with transgenic vector manipulations that merely temporarily lower vector competence can amplify disease resurgence following transient suppression. Thus, transgenic vector manipulation that cannot be sustained can have adverse consequences-consequences which ineffective clinical interventions can at best only mitigate, and at worst temporarily exacerbate. This result, which arises from differences between the time scale on which the interventions affect disease dynamics and the time scale of host population dynamics, highlights the importance of accounting for the potential delay in the effects of deploying public health strategies on long-term disease incidence. We find that for systems at the disease-endemic equilibrium, even

  7. Perfectionism Moderates Stereotype Threat Effects on STEM Majors' Academic Performance

    Science.gov (United States)

    Rice, Kenneth G.; Lopez, Frederick G.; Richardson, Clarissa M. E.; Stinson, Jennifer M.

    2013-01-01

    Using a randomized, between-subjects experimental design, we tested hypotheses that self-critical perfectionism would moderate the effects of subtle stereotype threat (ST) for women and students in underrepresented racial/ethnic groups who are pursuing traditional degrees in science, technology, engineering, or math (STEM). A diverse sample of…

  8. Potential impact of climate change on emerging vector-borne and other infections in the UK.

    Science.gov (United States)

    Baylis, Matthew

    2017-12-05

    Climate is one of several causes of disease emergence. Although half or more of infectious diseases are affected by climate it appears to be a relatively infrequent cause of human disease emergence. Climate mostly affects diseases caused by pathogens that spend part of their lifecycle outside of the host, exposed to the environment. The most important routes of transmission of climate sensitive diseases are by arthropod (insect and tick) vectors, in water and in food. Given the sensitivity of many diseases to climate, it is very likely that at least some will respond to future climate change. In the case of vector-borne diseases this response will include spread to new areas. Several vector-borne diseases have emerged in Europe in recent years; these include vivax malaria, West Nile fever, dengue fever, Chikungunya fever, leishmaniasis, Lyme disease and tick-borne encephalitis. The vectors of these diseases are mosquitoes, sand flies and ticks. The UK has endemic mosquito species capable of transmitting malaria and probably other pathogens, and ticks that transmit Lyme disease. The UK is also threatened by invasive mosquito species known to be able to transmit West Nile, dengue, chikungunya and Zika, and sand flies that spread leishmaniasis. Warmer temperatures in the future will increase the suitability of the UK's climate for these invasive species, and increase the risk that they may spread disease. While much attention is on invasive species, it is important to recognize the threat presented by native species too. Proposed actions to reduce the future impact of emerging vector-borne diseases in the UK include insect control activity at points of entry of vehicles and certain goods, wider surveillance for mosquitoes and sand flies, research into the threat posed by native species, increased awareness of the medical profession of the threat posed by specific diseases, regular risk assessments, and increased preparedness for the occurrence of a disease emergency.

  9. Cyber threat metrics.

    Energy Technology Data Exchange (ETDEWEB)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  10. Towards an integrated approach in surveillance of vector-borne diseases in Europe

    Science.gov (United States)

    2011-01-01

    Vector borne disease (VBD) emergence is a complex and dynamic process. Interactions between multiple disciplines and responsible health and environmental authorities are often needed for an effective early warning, surveillance and control of vectors and the diseases they transmit. To fully appreciate this complexity, integrated knowledge about the human and the vector population is desirable. In the current paper, important parameters and terms of both public health and medical entomology are defined in order to establish a common language that facilitates collaboration between the two disciplines. Special focus is put on the different VBD contexts with respect to the current presence or absence of the disease, the pathogen and the vector in a given location. Depending on the context, whether a VBD is endemic or not, surveillance activities are required to assess disease burden or threat, respectively. Following a decision for action, surveillance activities continue to assess trends. PMID:21967706

  11. TANDI: threat assessment of network data and information

    Science.gov (United States)

    Holsopple, Jared; Yang, Shanchieh Jay; Sudit, Moises

    2006-04-01

    Current practice for combating cyber attacks typically use Intrusion Detection Sensors (IDSs) to passively detect and block multi-stage attacks. This work leverages Level-2 fusion that correlates IDS alerts belonging to the same attacker, and proposes a threat assessment algorithm to predict potential future attacker actions. The algorithm, TANDI, reduces the problem complexity by separating the models of the attacker's capability and opportunity, and fuse the two to determine the attacker's intent. Unlike traditional Bayesian-based approaches, which require assigning a large number of edge probabilities, the proposed Level-3 fusion procedure uses only 4 parameters. TANDI has been implemented and tested with randomly created attack sequences. The results demonstrate that TANDI predicts future attack actions accurately as long as the attack is not part of a coordinated attack and contains no insider threats. In the presence of abnormal attack events, TANDI will alarm the network analyst for further analysis. The attempt to evaluate a threat assessment algorithm via simulation is the first in the literature, and shall open up a new avenue in the area of high level fusion.

  12. [Lymphoscintigrams with anatomical landmarks obtained with vector graphics].

    Science.gov (United States)

    Rubini, Giuseppe; Antonica, Filippo; Renna, Maria Antonia; Ferrari, Cristina; Iuele, Francesca; Stabile Ianora, Antonio Amato; Losco, Matteo; Niccoli Asabella, Artor

    2012-11-01

    Nuclear medicine images are difficult to interpret because they do not include anatomical details. The aim of this study was to obtain lymphoscintigrams with anatomical landmarks that could be easily interpreted by General Physicians. Traditional lymphoscintigrams were processed with Adobe© Photoshop® CS6 and converted into vector images created by Illustrator®. The combination with a silhouette vector improved image interpretation, without resulting in longer radiation exposure or acquisition times.

  13. Technologies to counter aviation security threats

    Science.gov (United States)

    Karoly, Steve

    2017-11-01

    The Aviation and Transportation Security Act (ATSA) makes TSA responsible for security in all modes of transportation, and requires that TSA assess threats to transportation, enforce security-related regulations and requirements, and ensure the adequacy of security measures at airports and other transportation facilities. Today, TSA faces a significant challenge and must address a wide range of commercial, military grade, and homemade explosives and these can be presented in an infinite number of configurations and from multiple vectors. TSA screens 2 million passengers and crew, and screens almost 5 million carry-on items and 1.2 million checked bags daily. As TSA explores new technologies for improving efficiency and security, those on the forefront of research and development can help identify unique and advanced methods to combat terrorism. Research and Development (R&D) drives the development of future technology investments that can address an evolving adversary and aviation threat. The goal is to rethink the aviation security regime in its entirety, and rather than focusing security at particular points in the enterprise, distribute security from the time a reservation is made to the time a passenger boards the aircraft. The ultimate objective is to reengineer aviation security from top to bottom with a continued focus on increasing security throughout the system.

  14. Large-scale production of lentiviral vector in a closed system hollow fiber bioreactor

    Directory of Open Access Journals (Sweden)

    Jonathan Sheu

    Full Text Available Lentiviral vectors are widely used in the field of gene therapy as an effective method for permanent gene delivery. While current methods of producing small scale vector batches for research purposes depend largely on culture flasks, the emergence and popularity of lentiviral vectors in translational, preclinical and clinical research has demanded their production on a much larger scale, a task that can be difficult to manage with the numbers of producer cell culture flasks required for large volumes of vector. To generate a large scale, partially closed system method for the manufacturing of clinical grade lentiviral vector suitable for the generation of induced pluripotent stem cells (iPSCs, we developed a method employing a hollow fiber bioreactor traditionally used for cell expansion. We have demonstrated the growth, transfection, and vector-producing capability of 293T producer cells in this system. Vector particle RNA titers after subsequent vector concentration yielded values comparable to lentiviral iPSC induction vector batches produced using traditional culture methods in 225 cm2 flasks (T225s and in 10-layer cell factories (CF10s, while yielding a volume nearly 145 times larger than the yield from a T225 flask and nearly three times larger than the yield from a CF10. Employing a closed system hollow fiber bioreactor for vector production offers the possibility of manufacturing large quantities of gene therapy vector while minimizing reagent usage, equipment footprint, and open system manipulation.

  15. Application of Vector Triggering Random Decrement

    DEFF Research Database (Denmark)

    Asmussen, J. C.; Ibrahim, S. R.; Brincker, Rune

    result is a Random Decrement function from each measurement. In traditional Random Decrement estimation the triggering condition is a scalar condition, which should only be fulfilled in a single measurement. In vector triggering Random Decrement the triggering condition is a vector condition......This paper deals with applications of the vector triggering Random Decrement technique. This technique is new and developed with the aim of minimizing estimation time and identification errors. The theory behind the technique is discussed in an accompanying paper. The results presented...... in this paper should be regarded as a further documentation of the technique. The key point in Random Decrement estimation is the formulation of a triggering condition. If the triggering condition is fulfilled a time segment from each measurement is picked out and averaged with previous time segments. The final...

  16. Application of Vector Triggering Random Decrement

    DEFF Research Database (Denmark)

    Asmussen, J. C.; Ibrahim, S. R.; Brincker, Rune

    1997-01-01

    result is a Random Decrement function from each measurement. In traditional Random Decrement estimation the triggering condition is a scalar condition, which should only be fulfilled in a single measurement. In vector triggering Random Decrement the triggering condition is a vector condition......This paper deals with applications of the vector triggering Random Decrement technique. This technique is new and developed with the aim of minimizing estimation time and identification errors. The theory behind the technique is discussed in an accompanying paper. The results presented...... in this paper should be regarded as a further documentation of the technique. The key point in Random Decrement estimation is the formulation of a triggering condition. If the triggering condition is fulfilled a time segment from each measurement is picked out and averaged with previous time segments. The final...

  17. An introduction to vectors, vector operators and vector analysis

    CERN Document Server

    Joag, Pramod S

    2016-01-01

    Ideal for undergraduate and graduate students of science and engineering, this book covers fundamental concepts of vectors and their applications in a single volume. The first unit deals with basic formulation, both conceptual and theoretical. It discusses applications of algebraic operations, Levi-Civita notation, and curvilinear coordinate systems like spherical polar and parabolic systems and structures, and analytical geometry of curves and surfaces. The second unit delves into the algebra of operators and their types and also explains the equivalence between the algebra of vector operators and the algebra of matrices. Formulation of eigen vectors and eigen values of a linear vector operator are elaborated using vector algebra. The third unit deals with vector analysis, discussing vector valued functions of a scalar variable and functions of vector argument (both scalar valued and vector valued), thus covering both the scalar vector fields and vector integration.

  18. Vital Interests, Virtual Threats: Reconciling International Law with Information Warfare and United States Security

    National Research Council Canada - National Science Library

    Shawhan, Karl

    2001-01-01

    .... Nontraditional threats, however, pose asymmetric dilemmas for the United States. The increased U.S. military and economic reliance on information systems introduces new vulnerabilities not adequately protected by traditional kinetic force arms...

  19. Endogenous Pain Modulation Induced by Extrinsic and Intrinsic Psychological Threat in Healthy Individuals.

    Science.gov (United States)

    Gibson, William; Moss, Penny; Cheng, Tak Ho; Garnier, Alexandre; Wright, Anthony; Wand, Benedict M

    2018-03-01

    Many factors interact to influence threat perception and the subsequent experience of pain. This study investigated the effect of observing pain (extrinsic threat) and intrinsic threat of pain to oneself on pressure pain threshold (PPT). Forty socially connected pairs of healthy volunteers were threat-primed and randomly allocated to experimental or control roles. An experimental pain modulation paradigm was applied, with non-nociceptive threat cues used as conditioning stimuli. In substudy 1, the extrinsic threat to the experimental participant was observation of the control partner in pain. The control participant underwent hand immersion in noxious and non-noxious water baths in randomized order. Change in the observing participant's PPT from baseline to mid- and postimmersion was calculated. A significant interaction was found for PPT between conditions and test time (F 2,78  = 24.9, P Extrinsic and intrinsic threat of pain, in the absence of any afferent input therefore influences pain modulation. This may need to be considered in studies that use noxious afferent input with populations who show dysfunctional pain modulation. The effect on endogenous analgesia of observing another's pain and of threat of pain to oneself was investigated. Extrinsic as well as intrinsic threat cues, in the absence of any afferent input, increased pain thresholds, suggesting that mere threat of pain may initiate analgesic effects in traditional noxious experimental paradigms. Copyright © 2017 The American Pain Society. Published by Elsevier Inc. All rights reserved.

  20. A Sequential Multiplicative Extended Kalman Filter for Attitude Estimation Using Vector Observations

    Science.gov (United States)

    Qin, Fangjun; Jiang, Sai; Zha, Feng

    2018-01-01

    In this paper, a sequential multiplicative extended Kalman filter (SMEKF) is proposed for attitude estimation using vector observations. In the proposed SMEKF, each of the vector observations is processed sequentially to update the attitude, which can make the measurement model linearization more accurate for the next vector observation. This is the main difference to Murrell’s variation of the MEKF, which does not update the attitude estimate during the sequential procedure. Meanwhile, the covariance is updated after all the vector observations have been processed, which is used to account for the special characteristics of the reset operation necessary for the attitude update. This is the main difference to the traditional sequential EKF, which updates the state covariance at each step of the sequential procedure. The numerical simulation study demonstrates that the proposed SMEKF has more consistent and accurate performance in a wide range of initial estimate errors compared to the MEKF and its traditional sequential forms. PMID:29751538

  1. A Sequential Multiplicative Extended Kalman Filter for Attitude Estimation Using Vector Observations

    Directory of Open Access Journals (Sweden)

    Fangjun Qin

    2018-05-01

    Full Text Available In this paper, a sequential multiplicative extended Kalman filter (SMEKF is proposed for attitude estimation using vector observations. In the proposed SMEKF, each of the vector observations is processed sequentially to update the attitude, which can make the measurement model linearization more accurate for the next vector observation. This is the main difference to Murrell’s variation of the MEKF, which does not update the attitude estimate during the sequential procedure. Meanwhile, the covariance is updated after all the vector observations have been processed, which is used to account for the special characteristics of the reset operation necessary for the attitude update. This is the main difference to the traditional sequential EKF, which updates the state covariance at each step of the sequential procedure. The numerical simulation study demonstrates that the proposed SMEKF has more consistent and accurate performance in a wide range of initial estimate errors compared to the MEKF and its traditional sequential forms.

  2. Stereotype Threat.

    Science.gov (United States)

    Spencer, Steven J; Logel, Christine; Davies, Paul G

    2016-01-01

    When members of a stigmatized group find themselves in a situation where negative stereotypes provide a possible framework for interpreting their behavior, the risk of being judged in light of those stereotypes can elicit a disruptive state that undermines performance and aspirations in that domain. This situational predicament, termed stereotype threat, continues to be an intensely debated and researched topic in educational, social, and organizational psychology. In this review, we explore the various sources of stereotype threat, the mechanisms underlying stereotype-threat effects (both mediators and moderators), and the consequences of this situational predicament, as well as the means through which society and stigmatized individuals can overcome the insidious effects of stereotype threat. Ultimately, we hope this review alleviates some of the confusion surrounding stereotype threat while also sparking further research and debate.

  3. Bearing estimation with acoustic vector-sensor arrays

    International Nuclear Information System (INIS)

    Hawkes, M.; Nehorai, A.

    1996-01-01

    We consider direction-of-arrival (DOA) estimation using arrays of acoustic vector sensors in free space, and derive expressions for the Cramacute er-Rao bound on the DOA parameters when there is a single source. The vector-sensor array is seen to have improved performance over the traditional scalar-sensor (pressure-sensor) array for two distinct reasons: its elements have an inherent directional sensitivity and the array makes a greater number of measurements. The improvement is greatest for small array apertures and low signal-to-noise ratios. Examination of the conventional beamforming and Capon DOA estimators shows that vector-sensor arrays can completely resolve the bearing, even with a linear array, and can remove the ambiguities associated with spatial undersampling. We also propose and analyze a diversely-oriented array of velocity sensors that possesses some of the advantages of the vector-sensor array without the increase in hardware and computation. In addition, in certain scenarios it can avoid problems with spatially correlated noise that the vector-sensor array may suffer. copyright 1996 American Institute of Physics

  4. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Science.gov (United States)

    Page, Samantha K; Parker, Daniel M; Peinke, Dean M; Davies-Mostert, Harriet T

    2015-01-01

    This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus) as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices), education level (poorer education was synonymous with more positive threat indices), land use (wildlife ranching being the most negative) and land tenure (community respondents had more positive indices than private landowners). Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  5. Assessing the potential threat landscape of a proposed reintroduction site for carnivores.

    Directory of Open Access Journals (Sweden)

    Samantha K Page

    Full Text Available This study provides a framework to assess the feasibility of reintroducing carnivores into an area, using African wild dogs (Lycaon pictus as an example. The Great Fish River Nature Reserve in the Eastern Cape Province, South Africa, has been identified as a potential reserve to reintroduce wild dogs, and we applied this framework to provide a threat assessment of the surrounding area to determine potential levels of human-wildlife conflict. Although 56% of neighbouring landowners and local communities were positive about a wild dog reintroduction, data collected from questionnaire surveys revealed that human-wild dog conflict is a potential threat to wild dog survival in the area. Additional potential threats include diseases, snaring, poaching and hunting wild dogs for the use of traditional medicine. A threat index was developed to establish which properties harboured the greatest threats to wild dogs. This index was significantly influenced by the respondent's first language (isiXhosa had more positive indices, education level (poorer education was synonymous with more positive threat indices, land use (wildlife ranching being the most negative and land tenure (community respondents had more positive indices than private landowners. Although threats are present, they can be effectively mitigated through strategies such as carnivore education programs, vaccination campaigns and anti-snare patrols to promote a successful reintroduction of this endangered canid.

  6. Advertising in virtual space. An increasing threat for traditional advertising.

    Directory of Open Access Journals (Sweden)

    Razvan DINA

    Full Text Available Traditional advertising media used as a main TV, radio and print media. When the Internet has become one of the most important channels of communication between people, advertising has proposed to use this new medium to promote products and services on the market. Currently, more than 50% of the western countries population and share increasingly larger of population from other countries have Internet access, which creates a huge potential for online advertising.

  7. Generation of arbitrary vector beams with liquid crystal polarization converters and vector-photoaligned q-plates

    International Nuclear Information System (INIS)

    Chen, Peng; Ji, Wei; Wei, Bing-Yan; Hu, Wei; Lu, Yan-Qing; Chigrinov, Vladimir

    2015-01-01

    Arbitrary vector beams (VBs) are realized by the designed polarization converters and corresponding vector-photoaligned q-plates. The polarization converter is a specific twisted nematic cell with one substrate homogeneously aligned and the other space-variantly aligned. By combining a polarization-sensitive alignment agent with a dynamic micro-lithography system, various categories of liquid crystal polarization converters are demonstrated. Besides, traditional radially/azimuthally polarized light, high-order and multi-ringed VBs, and a VB array with different orders are generated. The obtained converters are further utilized as polarization masks to implement vector-photoaligning. The technique facilitates both the volume duplication of these converters and the generation of another promising optical element, the q-plate, which is suitable for the generation of VBs for coherent lasers. The combination of proposed polarization converters and correspondingly fabricated q-plates would drastically enhance the capability of polarization control and may bring more possibilities for the design of photonic devices

  8. Energy and non-traditional security (NTS) in Asia

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  9. Stereotype threat and executive functions: which functions mediate different threat-related outcomes?

    Science.gov (United States)

    Rydell, Robert J; Van Loo, Katie J; Boucher, Kathryn L

    2014-03-01

    Stereotype threat research shows that women's math performance can be reduced by activating gender-based math stereotypes. Models of stereotype threat assert that threat reduces cognitive functioning, thereby accounting for its negative effects. This work provides a more detailed understanding of the cognitive processes through which stereotype threat leads women to underperform at math and to take risks, by examining which basic executive functions (inhibition, shifting, and updating) account for these outcomes. In Experiments 1 and 2, women under threat showed reduced inhibition, reduced updating, and reduced math performance compared with women in a control condition (or men); however, only updating accounted for women's poor math performance under threat. In Experiment 3, only updating accounted for stereotype threat's effect on women's math performance, whereas only inhibition accounted for the effect of threat on risk-taking, suggesting that distinct executive functions can account for different stereotype threat-related outcomes.

  10. Alternatives to the stochastic "noise vector" approach

    DEFF Research Database (Denmark)

    Forcrand, Philippe de; Jaeger, Benjamin

    2018-01-01

    Several important observables, like the quark condensate and the Taylor coefficients of the expansion of the QCD pressure with respect to the chemical potential, are based on the trace of the inverse Dirac operator and of its powers. Such traces are traditionally estimated with "noise vectors...

  11. Web-based IP telephony penetration system evaluating level of protection from attacks and threats

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2011-01-01

    This article deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. SIP is being widely used in building VoIP networks. Unlike the traditional telephone networks VoIP networks does not have a closed communication which makes communication medium vulnerable to all kinds of attacks from the in truders. The SIP server is a key component of VoIP infrastr...

  12. GenSVM: a generalized multiclass support vector machine

    NARCIS (Netherlands)

    G.J.J. van den Burg (Gertjan); P.J.F. Groenen (Patrick)

    2016-01-01

    textabstractTraditional extensions of the binary support vector machine (SVM) to multiclass problems are either heuristics or require solving a large dual optimization problem. Here, a generalized multiclass SVM is proposed called GenSVM. In this method classification boundaries for a K-class

  13. Identity threat at work: how social identity threat and situational cues contribute to racial and ethnic disparities in the workplace.

    Science.gov (United States)

    Emerson, Katherine T U; Murphy, Mary C

    2014-10-01

    Significant disparities remain between racial and ethnic minorities' and Whites' experiences of American workplaces. Traditional prejudice and discrimination approaches explain these gaps in hiring, promotion, satisfaction, and well-being by pointing to the prejudice of people within organizations such as peers, managers, and executives. Grounded in social identity threat theory, this theoretical review instead argues that particular situational cues-often communicated by well-meaning, largely unprejudiced employees and managers-signal to stigmatized groups whether their identity is threatened and devalued or respected and affirmed. First, we provide an overview of how identity threat shapes the psychological processes of racial and ethnic minorities by heightening vigilance to certain situational cues in the workplace. Next, we outline several of these cues and their role in creating and sustaining perceptions of identity threat (or safety). Finally, we provide empirically grounded suggestions that organizations may use to increase identity safety among their employees of color. Taken together, the research demonstrates how situational cues contribute to disparate psychological experiences for racial and ethnic minorities at work, and suggests that by altering threatening cues, organizations may create more equitable, respectful, and inclusive environments where all people may thrive. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  14. Improving Visual Threat Detection: Research to Validate the Threat Detection Skills Trainer

    Science.gov (United States)

    2013-08-01

    26 Threat Detection and Mitigation Strategies...quicker when identifying threats in relevant locations. This task utilized the Flicker paradigm (Rensink, O’Regan, & Clark, 1997; Scholl, 2000...the meaning and implication of threats, why cues were relevant, strategies used to detect and mitigate threats, and challenges when attempting to

  15. Improving the lattice axial vector current

    International Nuclear Information System (INIS)

    Horsley, R.; Perlt, H.; Schiller, A.; Zanotti, J.M.

    2015-11-01

    For Wilson and clover fermions traditional formulations of the axial vector current do not respect the continuum Ward identity which relates the divergence of that current to the pseudoscalar density. Here we propose to use a point-split or one-link axial vector current whose divergence exactly satisfies a lattice Ward identity, involving the pseudoscalar density and a number of irrelevant operators. We check in one-loop lattice perturbation theory with SLiNC fermion and gauge plaquette action that this is indeed the case including order O(a) effects. Including these operators the axial Ward identity remains renormalisation invariant. First preliminary results of a nonperturbative check of the Ward identity are also presented.

  16. A Novel Rotor and Stator Magnetic Fields Direct-Orthogonalized Vector Control Scheme for the PMSM Servo System

    Directory of Open Access Journals (Sweden)

    Shi-Xiong Zhang

    2014-02-01

    Full Text Available Permanent Magnet Synchronous motor (PMSM has received widespread acceptance in recent years. In this paper, a new rotor and stator Magnetic Fields Direct-Orthogonalized Vector Control (MFDOVC scheme is proposed for PMSM servo system. This method simplified the complex calculation of traditional vector control, a part of the system resource is economized. At the same time, through the simulation illustration validation, the performance of PMSM servo system with the proposed MFDOVC scheme can achieve the same with the complex traditional vector control method, but much simpler calculation is implemented using the proposed method.

  17. Emerging Vector-Borne Diseases.

    Science.gov (United States)

    Huntington, Mark K; Allison, Jay; Nair, Dilip

    2016-10-01

    Several mosquito-borne viral infections have recently emerged in North America; West Nile virus is the most common in the United States. Although West Nile virus generally causes a self-limited, flulike febrile illness, a serious neuroinvasive form may occur. Dengue is the most common vector-borne viral disease worldwide, and it has been a significant public health threat in the United States since 2009. Known as breakbone fever for its severe myalgias and arthralgias, dengue may cause a hemorrhagic syndrome. Chikungunya also causes flulike febrile illness and disabling arthralgias. Although meningoencephalitis may occur with chikungunya, bleeding is uncommon. Symptoms of Zika virus infection are similar to those of dengue, but milder. Zika virus increases the risk of fetal brain abnormalities, including microcephaly, if a pregnant woman is infected. Zika virus is spread through Aedes albopictus mosquito bites, is transmitted sexually, and may rarely spread nonsexually from person to person. Diagnosis of these vectorborne infections is clinical and serologic, and treatment is supportive. Other, well-established vector-borne diseases are also important. Ehrlichiosis is a tick-borne bacterial disease that presents as a nonspecific syndrome of fever, headache, malaise, and myalgias. It is diagnosed via blood smear testing, with confirmatory serology. Ehrlichiosis is treated with doxycycline. Rickettsial infections are transmitted by fleas, mites, and ticks, and severity ranges from mild to life threatening. Rocky Mountain spotted fever, the most significant rickettsial infection, is primarily a clinical diagnosis that presents as fever, headache, myalgias, petechial rash, and tick exposure. Doxycycline is effective for rickettsial infections if administered promptly. Vector avoidance strategies are critical to the prevention of all of these infections.

  18. Mental set and creative thought in social conflict : Threat rigidity versus motivated focus

    NARCIS (Netherlands)

    De Dreu, Carsten K. W.; Nijstad, Bernard A.

    According to the traditional threat-rigidity reasoning, people in social conflict will be less flexible, less creative, more narrow-minded, and more rigid in their thinking when they adopt a conflict rather than a cooperation mental set. The authors propose and test an alternative, motivated focus

  19. Improvement of vector compensation method for vehicle magnetic distortion field

    Energy Technology Data Exchange (ETDEWEB)

    Pang, Hongfeng, E-mail: panghongfeng@126.com; Zhang, Qi; Li, Ji; Luo, Shitu; Chen, Dixiang; Pan, Mengchun; Luo, Feilu

    2014-03-15

    Magnetic distortions such as eddy-current field and low frequency magnetic field have not been considered in vector compensation methods. A new compensation method is proposed to suppress these magnetic distortions and improve compensation performance, in which the magnetic distortions related to measurement vectors and time are considered. The experimental system mainly consists of a three-axis fluxgate magnetometer (DM-050), an underwater vehicle and a proton magnetometer, in which the scalar value of magnetic field is obtained with the proton magnetometer and considered to be the true value. Comparing with traditional compensation methods, experimental results show that the magnetic distortions can be further reduced by two times. After compensation, error intensity and RMS error are reduced from 11684.013 nT and 7794.604 nT to 16.219 nT and 5.907 nT respectively. It suggests an effective way to improve the compensation performance of magnetic distortions. - Highlights: • A new vector compensation method is proposed for vehicle magnetic distortion. • The proposed model not only includes magnetometer error but also considers magnetic distortion. • Compensation parameters are computed directly by solving nonlinear equations. • Compared with traditional methods, the proposed method is not related with rotation angle rate. • Error intensity and RMS error can be reduced to 1/2 of the error with traditional methods.

  20. Improvement of vector compensation method for vehicle magnetic distortion field

    International Nuclear Information System (INIS)

    Pang, Hongfeng; Zhang, Qi; Li, Ji; Luo, Shitu; Chen, Dixiang; Pan, Mengchun; Luo, Feilu

    2014-01-01

    Magnetic distortions such as eddy-current field and low frequency magnetic field have not been considered in vector compensation methods. A new compensation method is proposed to suppress these magnetic distortions and improve compensation performance, in which the magnetic distortions related to measurement vectors and time are considered. The experimental system mainly consists of a three-axis fluxgate magnetometer (DM-050), an underwater vehicle and a proton magnetometer, in which the scalar value of magnetic field is obtained with the proton magnetometer and considered to be the true value. Comparing with traditional compensation methods, experimental results show that the magnetic distortions can be further reduced by two times. After compensation, error intensity and RMS error are reduced from 11684.013 nT and 7794.604 nT to 16.219 nT and 5.907 nT respectively. It suggests an effective way to improve the compensation performance of magnetic distortions. - Highlights: • A new vector compensation method is proposed for vehicle magnetic distortion. • The proposed model not only includes magnetometer error but also considers magnetic distortion. • Compensation parameters are computed directly by solving nonlinear equations. • Compared with traditional methods, the proposed method is not related with rotation angle rate. • Error intensity and RMS error can be reduced to 1/2 of the error with traditional methods

  1. [Orthogonal Vector Projection Algorithm for Spectral Unmixing].

    Science.gov (United States)

    Song, Mei-ping; Xu, Xing-wei; Chang, Chein-I; An, Ju-bai; Yao, Li

    2015-12-01

    Spectrum unmixing is an important part of hyperspectral technologies, which is essential for material quantity analysis in hyperspectral imagery. Most linear unmixing algorithms require computations of matrix multiplication and matrix inversion or matrix determination. These are difficult for programming, especially hard for realization on hardware. At the same time, the computation costs of the algorithms increase significantly as the number of endmembers grows. Here, based on the traditional algorithm Orthogonal Subspace Projection, a new method called. Orthogonal Vector Projection is prompted using orthogonal principle. It simplifies this process by avoiding matrix multiplication and inversion. It firstly computes the final orthogonal vector via Gram-Schmidt process for each endmember spectrum. And then, these orthogonal vectors are used as projection vector for the pixel signature. The unconstrained abundance can be obtained directly by projecting the signature to the projection vectors, and computing the ratio of projected vector length and orthogonal vector length. Compared to the Orthogonal Subspace Projection and Least Squares Error algorithms, this method does not need matrix inversion, which is much computation costing and hard to implement on hardware. It just completes the orthogonalization process by repeated vector operations, easy for application on both parallel computation and hardware. The reasonability of the algorithm is proved by its relationship with Orthogonal Sub-space Projection and Least Squares Error algorithms. And its computational complexity is also compared with the other two algorithms', which is the lowest one. At last, the experimental results on synthetic image and real image are also provided, giving another evidence for effectiveness of the method.

  2. Traditional products – vectors of sustainable development on the regional and national markets

    Directory of Open Access Journals (Sweden)

    Georgică Gheorghe

    2013-11-01

    Full Text Available Traditional products represent an important component of the Romanian culture, of the Romanian identity, of the national heritage. In order to succeed imposing over fakes on the market, this product’s regime must be very well defined and regulated by the acting legislation. While also sanctioning those who produce the so called traditional products, for which they ask a price that is usually greater, offering – not in few cases, products which can affect the consumers’ health through their contents of additives or other substances that have no connection to the traditional preparation methods. The purpose of this paper was to review the main traditional Romanian products, by geographic area and finding the clients’ interest towards buying such products. The analysis is realised from the point of view of a sustainable development of this sector and by areas of provenience. In order to observe what types of traditional products are demanded on the market a research from secondary sources has been made, by analysing the information provided by the Ministry of Agriculture and Rural Development, in the period of 1 – 20 September, and also a direct marketing research realised in the virtual environment, which followed the investigation of the main dimension/characteristics of the consumers behaviour towards the traditional products that exist on the Romanian market.

  3. Multivariate calibration with least-squares support vector machines.

    NARCIS (Netherlands)

    Thissen, U.M.J.; Ustun, B.; Melssen, W.J.; Buydens, L.M.C.

    2004-01-01

    This paper proposes the use of least-squares support vector machines (LS-SVMs) as a relatively new nonlinear multivariate calibration method, capable of dealing with ill-posed problems. LS-SVMs are an extension of "traditional" SVMs that have been introduced recently in the field of chemistry and

  4. TimesVector: a vectorized clustering approach to the analysis of time series transcriptome data from multiple phenotypes.

    Science.gov (United States)

    Jung, Inuk; Jo, Kyuri; Kang, Hyejin; Ahn, Hongryul; Yu, Youngjae; Kim, Sun

    2017-12-01

    Identifying biologically meaningful gene expression patterns from time series gene expression data is important to understand the underlying biological mechanisms. To identify significantly perturbed gene sets between different phenotypes, analysis of time series transcriptome data requires consideration of time and sample dimensions. Thus, the analysis of such time series data seeks to search gene sets that exhibit similar or different expression patterns between two or more sample conditions, constituting the three-dimensional data, i.e. gene-time-condition. Computational complexity for analyzing such data is very high, compared to the already difficult NP-hard two dimensional biclustering algorithms. Because of this challenge, traditional time series clustering algorithms are designed to capture co-expressed genes with similar expression pattern in two sample conditions. We present a triclustering algorithm, TimesVector, specifically designed for clustering three-dimensional time series data to capture distinctively similar or different gene expression patterns between two or more sample conditions. TimesVector identifies clusters with distinctive expression patterns in three steps: (i) dimension reduction and clustering of time-condition concatenated vectors, (ii) post-processing clusters for detecting similar and distinct expression patterns and (iii) rescuing genes from unclassified clusters. Using four sets of time series gene expression data, generated by both microarray and high throughput sequencing platforms, we demonstrated that TimesVector successfully detected biologically meaningful clusters of high quality. TimesVector improved the clustering quality compared to existing triclustering tools and only TimesVector detected clusters with differential expression patterns across conditions successfully. The TimesVector software is available at http://biohealth.snu.ac.kr/software/TimesVector/. sunkim.bioinfo@snu.ac.kr. Supplementary data are available at

  5. Identifying and Mitigating Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.

    2011-01-01

    Organisations face many threats that coarsely can be separated in inside threats and outside threats. Threats from insiders are especially hard to counter since insiders have special knowledge and privileges. Therefore, malicious insider actions are hard to distinguish from benign actions. After ...... discussing new definitions of insiders and insider threats, this article gives an overview of how to mitigate insider threats and discusses conflicting goals when dealing with insider threats....

  6. Examining perceived stereotype threat among overweight/obese adults using a multi-threat framework.

    Science.gov (United States)

    Carels, Robert A; Domoff, Sarah E; Burmeister, Jacob M; Koball, Afton M; Hinman, Nova G; Davis, Alan K; Wagner Oehlhof, Marissa; Leroy, Michelle; Bannon, Erin; Hoffmann, Debra A

    2013-01-01

    The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group) and source (i.e., the self or others). This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64) years and mean BMI was 31.6 (SD 7.5) kg/m². Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI) and individual factors (i.e., group identity, stigma consciousness, fear of fat). Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes. Copyright © 2013 S. Karger GmbH, Freiburg

  7. Examining Perceived Stereotype Threat among Overweight/Obese Adults Using a Multi-Threat Framework

    Directory of Open Access Journals (Sweden)

    Robert A. Carels

    2013-05-01

    Full Text Available Objective: The Multi-Threat Framework accounts for potentially different forms of stereotype threat that differ in target (i.e., the individual or the group and source (i.e., the self or others. This investigation examined how these different forms of perceived stereotype threat were related to concepts, such as group identity, stereotype endorsement, stigma consciousness, etc., among overweight and obese individuals. Method: 216 adults completed an online survey. Participants' mean age was 23.6 (SD 10.1; range 18-64 years and mean BMI was 31.6 (SD 7.5 kg/m2. Results: Participants reported a history of feeling threatened by stereotypes related to weight. When reflecting on past experiences of perceived stereotype threat, participants reported greater levels of self/own stereotype threat compared to group stereotype threat. Level of stereotype threat was related to a number of personal characteristics (i.e., sex, BMI and individual factors (i.e., group identity, stigma consciousness, fear of fat. Conclusion: Individuals who are overweight report a history of being threatened by negative stereotypes. The findings support the Multi-Threat Framework for stereotype threat based on body weight. Overweight individuals' susceptibility to stereotype threat may vary systematically depending on several factors. Future research should examine weight-related stereotypes' impact on cognitive and behavioral outcomes.

  8. CYBER ATTACKS, MAJOR THREATS AND VULNERABILITIES AGAINST STATES, ORGANIZATIONS AND CITIZENS

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2016-06-01

    Full Text Available The author briefly tries to bring to the attention of those interested the complex issue developed globally on cyber risks, threats and vulnerabilities reaching to the "cyber warfare" with direct involvement of some state actors. Some means and vectors of attack are presented, as well as countermeasures to protect the individual users, companies, governmental and military structures. In the end, the article presents the situation in Romania with respect to some measures already taken and others that will be probably taken in the future, particularly in the legislative and administrative sector regarding cyber protection.

  9. SWOT analysis and revelation in traditional Chinese medicine internationalization.

    Science.gov (United States)

    Tang, Haitao; Huang, Wenlong; Ma, Jimei; Liu, Li

    2018-01-01

    Traditional Chinese medicine (TCM) is currently the best-preserved and most influential traditional medical system with the largest number of users worldwide. In recent years, the trend of TCM adoption has increased greatly, but the process of TCM internationalization has suffered from a series of setbacks for both internal and external reasons. Thus, the process of TCM internationalization faces formidable challenges, although it also has favourable opportunities. Using SWOT analysis, this paper investigates the strengths, weaknesses, opportunities and threats for TCM. These findings can serve as references for TCM enterprises with global ambitions.

  10. The Vector Calculus Gap: Mathematics (Does Not Equal) Physics.

    Science.gov (United States)

    Dray, Tevian; Manogue, Corinne A.

    1999-01-01

    Discusses some of the differences between the ways mathematicians and physicists view vector calculus and the gap between the way this material is traditionally taught by mathematicians and the way physicists use it. Suggests some ways to narrow the gap. (Author/ASK)

  11. Vertical vector face lift.

    Science.gov (United States)

    Somoano, Brian; Chan, Joanna; Morganroth, Greg

    2011-01-01

    Facial rejuvenation using local anesthesia has evolved in the past decade as a safer option for patients seeking fewer complications and minimal downtime. Mini- and short-scar face lifts using more conservative incision lengths and extent of undermining can be effective in the younger patient with lower face laxity and minimal loose, elastotic neck skin. By incorporating both an anterior and posterior approach and using an incision length between the mini and more traditional face lift, the Vertical Vector Face Lift can achieve longer-lasting and natural results with lesser cost and risk. Submentoplasty and liposuction of the neck and jawline, fundamental components of the vertical vector face lift, act synergistically with superficial musculoaponeurotic system plication to reestablish a more youthful, sculpted cervicomental angle, even in patients with prominent jowls. Dramatic results can be achieved in the right patient by combining with other procedures such as injectable fillers, chin implants, laser resurfacing, or upper and lower blepharoplasties. © 2011 Wiley Periodicals, Inc.

  12. Are all interventions created equal? A multi-threat approach to tailoring stereotype threat interventions.

    Science.gov (United States)

    Shapiro, Jenessa R; Williams, Amy M; Hambarchyan, Mariam

    2013-02-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on the abilities of one's group-and self-as-target stereotype threats-concerns that a stereotype-relevant performance will reflect poorly on one's own abilities. The present experiments explored Black college students' performance on diagnostic intelligence tests (Experiments 1 and 3) and women's interest (Experiment 2) and performance (Experiment 4) in science, technology, engineering, and math (STEM). Across the 4 experiments, participants were randomly assigned to experience either a group-as-target or self-as-target stereotype threat. Experiments 1 and 2 revealed that role model interventions were successful at protecting only against group-as-target stereotype threats, and Experiments 3 and 4 revealed that self-affirmation interventions were successful at protecting only against self-as-target stereotype threats. The present research provides an experimental test of the Multi-Threat Framework across different negatively stereotyped groups (Black students, female students), different negatively stereotyped domains (general intelligence, STEM), and different outcomes (test performance, career interest). This research suggests that interventions should address the range of possible stereotype threats to effectively protect individuals against these threats. Through an appreciation of the distinct forms of stereotype threats and the ways in which interventions work to reduce them, this research aims to facilitate a more complete understanding of stereotype threat. (c) 2013 APA, all rights reserved.

  13. Development of a NEW Vector Magnetograph at Marshall Space Flight Center

    Science.gov (United States)

    West, Edward; Hagyard, Mona; Gary, Allen; Smith, James; Adams, Mitzi; Rose, M. Franklin (Technical Monitor)

    2001-01-01

    This paper will describe the Experimental Vector Magnetograph that has been developed at the Marshall Space Flight Center (MSFC). This instrument was designed to improve linear polarization measurements by replacing electro-optic and rotating waveplate modulators with a rotating linear analyzer. Our paper will describe the motivation for developing this magnetograph, compare this instrument with traditional magnetograph designs, and present a comparison of the data acquired by this instrument and original MSFC vector magnetograph.

  14. Measuring magnetic field vector by stimulated Raman transitions

    International Nuclear Information System (INIS)

    Wang, Wenli; Wei, Rong; Lin, Jinda; Wang, Yuzhu; Dong, Richang; Zou, Fan; Chen, Tingting

    2016-01-01

    We present a method for measuring the magnetic field vector in an atomic fountain by probing the line strength of stimulated Raman transitions. The relative line strength for a Λ-type level system with an existing magnetic field is theoretically analyzed. The magnetic field vector measured by our proposed method is consistent well with that by the traditional bias magnetic field method with an axial resolution of 6.1 mrad and a radial resolution of 0.16 rad. Dependences of the Raman transitions on laser polarization schemes are also analyzed. Our method offers the potential advantages for magnetic field measurement without requiring additional bias fields, beyond the limitation of magnetic field intensity, and extending the spatial measurement range. The proposed method can be widely used for measuring magnetic field vector in other precision measurement fields.

  15. Support vector machine for diagnosis cancer disease: A comparative study

    Directory of Open Access Journals (Sweden)

    Nasser H. Sweilam

    2010-12-01

    Full Text Available Support vector machine has become an increasingly popular tool for machine learning tasks involving classification, regression or novelty detection. Training a support vector machine requires the solution of a very large quadratic programming problem. Traditional optimization methods cannot be directly applied due to memory restrictions. Up to now, several approaches exist for circumventing the above shortcomings and work well. Another learning algorithm, particle swarm optimization, Quantum-behave Particle Swarm for training SVM is introduced. Another approach named least square support vector machine (LSSVM and active set strategy are introduced. The obtained results by these methods are tested on a breast cancer dataset and compared with the exact solution model problem.

  16. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Directory of Open Access Journals (Sweden)

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  17. The concept of ego threat in social and personality psychology: is ego threat a viable scientific construct?

    Science.gov (United States)

    Leary, Mark R; Terry, Meredith L; Batts Allen, Ashley; Tate, Eleanor B

    2009-08-01

    Although widely invoked as an explanation for psychological phenomena, ego threat has been conceptualized and induced in a variety of ways. Most contemporary research conceptualizes ego threat as a threat to a person's self-image or self-esteem, but experimental operationalizations of ego threat usually confound threats to self-esteem with threats to public image or decreased control over negative events, leading to an inability to distinguish the effects of threats to people's personal egos from threats to public image or threats to feelings of control. This article reviews research on ego threat, discusses experimental manipulations that confound ego threat with other processes, and makes recommendations regarding the use of ego threat as a construct in personality and social psychology.

  18. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    OpenAIRE

    Aaron Zimba; Zhaoshun Wang; Hongsong Chen

    2018-01-01

    The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes...

  19. Conservation priorities for Ethiopian sheep breeds combining threat status, breed merits and contributions to genetic diversity

    NARCIS (Netherlands)

    Gizaw, S.; Komen, J.; Windig, J.J.; Hanotte, O.; Arendonk, van J.A.M.

    2008-01-01

    Prioritizing livestock breeds for conservation needs to incorporate both genetic and non-genetic aspects important for the survival of the breeds. Here, we apply a maximum-utility-strategy to prioritize 14 traditional Ethiopian sheep breeds based on their threat status, contributions to farmer

  20. Community detection in complex networks using proximate support vector clustering

    Science.gov (United States)

    Wang, Feifan; Zhang, Baihai; Chai, Senchun; Xia, Yuanqing

    2018-03-01

    Community structure, one of the most attention attracting properties in complex networks, has been a cornerstone in advances of various scientific branches. A number of tools have been involved in recent studies concentrating on the community detection algorithms. In this paper, we propose a support vector clustering method based on a proximity graph, owing to which the introduced algorithm surpasses the traditional support vector approach both in accuracy and complexity. Results of extensive experiments undertaken on computer generated networks and real world data sets illustrate competent performances in comparison with the other counterparts.

  1. Phytoplasmas-The "Crouching Tiger" Threat of Australian Plant Pathology.

    Science.gov (United States)

    Liu, Jian; Gopurenko, David; Fletcher, Murray J; Johnson, Anne C; Gurr, Geoff M

    2017-01-01

    Phytoplasmas are insect-vectored bacteria that cause disease in a wide range of plant species. The increasing availability of molecular DNA analyses, expertise and additional methods in recent years has led to a proliferation of discoveries of phytoplasma-plant host associations and in the numbers of taxonomic groupings for phytoplasmas. The widespread use of common names based on the diseases with which they are associated, as well as separate phenetic and taxonomic systems for classifying phytoplasmas based on variation at the 16S rRNA-encoding gene, complicates interpretation of the literature. We explore this issue and related trends through a focus on Australian pathosystems, providing the first comprehensive compilation of information for this continent, covering the phytoplasmas, host plants, vectors and diseases. Of the 33 16Sr groups reported internationally, only groups I, II, III, X, XI and XII have been recorded in Australia and this highlights the need for ongoing biosecurity measures to prevent the introduction of additional pathogen groups. Many of the phytoplasmas reported in Australia have not been sufficiently well studied to assign them to 16Sr groups so it is likely that unrecognized groups and sub-groups are present. Wide host plant ranges are apparent among well studied phytoplasmas, with multiple crop and non-crop species infected by some. Disease management is further complicated by the fact that putative vectors have been identified for few phytoplasmas, especially in Australia. Despite rapid progress in recent years using molecular approaches, phytoplasmas remain the least well studied group of plant pathogens, making them a "crouching tiger" disease threat.

  2. Insiders and Insider Threats

    DEFF Research Database (Denmark)

    Hunker, Jeffrey; Probst, Christian W.

    2011-01-01

    Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go on to disc......Threats from the inside of an organization’s perimeters are a significant problem, since it is difficult to distinguish them from benign activity. In this overview article we discuss defining properties of insiders and insider threats. After presenting definitions of these terms, we go...

  3. A survey of basic reproductive ratios in vector-borne disease transmission modeling

    Science.gov (United States)

    Soewono, E.; Aldila, D.

    2015-03-01

    Vector-borne diseases are commonly known in tropical and subtropical countries. These diseases have contributed to more than 10% of world infectious disease cases. Among the vectors responsible for transmitting the diseases are mosquitoes, ticks, fleas, flies, bugs and worms. Several of the diseases are known to contribute to the increasing threat to human health such as malaria, dengue, filariasis, chikungunya, west nile fever, yellow fever, encephalistis, and anthrax. It is necessary to understand the real process of infection, factors which contribute to the complication of the transmission in order to come up with a good and sound mathematical model. Although it is not easy to simulate the real transmission process of the infection, we could say that almost all models have been developed from the already long known Host-Vector model. It constitutes the main transmission processes i.e. birth, death, infection and recovery. From this simple model, the basic concepts of Disease Free and Endemic Equilibria and Basic Reproductive Ratio can be well explained and understood. Theoretical, modeling, control and treatment aspects of disease transmission problems have then been developed for various related diseases. General construction as well as specific forms of basic reproductive ratios for vector-borne diseases are discusses here.

  4. Classification of e-government documents based on cooperative expression of word vectors

    Science.gov (United States)

    Fu, Qianqian; Liu, Hao; Wei, Zhiqiang

    2017-03-01

    The effective document classification is a powerful technique to deal with the huge amount of e-government documents automatically instead of accomplishing them manually. The word-to-vector (word2vec) model, which converts semantic word into low-dimensional vectors, could be successfully employed to classify the e-government documents. In this paper, we propose the cooperative expressions of word vector (Co-word-vector), whose multi-granularity of integration explores the possibility of modeling documents in the semantic space. Meanwhile, we also aim to improve the weighted continuous bag of words model based on word2vec model and distributed representation of topic-words based on LDA model. Furthermore, combining the two levels of word representation, performance result shows that our proposed method on the e-government document classification outperform than the traditional method.

  5. Poland and Global Threats

    Science.gov (United States)

    Kleer, Jerzy

    2016-01-01

    This essay seeks to present the specifics of global threats, as well as the reasons for them being universal in nature, and for their persistence. A certain classification of the threats is also engaged in. At the same time, an attempt is made to show the specific threats present - irrespective of their global counterparts - in different regions, and even in different states. The genesis and nature of the latter are demonstrated in a somewhat ad hoc manner by reference to the threats considered to face Poland. If the global threats are truly universal, and arise out of the changes taking place around the world in the last half-century (primarily around the twin phenomena of globalisation and the information revolution), a specific reverse kind of situation applies to decolonisation, plus the collapse of the communist system and the transformation into market economies that apply to formerly communist countries. Equally, some at least of the threats facing Poland may have even a longer history, given that they are very much influenced by past economic and political development, as well as the dominant cultural system.

  6. REGIONAL SECURITY IN THE HORN OF AFRICA: CONFLICTS, AGENDAS AND THREATS

    Directory of Open Access Journals (Sweden)

    Nilton César Fernandes Cardoso

    2017-01-01

    Full Text Available This paper aims at analyzing security dynamics in the Horn of Africa in the post-independence period, identifying the actors, agendas and threats. For this purpose, it is subdivided into three parts. The first one analyzes the security dynamics taking place in the Horn of Africa during the Cold War period, focusing on the regional rivalries and on the penetration of extraregional actors. In the second part, there is a discussion regarding the transformations which occurred in region in the immediate post-Cold War period, focusing both on the unities’ (states internal security dynamics and on the regional ones. The third and last section aims at identifying “new” threats and regional and international responses, as well as the emerging strategic importance of the region to traditional superpowers in the post-9/11 period, marked by the process of securitization.

  7. Are All Interventions Created Equal? A Multi-Threat Approach to Tailoring Stereotype Threat Interventions

    OpenAIRE

    Shapiro, Jenessa R.; Williams, Amy M.; Hambarchyan, Mariam

    2012-01-01

    To date, stereotype threat interventions have been considered interchangeable. Across 4 experiments, the present research demonstrates that stereotype threat interventions need to be tailored to the specific form of experienced stereotype threat to be effective. The Multi-Threat Framework (Shapiro & Neuberg, 2007) distinguishes between group-as-target stereotype threats—concerns that a stereotype-relevant performance will reflect poorly on the abilities of one’s group—and self-as-target stere...

  8. Foliar nutrient analysis of sugar maple decline: retrospective vector diagnosis

    Science.gov (United States)

    Victor R. Timmer; Yuanxin Teng

    1999-01-01

    Accuracy of traditional foiiar analysis of nutrient disorders in sugar maple (Acer saccharum Marsh) is limited by lack of validation and confounding by nutrient interactions. Vector nutrient diagnosis is relatively free of these problems. The technique is demonstrated retrospectively on four case studies. Diagnostic interpretations consistently...

  9. Human element of corporate espionage risk management : literature review on assessment and control of outsider and insider threats

    OpenAIRE

    Sandberg, Jarkko

    2015-01-01

    The primary purpose of this study is to determine how suitable human risk management con- trols are against corporate espionage. Information risks are ascending problem with corpora- tions all over the world. Cyber attacks are commonplace, and the attackers are often trying to compromise valuable data assets. These malicious targeted attacks are bypassing traditional information security controls; therefore, organizations are endangered by these threats. Since the traditional information secu...

  10. TRADITIONAL RURAL WETLANDS IN HARYANA STATE OF INDIA ARE CURRENTLY CONFRONTING MULTICORNERED THREATS LEADING TO EXTINCTION SOONER THAN LATER

    Directory of Open Access Journals (Sweden)

    Rohtash chand Gupta

    2012-05-01

    Full Text Available The most serious threat to traditional rural ponds in Haryana is associated with transformed societal behavioural patterns, ethics, values and life style, amongst several others. The siltation of ponds with adjoining areas, soil coming in with rain water is a very serious cause of stratification of rural ponds. Also contracting of village community land for sun drying of cow dung cakes inspires villagers to overload periphery of each pond with cow dung turning the premises into grave-yard of dung. This dung is the major source of polluting pond water into blackish water with high load of organic matter. Moreover, it leads to over excessive eutrophication. Building of major highways and connectivity roads have resulted into compartmentalization and degradation of village ponds. Inhabitation of peripheral village ponds boundaries by lower section of society for dwelling purposes is more threat to wetlands. The indifferent inclination of villagers towards silted ponds drenched in bad odour and blackish sludge is the story of 80% of the cases. The total blockage of run-off rainy water towards the natural age old rural ponds due to obstruction by way of human inhabitation has resulted into desertification of shallow water sheet in 90% of the cases. The oblivion of harvesting dried silt in summer for brick making has spelled doom for the ponds turning them into flat ground through successive decades and so on. The water quality in all ponds was overshooting the decaying stage due to the continuous mixing of cow dung drenched rainy water. Over excessive usage of ponds for bathing of cattle, dumping of cow dung and rotten vegetables waste has turned ponds into live sinks of dirt, garbage and rural dairy wastes. Majority of village ponds are now out of existence or in deep black sludge laden or converted into Fish-Farming wetlands. The present studies have indicated that Winter migratory birds like Greylag Goose Anser anser, Bar-headed Goose Anser

  11. Challenges in predicting climate and environmental effects on vector-borne disease episystems in a changing world.

    Science.gov (United States)

    Tabachnick, W J

    2010-03-15

    Vector-borne pathogens cause enormous suffering to humans and animals. Many are expanding their range into new areas. Dengue, West Nile and Chikungunya have recently caused substantial human epidemics. Arthropod-borne animal diseases like Bluetongue, Rift Valley fever and African horse sickness pose substantial threats to livestock economies around the world. Climate change can impact the vector-borne disease epidemiology. Changes in climate will influence arthropod vectors, their life cycles and life histories, resulting in changes in both vector and pathogen distribution and changes in the ability of arthropods to transmit pathogens. Climate can affect the way pathogens interact with both the arthropod vector and the human or animal host. Predicting and mitigating the effects of future changes in the environment like climate change on the complex arthropod-pathogen-host epidemiological cycle requires understanding of a variety of complex mechanisms from the molecular to the population level. Although there has been substantial progress on many fronts the challenges to effectively understand and mitigate the impact of potential changes in the environment on vector-borne pathogens are formidable and at an early stage of development. The challenges will be explored using several arthropod-borne pathogen systems as illustration, and potential avenues to meet the challenges will be presented.

  12. Threat modeling designing for security

    CERN Document Server

    Shostack, Adam

    2014-01-01

    Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems secur

  13. Business continuity 2014: From traditional to integrated Business Continuity Management.

    Science.gov (United States)

    Ee, Henry

    As global change continues to generate new challenges and potential threats to businesses, traditional business continuity management (BCM) slowly reveals its limitations and weak points to ensuring 'business resiliency' today. Consequently, BCM professionals also face the challenge of re-evaluating traditional concepts and introducing new strategies and industry best practices. This paper points to why traditional BCM is no longer sufficient in terms of enabling businesses to survive in today's high-risk environment. It also looks into some of the misconceptions about BCM and other stumbling blocks to establishing effective BCM today. Most importantly, however, this paper provides tips based on the Business Continuity Institute's (BCI) Good Practices Guideline (GPG) and the latest international BCM standard ISO 22301 on how to overcome the issues and challenges presented.

  14. A simple method of equine limb force vector analysis and its potential applications

    Directory of Open Access Journals (Sweden)

    Sarah Jane Hobbs

    2018-02-01

    Full Text Available Background Ground reaction forces (GRF measured during equine gait analysis are typically evaluated by analyzing discrete values obtained from continuous force-time data for the vertical, longitudinal and transverse GRF components. This paper describes a simple, temporo-spatial method of displaying and analyzing sagittal plane GRF vectors. In addition, the application of statistical parametric mapping (SPM is introduced to analyse differences between contra-lateral fore and hindlimb force-time curves throughout the stance phase. The overall aim of the study was to demonstrate alternative methods of evaluating functional (asymmetry within horses. Methods GRF and kinematic data were collected from 10 horses trotting over a series of four force plates (120 Hz. The kinematic data were used to determine clean hoof contacts. The stance phase of each hoof was determined using a 50 N threshold. Vertical and longitudinal GRF for each stance phase were plotted both as force-time curves and as force vector diagrams in which vectors originating at the centre of pressure on the force plate were drawn at intervals of 8.3 ms for the duration of stance. Visual evaluation was facilitated by overlay of the vector diagrams for different limbs. Summary vectors representing the magnitude (VecMag and direction (VecAng of the mean force over the entire stance phase were superimposed on the force vector diagram. Typical measurements extracted from the force-time curves (peak forces, impulses were compared with VecMag and VecAng using partial correlation (controlling for speed. Paired samples t-tests (left v. right diagonal pair comparison and high v. low vertical force diagonal pair comparison were performed on discrete and vector variables using traditional methods and Hotelling’s T2 tests on normalized stance phase data using SPM. Results Evidence from traditional statistical tests suggested that VecMag is more influenced by the vertical force and impulse, whereas

  15. Use of High-Resolution WRF Simulations to Forecast Lightning Threat

    Science.gov (United States)

    McCaul, E. W., Jr.; LaCasse, K.; Goodman, S. J.; Cecil, D. J.

    2008-01-01

    Recent observational studies have confirmed the existence of a robust statistical relationship between lightning flash rates and the amount of large precipitating ice hydrometeors aloft in storms. This relationship is exploited, in conjunction with the capabilities of cloud-resolving forecast models such as WRF, to forecast explicitly the threat of lightning from convective storms using selected output fields from the model forecasts. The simulated vertical flux of graupel at -15C and the shape of the simulated reflectivity profile are tested in this study as proxies for charge separation processes and their associated lightning risk. Our lightning forecast method differs from others in that it is entirely based on high-resolution simulation output, without reliance on any climatological data. short [6-8 h) simulations are conducted for a number of case studies for which three-dmmensional lightning validation data from the North Alabama Lightning Mapping Array are available. Experiments indicate that initialization of the WRF model on a 2 km grid using Eta boundary conditions, Doppler radar radial velocity fields, and METAR and ACARS data y&eld satisfactory simulations. __nalyses of the lightning threat fields suggests that both the graupel flux and reflectivity profile approaches, when properly calibrated, can yield reasonable lightning threat forecasts, although an ensemble approach is probably desirable in order to reduce the tendency for misplacement of modeled storms to hurt the accuracy of the forecasts. Our lightning threat forecasts are also compared to other more traditional means of forecasting thunderstorms, such as those based on inspection of the convective available potential energy field.

  16. Rethinking energy security in Asia. A non-traditional view of human security

    Energy Technology Data Exchange (ETDEWEB)

    Caballero-Anthony, Mely [Nanyang Technological Univ., Singapore (SG). Centre for Non-Traditional Security (NTS) Studies; Chang, Youngho [Nanyang Technological Univ., Singapore (Singapore). Division of Economics; Putra, Nur Azha (eds.) [National Univ. of Singapore (Singapore). Energy Security Division

    2012-07-01

    Traditional notions of security are premised on the primacy of state security. In relation to energy security, traditional policy thinking has focused on ensuring supply without much emphasis on socioeconomic and environmental impacts. Non-traditional security (NTS) scholars argue that threats to human security have become increasingly prominent since the end of the Cold War, and that it is thus critical to adopt a holistic and multidisciplinary approach in addressing rising energy needs. This volume represents the perspectives of scholars from across Asia, looking at diverse aspects of energy security through a non-traditional security lens. The issues covered include environmental and socioeconomic impacts, the role of the market, the role of civil society, energy sustainability and policy trends in the ASEAN region.

  17. Decisions to shoot in a weapon identification task: The influence of cultural stereotypes and perceived threat on false positive errors.

    Science.gov (United States)

    Fleming, Kevin K; Bandy, Carole L; Kimble, Matthew O

    2010-01-01

    The decision to shoot a gun engages executive control processes that can be biased by cultural stereotypes and perceived threat. The neural locus of the decision to shoot is likely to be found in the anterior cingulate cortex (ACC), where cognition and affect converge. Male military cadets at Norwich University (N=37) performed a weapon identification task in which they made rapid decisions to shoot when images of guns appeared briefly on a computer screen. Reaction times, error rates, and electroencephalogram (EEG) activity were recorded. Cadets reacted more quickly and accurately when guns were primed by images of Middle-Eastern males wearing traditional clothing. However, cadets also made more false positive errors when tools were primed by these images. Error-related negativity (ERN) was measured for each response. Deeper ERNs were found in the medial-frontal cortex following false positive responses. Cadets who made fewer errors also produced deeper ERNs, indicating stronger executive control. Pupil size was used to measure autonomic arousal related to perceived threat. Images of Middle-Eastern males in traditional clothing produced larger pupil sizes. An image of Osama bin Laden induced the largest pupil size, as would be predicted for the exemplar of Middle East terrorism. Cadets who showed greater increases in pupil size also made more false positive errors. Regression analyses were performed to evaluate predictions based on current models of perceived threat, stereotype activation, and cognitive control. Measures of pupil size (perceived threat) and ERN (cognitive control) explained significant proportions of the variance in false positive errors to Middle-Eastern males in traditional clothing, while measures of reaction time, signal detection response bias, and stimulus discriminability explained most of the remaining variance.

  18. METHODS FOR ASSESSING SECURITY THREATS CONFIDENTIAL INFORMATION FOR THE INFORMATION AND TELECOMMUNICATIONS SYSTEMS

    Directory of Open Access Journals (Sweden)

    E. V. Belokurova

    2015-01-01

    Full Text Available The article discusses the different approaches to assessing the safety of confidential information-term for information and telecommunication systems of various pre-appreciable destination in the presence of internal and external threats to its integrity and availability. The difficulty of ensuring the security of confidential information from exposure to information and telecommunication systems of external and internal threats at the present time, is of particular relevance. This problem is confirmed by the analysis of available statistical information on the impact of threats on the security circulating in the information and telecommunications system. Leak confidential information, intellectual property, information, know-how is the result of significant material and moral damage caused to the owner of the restricted information. The paper presents the structure of the indicators and criteria shows that the most promising are analytical criteria. However, their use to assess the level of security of confidential information is difficult due to the lack of appropriate mathematical models. The complexity of the problem is that existing traditional mathematical models are not always appropriate for the stated objectives. Therefore, it is necessary to develop mathematical models designed to assess the security of confidential information and its impact on information and telecommunication system threats.

  19. Direct-current vector control of three-phase grid-connected rectifier-inverter

    Energy Technology Data Exchange (ETDEWEB)

    Li, Shuhui; Haskew, Timothy A.; Hong, Yang-Ki; Xu, Ling [Department of Electrical and Computer Engineering, University of Alabama, Tuscaloosa, AL 35475 (United States)

    2011-02-15

    The three-phase grid-connected converter is widely used in renewable and electric power system applications. Traditionally, control of the three-phase grid-connected converter is based on the standard decoupled d-q vector control mechanism. Nevertheless, the study of this paper shows that there is a limitation in the conventional standard vector control method. Some of the limitations have also been found recently by other researchers. To overcome the shortage of the conventional vector control technique, this paper proposes a new direct-current d-q vector control mechanism in a nested-loop control structure, based on which an optimal control strategy is developed in a nonlinear programming formulation. The behaviors of both the conventional and proposed control methods are compared and evaluated in simulation and laboratory hardware experiment environments, both of which demonstrates that the proposed approach is effective for grid-connected power converter control in a wide system conditions while the conventional standard vector control approach may behave improperly especially when the converter operates beyond its PWM saturation limit. (author)

  20. Scaffolding vector representations for student learning inside a physics game

    Science.gov (United States)

    D'Angelo, Cynthia

    Vectors and vector addition are difficult concepts for many introductory physics students and traditional instruction does not usually sufficiently address these difficulties. Vectors play a major role in most topics in introductory physics and without a complete understanding of them many students are unable to make sense of the physics topics covered in their classes. Video games present a unique opportunity to help students develop an intuitive understanding of motion, forces, and vectors while immersed in an enjoyable and interactive environment. This study examines two dimensions of design decisions to help students learn while playing a physics-based game. The representational complexity dimension looked at two ways of presenting dynamic information about the velocity of the game object on the screen. The scaffolding context dimension looked at two different contexts for presenting vector addition problems that were related to the game. While all students made significant learning games from the pre to the post test, there were virtually no differences between students along the representational complexity dimension and small differences between students along the scaffolding context dimension. A context that directly connects to students' game playing experience was in most cases more productive to learning than an abstract context.

  1. Vector-Borne Diseases - constant challenge for practicing veterinarians: recommendations from the CVBD World Forum

    Directory of Open Access Journals (Sweden)

    Baneth Gad

    2012-03-01

    Full Text Available Abstract The human-animal bond has been a fundamental feature of mankind's history for millennia. The first, and strongest of these, man's relationship with the dog, is believed to pre-date even agriculture, going back as far as 30,000 years. It remains at least as powerful today. Fed by the changing nature of the interactions between people and their dogs worldwide and the increasing tendency towards close domesticity, the health of dogs has never played a more important role in family life. Thanks to developments in scientific understanding and diagnostic techniques, as well as changing priorities of pet owners, veterinarians are now able, and indeed expected, to play a fundamental role in the prevention and treatment of canine disease, including canine vector-borne diseases (CVBDs. The CVBDs represent a varied and complex group of diseases, including anaplasmosis, babesiosis, bartonellosis, borreliosis, dirofilariosis, ehrlichiosis, leishmaniosis, rickettsiosis and thelaziosis, with new syndromes being uncovered every year. Many of these diseases can cause serious, even life-threatening clinical conditions in dogs, with a number having zoonotic potential, affecting the human population. Today, CVBDs pose a growing global threat as they continue their spread far from their traditional geographical and temporal restraints as a result of changes in both climatic conditions and pet dog travel patterns, exposing new populations to previously unknown infectious agents and posing unprecedented challenges to veterinarians. In response to this growing threat, the CVBD World Forum, a multidisciplinary group of experts in CVBDs from around the world which meets on an annual basis, gathered in Nice (France in 2011 to share the latest research on CVBDs and discuss the best approaches to managing these diseases around the world. As a result of these discussions, we, the members of the CVBD Forum have developed the following recommendations to veterinarians

  2. Accountable care organizations and radiology: threat or opportunity?

    Science.gov (United States)

    Abramson, Richard G; Berger, Paul E; Brant-Zawadzki, Michael N

    2012-12-01

    Although the anticipated rise of accountable care organizations brings certain potential threats to radiologists, including direct threats to revenue and indirect systemic changes jeopardizing the bargaining leverage of radiology groups, accountable care organizations, and other integrated health care delivery models may provide radiology with an important opportunity to reassert its leadership and assume a more central role within health care systems. Capitalizing on this potential opportunity, however, will require radiology groups to abandon the traditional "film reader" mentality and engage actively in the design and implementation of nontraditional systems service lines aimed at adding differentiated value to larger health care organizations. Important interlinked and mutually reinforcing components of systems service lines, derived from radiology's core competencies, may include utilization management and decision support, IT leadership, quality and safety assurance, and operational enhancements to meet organizational goals. Such systems-oriented service products, tailored to the needs of individual integrated care entities and supported by objective performance metrics, may provide market differentiation to shield radiology from commoditization and could become an important source of new nonclinical revenue. Copyright © 2012 American College of Radiology. Published by Elsevier Inc. All rights reserved.

  3. Countering Insider Threats

    DEFF Research Database (Denmark)

    Probst, Christian W.; Hunker, Jeffrey; Gollmann, Dieter

    threat, and to develop a common vision of how an insider can be categorized as well as an integrated approach that allows a qualitative reasoning about the threat and the possibilities of attacks. This report gives an overview of the discussions and presentations during the week, as well as the outcome...

  4. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  5. Product Quality Modelling Based on Incremental Support Vector Machine

    International Nuclear Information System (INIS)

    Wang, J; Zhang, W; Qin, B; Shi, W

    2012-01-01

    Incremental Support vector machine (ISVM) is a new learning method developed in recent years based on the foundations of statistical learning theory. It is suitable for the problem of sequentially arriving field data and has been widely used for product quality prediction and production process optimization. However, the traditional ISVM learning does not consider the quality of the incremental data which may contain noise and redundant data; it will affect the learning speed and accuracy to a great extent. In order to improve SVM training speed and accuracy, a modified incremental support vector machine (MISVM) is proposed in this paper. Firstly, the margin vectors are extracted according to the Karush-Kuhn-Tucker (KKT) condition; then the distance from the margin vectors to the final decision hyperplane is calculated to evaluate the importance of margin vectors, where the margin vectors are removed while their distance exceed the specified value; finally, the original SVs and remaining margin vectors are used to update the SVM. The proposed MISVM can not only eliminate the unimportant samples such as noise samples, but also can preserve the important samples. The MISVM has been experimented on two public data and one field data of zinc coating weight in strip hot-dip galvanizing, and the results shows that the proposed method can improve the prediction accuracy and the training speed effectively. Furthermore, it can provide the necessary decision supports and analysis tools for auto control of product quality, and also can extend to other process industries, such as chemical process and manufacturing process.

  6. An examination of age-based stereotype threat about cognitive decline: Implications for stereotype threat research and theory development

    Science.gov (United States)

    Barber, Sarah J.

    2017-01-01

    “Stereotype threat” is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Using Shapiro and Neuberg's (2007) Multi-Threat Framework, I first provide evidence that this is a self-concept threat, and not a group-reputation threat. Because this differs from the form(s) of threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the form(s) of threat elicited, this review also provides evidence that the mechanisms underlying stereotype threat effects may vary across the lifespan. Due to age-related improvements in emotion regulation abilities, stereotype threat does not seem to reduce older adults' executive control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity. This will allow us to design more effective stereotype threat interventions. It will also shed light on why certain effects “fail to replicate” across domains or groups. PMID:28073332

  7. Arthropod Innate Immune Systems and Vector-Borne Diseases.

    Science.gov (United States)

    Baxter, Richard H G; Contet, Alicia; Krueger, Kathryn

    2017-02-21

    Arthropods, especially ticks and mosquitoes, are the vectors for a number of parasitic and viral human diseases, including malaria, sleeping sickness, Dengue, and Zika, yet arthropods show tremendous individual variation in their capacity to transmit disease. A key factor in this capacity is the group of genetically encoded immune factors that counteract infection by the pathogen. Arthropod-specific pattern recognition receptors and protease cascades detect and respond to infection. Proteins such as antimicrobial peptides, thioester-containing proteins, and transglutaminases effect responses such as lysis, phagocytosis, melanization, and agglutination. Effector responses are initiated by damage signals such as reactive oxygen species signaling from epithelial cells and recognized by cell surface receptors on hemocytes. Antiviral immunity is primarily mediated by siRNA pathways but coupled with interferon-like signaling, antimicrobial peptides, and thioester-containing proteins. Molecular mechanisms of immunity are closely linked to related traits of longevity and fertility, and arthropods have the capacity for innate immunological memory. Advances in understanding vector immunity can be leveraged to develop novel control strategies for reducing the rate of transmission of both ancient and emerging threats to global health.

  8. Today's threat and tomorrow's reaction

    International Nuclear Information System (INIS)

    Moore, L.R.

    2002-01-01

    Full text: The events of September 11 have only confirmed our past nightmares and warnings to industries, agencies, and governments. The threat of even more significant catastrophic attacks, using nuclear materials, was just as real ten years ago, as it is today. In many cases, our vulnerability remains the same as years ago. There is a dire need for all organizations to agree upon threats and vulnerabilities, and to implement appropriate protections, for nuclear materials or other 'means' to achieve an event of mass destruction. All appropriate organizations (industries, agencies, and governments) should be able to define, assess, and recognize international threats and vulnerabilities in the same manner. In complimentary fashion, the organizations should be able to implement safeguards against this consistent generic threat. On an international scale the same threats, and most vulnerabilities, pose high risks to all of these organizations and societies. Indeed, in today's world, the vulnerabilities of one nation may clearly pose great risk to another nation. Once threats and vulnerabilities are consistently recognized, we can begin to approach their mitigation in a more 'universal' fashion by the application of internationally recognized and accepted security measures. The path to recognition of these security measures will require agreement on many diverse issues. However, once there is general agreement, we can then proceed to the acquisition of diverse national and international resources with which to implement the security measures 'universally' to eliminate 'weak-links' in the chain of nuclear materials, on a truly international scale. I would like to discuss: developing a internationally acceptable 'generic' statement of threat, vulnerability assessment process, and security measure; proposing this international statement of threat, vulnerability assessment process, and appropriate security measures to organizations (industries, agencies, and governments

  9. A Simulation Study of Threats to Validity in Quasi-Experimental Designs: Interrelationship between Design, Measurement, and Analysis.

    Science.gov (United States)

    Holgado-Tello, Fco P; Chacón-Moscoso, Salvador; Sanduvete-Chaves, Susana; Pérez-Gil, José A

    2016-01-01

    The Campbellian tradition provides a conceptual framework to assess threats to validity. On the other hand, different models of causal analysis have been developed to control estimation biases in different research designs. However, the link between design features, measurement issues, and concrete impact estimation analyses is weak. In order to provide an empirical solution to this problem, we use Structural Equation Modeling (SEM) as a first approximation to operationalize the analytical implications of threats to validity in quasi-experimental designs. Based on the analogies established between the Classical Test Theory (CTT) and causal analysis, we describe an empirical study based on SEM in which range restriction and statistical power have been simulated in two different models: (1) A multistate model in the control condition (pre-test); and (2) A single-trait-multistate model in the control condition (post-test), adding a new mediator latent exogenous (independent) variable that represents a threat to validity. Results show, empirically, how the differences between both the models could be partially or totally attributed to these threats. Therefore, SEM provides a useful tool to analyze the influence of potential threats to validity.

  10. Nephele: genotyping via complete composition vectors and MapReduce

    Directory of Open Access Journals (Sweden)

    Mardis Scott

    2011-08-01

    Full Text Available Abstract Background Current sequencing technology makes it practical to sequence many samples of a given organism, raising new challenges for the processing and interpretation of large genomics data sets with associated metadata. Traditional computational phylogenetic methods are ideal for studying the evolution of gene/protein families and using those to infer the evolution of an organism, but are less than ideal for the study of the whole organism mainly due to the presence of insertions/deletions/rearrangements. These methods provide the researcher with the ability to group a set of samples into distinct genotypic groups based on sequence similarity, which can then be associated with metadata, such as host information, pathogenicity, and time or location of occurrence. Genotyping is critical to understanding, at a genomic level, the origin and spread of infectious diseases. Increasingly, genotyping is coming into use for disease surveillance activities, as well as for microbial forensics. The classic genotyping approach has been based on phylogenetic analysis, starting with a multiple sequence alignment. Genotypes are then established by expert examination of phylogenetic trees. However, these traditional single-processor methods are suboptimal for rapidly growing sequence datasets being generated by next-generation DNA sequencing machines, because they increase in computational complexity quickly with the number of sequences. Results Nephele is a suite of tools that uses the complete composition vector algorithm to represent each sequence in the dataset as a vector derived from its constituent k-mers by passing the need for multiple sequence alignment, and affinity propagation clustering to group the sequences into genotypes based on a distance measure over the vectors. Our methods produce results that correlate well with expert-defined clades or genotypes, at a fraction of the computational cost of traditional phylogenetic methods run on

  11. Comparative performance of a modified change vector analysis in forest change detection

    NARCIS (Netherlands)

    Nackaerts, Kris; Vaesen, K.; Muys, Bart; Coppin, P.

    2005-01-01

    Sustainable forest management requires accurate and up-to-date information, which can nowadays be obtained using digital earth observation technology. This paper introduces a modified change vector analysis (mCVA) approach and conceptually contrasts it against traditional CVA. The results of a

  12. Cross-coherent vector sensor processing for spatially distributed glider networks.

    Science.gov (United States)

    Nichols, Brendan; Sabra, Karim G

    2015-09-01

    Autonomous underwater gliders fitted with vector sensors can be used as a spatially distributed sensor array to passively locate underwater sources. However, to date, the positional accuracy required for robust array processing (especially coherent processing) is not achievable using dead-reckoning while the gliders remain submerged. To obtain such accuracy, the gliders can be temporarily surfaced to allow for global positioning system contact, but the acoustically active sea surface introduces locally additional sensor noise. This letter demonstrates that cross-coherent array processing, which inherently mitigates the effects of local noise, outperforms traditional incoherent processing source localization methods for this spatially distributed vector sensor network.

  13. A review of the ever increasing threat to European crayfish from non-indigenous crayfish species

    Directory of Open Access Journals (Sweden)

    D.M. Holdich

    2009-01-01

    Full Text Available Non-indigenous crayfish species (NICS in Europe now outnumber indigenous crayfish species (ICS 2:1, and it has been predicted that they may dominate completely in the next few decades unless something is done to protect them. Of the ten NICS introduced at least nine have become established in areas occupied by four of the five ICS. A decline in stocks of ICS has been recorded in many countries in the face of increasing populations of NICS. Most European countries retain at least one ICS but all are under threat from habitat loss, deteriorating water quality, overfishing, climate change, and most importantly from NICS and crayfish plague. The threat to ICS is so great in some countries that “ark”sanctuary sites are being established.The three most widely-spread NICS are the North American species: Pacifastacus leniusculus, Orconectes limosus and Procambarus clarkii. These can be considered as “Old NICS”, which were introduced before 1975, compared with the “New NICS”, which were introduced after 1980, such as the North American species: Orconectes immunis, Orconectes juvenilis, Orconectes virilis, Procambarus sp. and Procambarus acutus; and the Australian species: Cherax destructor and Cherax quadricarinatus, all of which have much narrower ranges in Europe. The North American species are potentially capable of acting as vectors of crayfish plague. Outbreaks of this disease occur regularly where there are high concentrations of vectors.In addition to the NICS currently established in the wild, a further threat exists through the aquarium trade, where many American and Australian species are available via the internet and in aquarist centres. Owners of such species may discard them into the freshwater environment when they grow too big as with some Cherax spp. and Orconectes spp., or multiply too frequently as with Procambarus sp. (a parthenogenetic species. A conceptual model is presented as a possible way forward for protecting the

  14. Vector analysis

    CERN Document Server

    Newell, Homer E

    2006-01-01

    When employed with skill and understanding, vector analysis can be a practical and powerful tool. This text develops the algebra and calculus of vectors in a manner useful to physicists and engineers. Numerous exercises (with answers) not only provide practice in manipulation but also help establish students' physical and geometric intuition in regard to vectors and vector concepts.Part I, the basic portion of the text, consists of a thorough treatment of vector algebra and the vector calculus. Part II presents the illustrative matter, demonstrating applications to kinematics, mechanics, and e

  15. Protection without detection: a threat mitigation technique

    Science.gov (United States)

    White, Joshua; McCoy, Joseph R.; Ratazzi, Paul

    2012-05-01

    Networking systems and individual applications have traditionally been defended using signature-based tools that protect the perimeter, many times to the detriment of service, performance, and information flow. These tools require knowledge of both the system on which they run and the attack they are preventing. As such, by their very definition, they only account for what is known to be malicious and ignore the unknown. The unknown, or zero day threat, can occur when defenses have yet to be immunized via a signature or other identifier of the threat. In environments where execution of the mission is paramount, the networks and applications must perform their function of information delivery without endangering the enterprise or losing the salient information, even when facing zero day threats. In this paper we, describe a new defensive strategy that provides a means to more deliberately balance the oft mutually exclusive aspects of protection and availability. We call this new strategy Protection without Detection, since it focuses on network protection without sacrificing information availability. The current instantiation analyzes the data stream in real time as it passes through an in-line device. Critical files are recognized, and mission-specific trusted templates are applied as they are forwarded to their destination. The end result is a system which eliminates the opportunity for propagation of malicious or unnecessary payloads via the various containers that are inherent in the definition of standard file types. In some cases, this method sacrifices features or functionality that is typically inherent in these files. However, with the flexibility of the template approach, inclusion or exclusion of these features becomes a deliberate choice of the mission owners, based on their needs and amount of acceptable risk. The paper concludes with a discussion of future extensions and applications.

  16. Counter-terrorism threat prediction architecture

    Science.gov (United States)

    Lehman, Lynn A.; Krause, Lee S.

    2004-09-01

    This paper will evaluate the feasibility of constructing a system to support intelligence analysts engaged in counter-terrorism. It will discuss the use of emerging techniques to evaluate a large-scale threat data repository (or Infosphere) and comparing analyst developed models to identify and discover potential threat-related activity with a uncertainty metric used to evaluate the threat. This system will also employ the use of psychological (or intent) modeling to incorporate combatant (i.e. terrorist) beliefs and intent. The paper will explore the feasibility of constructing a hetero-hierarchical (a hierarchy of more than one kind or type characterized by loose connection/feedback among elements of the hierarchy) agent based framework or "family of agents" to support "evidence retrieval" defined as combing, or searching the threat data repository and returning information with an uncertainty metric. The counter-terrorism threat prediction architecture will be guided by a series of models, constructed to represent threat operational objectives, potential targets, or terrorist objectives. The approach would compare model representations against information retrieved by the agent family to isolate or identify patterns that match within reasonable measures of proximity. The central areas of discussion will be the construction of an agent framework to search the available threat related information repository, evaluation of results against models that will represent the cultural foundations, mindset, sociology and emotional drive of typical threat combatants (i.e. the mind and objectives of a terrorist), and the development of evaluation techniques to compare result sets with the models representing threat behavior and threat targets. The applicability of concepts surrounding Modeling Field Theory (MFT) will be discussed as the basis of this research into development of proximity measures between the models and result sets and to provide feedback in support of model

  17. Stereotype threat and female communication styles.

    Science.gov (United States)

    von Hippel, Courtney; Wiryakusuma, Cindy; Bowden, Jessica; Shochet, Megan

    2011-10-01

    A large body of research has documented the performance-debilitating effects of stereotype threat for individuals, but there is a paucity of research exploring interpersonal consequences of stereotype threat. Two experiments tested the hypothesis that stereotype threat would change the style in which women communicate. Results indicate that women who experience stereotype threat regarding leadership abilities react against the stereotype by adopting a more masculine communication style. Study 2 provides evidence that self-affirmation eliminates this effect of stereotype threat on women's communication styles. A third study demonstrates an ironic consequence of this effect of stereotype threat on women's communication--when women under stereotype threat adopt a more masculine communication style, they are rated as less warm and likeable, and evaluators indicate less willingness to comply with their requests. Theoretical and practical implications of these findings are discussed.

  18. Evaluating Strategies for Achieving Global Collective Action on Transnational Health Threats and Social Inequalities

    OpenAIRE

    Hoffman, Steven Justin

    2015-01-01

    This dissertation presents three studies that evaluate different strategies for addressing transnational health threats and social inequalities that depend upon or would benefit from global collective action. Each draws upon different academic disciplines, methods and epistemological traditions. Chapter 1 assesses the role of international law in addressing global health challenges, specifically examining when, how and why global health treaties may be helpful. Evidence from 90 quantitati...

  19. Vector-Tensor and Vector-Vector Decay Amplitude Analysis of B0→φK*0

    International Nuclear Information System (INIS)

    Aubert, B.; Bona, M.; Boutigny, D.; Couderc, F.; Karyotakis, Y.; Lees, J. P.; Poireau, V.; Tisserand, V.; Zghiche, A.; Grauges, E.; Palano, A.; Chen, J. C.; Qi, N. D.; Rong, G.; Wang, P.; Zhu, Y. S.; Eigen, G.; Ofte, I.; Stugu, B.; Abrams, G. S.

    2007-01-01

    We perform an amplitude analysis of the decays B 0 →φK 2 * (1430) 0 , φK * (892) 0 , and φ(Kπ) S-wave 0 with a sample of about 384x10 6 BB pairs recorded with the BABAR detector. The fractions of longitudinal polarization f L of the vector-tensor and vector-vector decay modes are measured to be 0.853 -0.069 +0.061 ±0.036 and 0.506±0.040±0.015, respectively. Overall, twelve parameters are measured for the vector-vector decay and seven parameters for the vector-tensor decay, including the branching fractions and parameters sensitive to CP violation

  20. Discovery, utilisation and analysis of credible threats for 2×2 incomplete information games in the Theory of Moves framework

    Science.gov (United States)

    Olsen, Jolie; Sen, Sandip

    2014-04-01

    Steven Brams's [(1994). Theory of moves. Cambridge University Press] Theory of Moves (TOM) is an alternative to traditional game theoretic treatment of real-life interactions, in which players choose strategies based on analysis of future moves and counter-moves that arise if game play commences at a specified start state and either player can choose to move first. In repeated play, players using TOM rationality arrive at nonmyopic equilibria. One advantage of TOM is its ability to model scenarios in which power asymmetries exist between players. In particular, threat power, i.e. the ability of one player to threaten and sustain immediate, globally disadvantageous outcomes to force a desirable result long term, can be utilised to induce Pareto optimal states in games such as Prisoner's Dilemma which result in Pareto-dominated outcomes using traditional methods. Unfortunately, prior work on TOM is limited by an assumption of complete information. This paper presents a mechanism that can be used by a player to utilise threat power when playing a strict, ordinal 2×2 game under incomplete information. We also analyse the benefits of threat power and support in this analysis with empirical evidence.

  1. Fear, threat and efficacy in threat appeals: message involvement as a key mediator to message acceptance.

    Science.gov (United States)

    Cauberghe, Verolien; De Pelsmacker, Patrick; Janssens, Wim; Dens, Nathalie

    2009-03-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat.

  2. About vectors

    CERN Document Server

    Hoffmann, Banesh

    1975-01-01

    From his unusual beginning in ""Defining a vector"" to his final comments on ""What then is a vector?"" author Banesh Hoffmann has written a book that is provocative and unconventional. In his emphasis on the unresolved issue of defining a vector, Hoffmann mixes pure and applied mathematics without using calculus. The result is a treatment that can serve as a supplement and corrective to textbooks, as well as collateral reading in all courses that deal with vectors. Major topics include vectors and the parallelogram law; algebraic notation and basic ideas; vector algebra; scalars and scalar p

  3. Mobile Workforce, Mobile Technology, Mobile Threats

    International Nuclear Information System (INIS)

    Garcia, J.

    2015-01-01

    Mobile technologies' introduction into the world of safeguards business processes such as inspection creates tremendous opportunity for novel approaches and could result in a number of improvements to such processes. Mobile applications are certainly the wave of the future. The success of the application ecosystems has shown that users want full fidelity, highly-usable, simple purpose applications with simple installation, quick responses and, of course, access to network resources at all times. But the counterpart to opportunity is risk, and the widespread adoption of mobile technologies requires a deep understanding of the threats and vulnerabilities inherent in mobile technologies. Modern mobile devices can be characterized as small computers. As such, the threats against computing infrastructure apply to mobile devices. Meanwhile, the attributes of mobile technology that make it such an obvious benefit over traditional computing platforms all have elements of risk: pervasive, always-on networking; diverse ecosystems; lack of centralized control; constantly shifting technological foundations; intense competition among competitors in the marketplace; the scale of the installation base (from millions to billions); and many more. This paper will explore the diverse and massive environment of mobile, the number of attackers and vast opportunities for compromise. The paper will explain how mobile devices prove valuable targets to both advanced and persistent attackers as well as less-skilled casual hackers. Organized crime, national intelligence agencies, corporate espionage are all part of the landscape. (author)

  4. An integrated approach to adapt physical protection to the new terrorism threats

    International Nuclear Information System (INIS)

    Steinhaeusler, F.; Braun, C.; Bunn, G.

    2002-01-01

    Full text: New terrorism (NT) differs significantly from the traditional form of terrorism insofar as it has the capability to: train and deploy suicide commandos; use sophisticated logistics; implement transnational terrorist operations; infiltrate security and diplomatic communities; and commit acts of mass disturbance and mass killings. NT does not engage in negotiations: it does not discriminate in its attacks between children, adult civilians or military personnel; and it is willing to deploy weapons of mass destruction. These characteristics require that the conventional approach to physical protection of installations dealing with nuclear and other radioactive materials (e.g., Design Basis Threat (DBT)) be adapted accordingly. This integrated approach should encompass: at the international level: revised legally binding conventions and recommendations which are more specific than current versions, providing practically applicable advice reflecting the new threat scenarios; at the national level: introducing an element of transparency for validating the national threat perception and supra-national review of the effectiveness of the counteractions taken such as regulatory approaches implementing these international agreements; at the operational level: enhancing security-related co-operation at the command and control level between the on-site security forces at nuclear installations, the response force, police and the military, as well as upgrading of the force-on-force training; and at the research level: R and D in physical protection technology and practices to keep abreast of the threats posed by the NT. (author)

  5. Zika, chikungunya and dengue: the causes and threats of new and re-emerging arboviral diseases.

    Science.gov (United States)

    Paixão, Enny S; Teixeira, Maria Gloria; Rodrigues, Laura C

    2018-01-01

    The recent emergence and re-emergence of viral infections transmitted by vectors-Zika, chikungunya, dengue, Japanese encephalitis, West Nile, yellow fever and others-is a cause for international concern. Using as examples Zika, chikungunya and dengue, we summarise current knowledge on characteristics of the viruses and their transmission, clinical features, laboratory diagnosis, burden, history, possible causes of the spread and the expectation for future epidemics. Arboviruses are transmitted by mosquitoes, are of difficult diagnosis, can have surprising clinical complications and cause severe burden. The current situation is complex, because there is no vaccine for Zika and chikungunya and no specific treatment for the three arboviruses. Vector control is the only comprehensive solution available now and this remains a challenge because up to now this has not been very effective. Until we develop new technologies of control mosquito populations, the globalised and urbanised world we live in will remain vulnerable to the threat of successive arbovirus epidemics.

  6. The Impact of Hybrid Warfare on Traditional Operational Rationale : D-Day’s Demise

    NARCIS (Netherlands)

    Mark Roorda; Jelle van Haaster

    2016-01-01

    In this article we will describe how certain non-traditional means and methods could be used to undermine a military’s capacity to respond effectively to an emerging threat. We will do so by focussing on the Netherlands and showing how some of its specific (non-military) vulnerabilities may be

  7. Vectors

    DEFF Research Database (Denmark)

    Boeriis, Morten; van Leeuwen, Theo

    2017-01-01

    should be taken into account in discussing ‘reactions’, which Kress and van Leeuwen link only to eyeline vectors. Finally, the question can be raised as to whether actions are always realized by vectors. Drawing on a re-reading of Rudolf Arnheim’s account of vectors, these issues are outlined......This article revisits the concept of vectors, which, in Kress and van Leeuwen’s Reading Images (2006), plays a crucial role in distinguishing between ‘narrative’, action-oriented processes and ‘conceptual’, state-oriented processes. The use of this concept in image analysis has usually focused...

  8. Vector regression introduced

    Directory of Open Access Journals (Sweden)

    Mok Tik

    2014-06-01

    Full Text Available This study formulates regression of vector data that will enable statistical analysis of various geodetic phenomena such as, polar motion, ocean currents, typhoon/hurricane tracking, crustal deformations, and precursory earthquake signals. The observed vector variable of an event (dependent vector variable is expressed as a function of a number of hypothesized phenomena realized also as vector variables (independent vector variables and/or scalar variables that are likely to impact the dependent vector variable. The proposed representation has the unique property of solving the coefficients of independent vector variables (explanatory variables also as vectors, hence it supersedes multivariate multiple regression models, in which the unknown coefficients are scalar quantities. For the solution, complex numbers are used to rep- resent vector information, and the method of least squares is deployed to estimate the vector model parameters after transforming the complex vector regression model into a real vector regression model through isomorphism. Various operational statistics for testing the predictive significance of the estimated vector parameter coefficients are also derived. A simple numerical example demonstrates the use of the proposed vector regression analysis in modeling typhoon paths.

  9. Bio-threat microparticle simulants

    Science.gov (United States)

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  10. Bio-threat microparticle simulants

    Energy Technology Data Exchange (ETDEWEB)

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  11. Use of adenoviral vectors as veterinary vaccines.

    Science.gov (United States)

    Ferreira, T B; Alves, P M; Aunins, J G; Carrondo, M J T

    2005-10-01

    Vaccines are the most effective and inexpensive prophylactic tool in veterinary medicine. Ideally, vaccines should induce a lifelong protective immunity against the target pathogen while not causing clinical or pathological signs of diseases in the vaccinated animals. However, such ideal vaccines are rare in the veterinary field. Many vaccines are either of limited effectiveness or have harmful side effects. In addition, there are still severe diseases with no effective vaccines. A very important criterion for an ideal vaccine in veterinary medicine is low cost; this is especially important in developing countries and even more so for poultry vaccination, where vaccines must sell for a few cents a dose. Traditional approaches include inactivated vaccines, attenuated live vaccines and subunit vaccines. Recently, genetic engineering has been applied to design new, improved vaccines. Adenovirus vectors are highly efficient for gene transfer in a broad spectrum of cell types and species. Moreover, adenoviruses often induce humoral, mucosal and cellular immune responses to antigens encoded by the inserted foreign genes. Thus, adenoviruses have become a vector of choice for delivery and expression of foreign proteins for vaccination. Consequently, the market requirements for adenovirus vaccines are increasing, creating a need for production methodologies of concentrated vectors with warranted purity and efficacy. This review summarizes recent developments and approaches of adenovirus production and purification as the application of these vectors, including successes and failures in clinical applications to date.

  12. Kochen-Specker vectors

    International Nuclear Information System (INIS)

    Pavicic, Mladen; Merlet, Jean-Pierre; McKay, Brendan; Megill, Norman D

    2005-01-01

    We give a constructive and exhaustive definition of Kochen-Specker (KS) vectors in a Hilbert space of any dimension as well as of all the remaining vectors of the space. KS vectors are elements of any set of orthonormal states, i.e., vectors in an n-dimensional Hilbert space, H n , n≥3, to which it is impossible to assign 1s and 0s in such a way that no two mutually orthogonal vectors from the set are both assigned 1 and that not all mutually orthogonal vectors are assigned 0. Our constructive definition of such KS vectors is based on algorithms that generate MMP diagrams corresponding to blocks of orthogonal vectors in R n , on algorithms that single out those diagrams on which algebraic (0)-(1) states cannot be defined, and on algorithms that solve nonlinear equations describing the orthogonalities of the vectors by means of statistically polynomially complex interval analysis and self-teaching programs. The algorithms are limited neither by the number of dimensions nor by the number of vectors. To demonstrate the power of the algorithms, all four-dimensional KS vector systems containing up to 24 vectors were generated and described, all three-dimensional vector systems containing up to 30 vectors were scanned, and several general properties of KS vectors were found

  13. Toward a Threat Model for Energy-Harvesting Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Di Mauro, Alessio; Papini, Davide; Vigo, Roberto

    2012-01-01

    compared to regular sensor networks. We also discuss existing security solutions specific for the energy harvesting world and comment on the trend that this topic may follow in the future. Finally, we draw a comparison between the cyber-physical attacker we define in our model and adversary models...... of the reasons why security needs a new take in this topic. Traditional solutions may not work in this new domain. Brand new challenges and threats may arise and new solutions have to be designed. In this paper we present a first taxonomy of attacks, focusing on how they change in the energy-harvesting context...

  14. ROLE OF RESOURCE-BASED ENTREPRENEURSHIP DEVELOPMENT TO INCREASE COMPETITIVENESS OF TRADITIONALLY WOVEN SARONG CREATIVE INDUSTRY

    Directory of Open Access Journals (Sweden)

    Zakiyah Z.

    2017-07-01

    Full Text Available The objectives of the study were to describe position of traditionally woven sarong creative industry in Donggala in business competition based on both internal aspects (strength and weakness and external ones (opportunity and threats, and role of resource-based entrepreneurship development to improve competitiveness of the traditionally woven sarong creative industry in Donggala. In order to meet the objectives, the study used SWOT and Moderating Regression Analysis (MRA. The findings showed that the strength of the Donggala woven sarong industry was the sarong had indigenous Central Sulawesi pattern, it was part of the rural society and was traditionally made. The weaknesses were the sarong pattern and design had yet been touched by modern technology, its color faded away easily during laundry and it was only sold in the local areas. The opportunities were the sarong may become alternative souvenir from Central Sulawesi and development of creative economy was widely discussed recently. The threat was there were various types and patterns of sarong in the market; and entrepreneurship was moderating variables between resource-based strategy and competitiveness of Donggala woven sarong creative industry; the level of significance was 0.001 and the R-Square was 0.803.

  15. British National Party representations of Muslims in the month after the London bombings: homogeneity, threat, and the conspiracy tradition.

    Science.gov (United States)

    Wood, C; Finlay, W M L

    2008-12-01

    This study presents an analysis of articles written by prominent members of the British National Party. Each of these articles discussed Muslims and Islam in the aftermath of the 7 July 2005 London bombings. Two prominent discursive themes are discussed here. The first concerned the writers' constructions of the threat that Muslims and Islam pose to Britain. Central to this theme were constructions of Muslims as 'fascists', anti-white racists, and all potentially dangerous, although there was variability in this. Using the Koran as evidence, the articles present a vision of a faith which intends to take over the country; in this way, a homogenous, culturally essentialist version of Muslims is worked up. The second theme illustrates how the writers challenge those who believe that creating a British multicultural society is possible, and in doing so construct liberals and multiculturalists as also posing a threat to the country. The ways in which this represents a variety of conspiracy theory, and the implications of these constructions for social action, are discussed.

  16. Shallow water bathymetry mapping using Support Vector Machine (SVM) technique and multispectral imagery

    NARCIS (Netherlands)

    Misra, Ankita; Vojinovic, Zoran; Ramakrishnan, Balaji; Luijendijk, Arjen; Ranasinghe, Roshanka

    2018-01-01

    Satellite imagery along with image processing techniques prove to be efficient tools for bathymetry retrieval as they provide time and cost-effective alternatives to traditional methods of water depth estimation. In this article, a nonlinear machine learning technique of Support Vector Machine (SVM)

  17. DOE site-specific threat assessment

    International Nuclear Information System (INIS)

    West, D.J.; Al-Ayat, R.A.; Judd, B.R.

    1985-01-01

    A facility manager faced with the challenges of protecting a nuclear facility against potential threats must consider the likelihood and consequences of such threats, know the capabilities of the facility safeguards and security systems, and make informed decisions about the cost-effectivness of safeguards and security upgrades. To help meet these challenges, the San Francisco Operations Office of the Department of Energy, in conjunction with the Lawrence Livermore Laboratory, has developed a site-specific threat assessment approach and a quantitative model to improve the quality and consistency of site-specific threat assessment and resultant security upgrade decisions at sensitive Department of Energy facilities. 5 figs

  18. A Classification Detection Algorithm Based on Joint Entropy Vector against Application-Layer DDoS Attack

    Directory of Open Access Journals (Sweden)

    Yuntao Zhao

    2018-01-01

    Full Text Available The application-layer distributed denial of service (AL-DDoS attack makes a great threat against cyberspace security. The attack detection is an important part of the security protection, which provides effective support for defense system through the rapid and accurate identification of attacks. According to the attacker’s different URL of the Web service, the AL-DDoS attack is divided into three categories, including a random URL attack and a fixed and a traverse one. In order to realize identification of attacks, a mapping matrix of the joint entropy vector is constructed. By defining and computing the value of EUPI and jEIPU, a visual coordinate discrimination diagram of entropy vector is proposed, which also realizes data dimension reduction from N to two. In terms of boundary discrimination and the region where the entropy vectors fall in, the class of AL-DDoS attack can be distinguished. Through the study of training data set and classification, the results show that the novel algorithm can effectively distinguish the web server DDoS attack from normal burst traffic.

  19. Elementary vectors

    CERN Document Server

    Wolstenholme, E Œ

    1978-01-01

    Elementary Vectors, Third Edition serves as an introductory course in vector analysis and is intended to present the theoretical and application aspects of vectors. The book covers topics that rigorously explain and provide definitions, principles, equations, and methods in vector analysis. Applications of vector methods to simple kinematical and dynamical problems; central forces and orbits; and solutions to geometrical problems are discussed as well. This edition of the text also provides an appendix, intended for students, which the author hopes to bridge the gap between theory and appl

  20. Assessing invasion process through pathway and vector analysis: case of saltcedar (Tamarix spp.

    Directory of Open Access Journals (Sweden)

    Evangelina Natale

    2012-12-01

    Full Text Available Biological invasions are one of the most pervasive environmental threats to native ecosystems worldwide. The spontaneous spread ofsaltcedar is a particular threat to biodiversity conservation in arid and semiarid environments. In Argentina, three species belonging to this genus have been recognized as invaders. The aim of the present study was to identify main dispersal vectors and pathways to refine risk analysis and increase our ability to predict new areas at risk of Tamarix establishment. We surveyed and categorized 223 populations, 39% as invasive, 26% as established, 21% as contained and 14% as detected in nature. Dispersion of saltcedar was found to be associated with watercourses and human-driven disturbances; in addition roads were found to be relevant for the introduction of propagules in newenvironments. Considering the potential impact of saltcedar invasion and that it is an easily wind-dispersed invasive, it is necessary toimplement strategies to monitor dispersal pathways and take actions to eliminate invasion foci, particularly in vulnerable and highconservation value areas.

  1. APPLICATION OF BIOTECHNOLOGY TO THE STUDY OF FILARIAL PARASITES AND THEIR VECTORS

    Directory of Open Access Journals (Sweden)

    A. C. Vickery

    2012-09-01

    Full Text Available Over 200 species of filarial parasites have been described, although the life cycle and nature of their obligate intermediate arthropod vectors have been identified for only about a quarter of them. Traditional methods of studying phylogenetic relationships between closely related parasite species have utilized morphologic, biochemical and biologic characteristics, usually of the microfilarial stage. Identification of competent vectors from among complexes of sibling species, has employed similar techniques, despite the fact that differences between geographical isolates may reflect environmental rather than genetically controlled factors. Studies of the prevalence and transmission of animal, human and zoonotic filarids, so important for vector identification and control, has lead to the examination of filarial parasites at the genetic level. Genomic DNA libraries are being constructed and screened for clones which are species specific. From this work, DNA probes which can accurately enumerate larval stages in vector squash preparations, and monoclonal antibodies specific for defined filarial antigens, are being prepared. The nucleotide sequences of rRNA are also being defined. The application of these technologies to the study of filarial parasites and their vectors, promises to not only allow the construction of accurate phylogenetic trees, but also to provide the data necessary for the identification and control of the vectors of filarial pathogens of animals and man.

  2. Prototyping of CBRN threat assessment system. Phase 1

    International Nuclear Information System (INIS)

    Ina, Shinichiro; Suzuki, Tomoyuki; Maeno, Akihiro; Sakaue, Motoki

    2015-01-01

    Recently, chemical, biological, radiological and nuclear threats, that is, CBRN threats have emerged. In order to support the Japan Self Defense Forces unit coping with the CBRN threats, it is important to take measures against these invisible threats. Our CBRN threat assessment system will make invisible CBRN threats visible. This report describes a prototyping of the CBRN threat assessment system (PHASE 1) carried out from fiscal year 2012-2014. (author)

  3. Psychoanalysis and the nuclear threat

    Energy Technology Data Exchange (ETDEWEB)

    Levine, H.B.; Jacobs, D.; Rubin, L.J.

    1988-01-01

    {ital Psychoanalysis and the Nuclear Threat} provides coverage of the dynamic and clinical considerations that follow from life in the nuclear age. Of special clinical interest are chapters dealing with the developmental consequences of the nuclear threat in childhood, adolescence, and adulthood, and those exploring the technical issues raised by the occurrence in analytic and psychotherapeutic hours of material related to the nuclear threat. Additional chapters bring a psychoanalytic perspective to bear on such issues as the need to have enemies, silence as the real crime, love, work, and survival in the nuclear age, the relationship of the nuclear threat to issues of mourning and melancholia, apocalyptic fantasies, the paranoid process, considerations of the possible impact of gender on the nuclear threat, and the application of psychoanalytic thinking to nuclear arms strategy. Finally, the volume includes the first case report in the English language---albeit a brief psychotherapy---involving the treatment of a Hiroshima survivor.

  4. Culture, threat, and mental illness stigma: identifying culture-specific threat among Chinese-American groups.

    Science.gov (United States)

    Yang, Lawrence H; Purdie-Vaughns, Valerie; Kotabe, Hiroki; Link, Bruce G; Saw, Anne; Wong, Gloria; Phelan, Jo C

    2013-07-01

    We incorporate anthropological insights into a stigma framework to elucidate the role of culture in threat perception and stigma among Chinese groups. Prior work suggests that genetic contamination that jeopardizes the extension of one's family lineage may comprise a culture-specific threat among Chinese groups. In Study 1, a national survey conducted from 2002 to 2003 assessed cultural differences in mental illness stigma and perceptions of threat in 56 Chinese-Americans and 589 European-Americans. Study 2 sought to empirically test this culture-specific threat of genetic contamination to lineage via a memory paradigm. Conducted from June to August 2010, 48 Chinese-American and 37 European-American university students in New York City read vignettes containing content referring to lineage or non-lineage concerns. Half the participants in each ethnic group were assigned to a condition in which the illness was likely to be inherited (genetic condition) and the rest read that the illness was unlikely to be inherited (non-genetic condition). Findings from Study 1 and 2 were convergent. In Study 1, culture-specific threat to lineage predicted cultural variation in stigma independently and after accounting for other forms of threat. In Study 2, Chinese-Americans in the genetic condition were more likely to accurately recall and recognize lineage content than the Chinese-Americans in the non-genetic condition, but that memorial pattern was not found for non-lineage content. The identification of this culture-specific threat among Chinese groups has direct implications for culturally-tailored anti-stigma interventions. Further, this framework might be implemented across other conditions and cultural groups to reduce stigma across cultures. Copyright © 2013 Elsevier Ltd. All rights reserved.

  5. Medicinal Herbs in Iranian Traditional Medicine for Learning and Memory

    OpenAIRE

    Shojaii, Asie; Ghods, Roshanak; Fard, Mehri Abdollahi

    2016-01-01

    Background: A few factors such as age, stress, and emotions may lead to impaired learning, memory loss, amnesia, and dementia or threats like schizophrenia and Alzheimer?s disease (AD). Iranian traditional medicine (ITM) recommends some herbs and herbal preparations for the treatment or prevention of CNS problems. Methods: In this study, scientific evidence related to the effectiveness of ITM herbal medicine on memory, learning and AD is reviewed. The scientific evidence of plant efficacy was...

  6. Sensor-guided threat countermeasure system

    Science.gov (United States)

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  7. Emotional Valence, Arousal, and Threat Ratings of 160 Chinese Words among Adolescents.

    Science.gov (United States)

    Ho, Samuel M Y; Mak, Christine W Y; Yeung, Dannii; Duan, Wenjie; Tang, Sandy; Yeung, June C; Ching, Rita

    2015-01-01

    This study was conducted to provide ratings of valence/pleasantness, arousal/excitement, and threat/potential harm for 160 Chinese words. The emotional valence classification (positive, negative, or neutral) of all of the words corresponded to that of the equivalent English language words. More than 90% of the participants, junior high school students aged between 12 and 17 years, understood the words. The participants were from both mainland China and Hong Kong, thus the words can be applied to adolescents familiar with either simplified (e.g. in mainland China) or traditional Chinese (e.g. in Hong Kong) with a junior secondary school education or higher. We also established eight words with negative valence, high threat, and high arousal ratings to facilitate future research, especially on attentional and memory biases among individuals prone to anxiety. Thus, the new emotional word list provides a useful source of information for affective research in the Chinese language.

  8. Autobiographical memory sources of threats in dreams.

    Science.gov (United States)

    Lafrenière, Alexandre; Lortie-Lussier, Monique; Dale, Allyson; Robidoux, Raphaëlle; De Koninck, Joseph

    2018-02-01

    Temporal sources of dream threats were examined through the paradigm of the Threat Simulation Theory. Two groups of young adults (18-24 years old), who did not experience severe threatening events in the year preceding their dream and reported a dream either with or without threats, were included. Participants (N = 119) kept a log of daily activities and a dream diary, indicating whether dream components referred to past experiences. The occurrence of oneiric threats correlated with the reporting of threats in the daily logs, their average severity, and the stress level experienced the day preceding the dream. The group whose dreams contained threats had significantly more references to temporal categories beyond one year than the group with dreams without threats. Our findings suggest that in the absence of recent highly negative emotional experiences, the threat simulation system selects memory traces of threatening events experienced in the past. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Genetic manipulation of endosymbionts to control vector and vector borne diseases

    Directory of Open Access Journals (Sweden)

    Jay Prakash Gupta

    Full Text Available Vector borne diseases (VBD are on the rise because of failure of the existing methods of control of vector and vector borne diseases and the climate change. A steep rise of VBDs are due to several factors like selection of insecticide resistant vector population, drug resistant parasite population and lack of effective vaccines against the VBDs. Environmental pollution, public health hazard and insecticide resistant vector population indicate that the insecticides are no longer a sustainable control method of vector and vector-borne diseases. Amongst the various alternative control strategies, symbiont based approach utilizing endosymbionts of arthropod vectors could be explored to control the vector and vector borne diseases. The endosymbiont population of arthropod vectors could be exploited in different ways viz., as a chemotherapeutic target, vaccine target for the control of vectors. Expression of molecules with antiparasitic activity by genetically transformed symbiotic bacteria of disease-transmitting arthropods may serve as a powerful approach to control certain arthropod-borne diseases. Genetic transformation of symbiotic bacteria of the arthropod vector to alter the vector’s ability to transmit pathogen is an alternative means of blocking the transmission of VBDs. In Indian scenario, where dengue, chikungunya, malaria and filariosis are prevalent, paratransgenic based approach can be used effectively. [Vet World 2012; 5(9.000: 571-576

  10. Threat of Deportation as Proximal Social Determinant of Mental Health Amongst Migrant Workers.

    Science.gov (United States)

    Harrigan, Nicholas M; Koh, Chiu Yee; Amirrudin, Amirah

    2017-06-01

    While migration health studies traditionally focused on socioeconomic determinants of health, an emerging body of literature is exploring migration status as a proximate cause of health outcomes. Study 1 is a path analysis of the predictors of mental health amongst 582 documented migrant workers in Singapore, and shows that threat of deportation is one of the most important proximate social determinants of predicted mental illness, and a mediator of the impact of workplace conflict on mental health. Study 2 is a qualitative study of the narratives of 149 migrant workers who were in workplace conflict with their employers, and demonstrates that workers believed threats were used as a negotiating strategy during workplace conflicts. Findings suggest that migration status places workers who come into workplace conflict with their employers at heightened risk of mental illness because migration status can be used as a tool by employers in workplace negotiations.

  11. Vector-vector production in photon-photon interactions

    International Nuclear Information System (INIS)

    Ronan, M.T.

    1988-01-01

    Measurements of exclusive untagged /rho/ 0 /rho/ 0 , /rho//phi/, K/sup *//bar K//sup */, and /rho/ω production and tagged /rho/ 0 /rho/ 0 production in photon-photon interactions by the TPC/Two-Gamma experiment are reviewed. Comparisons to the results of other experiments and to models of vector-vector production are made. Fits to the data following a four quark model prescription for vector meson pair production are also presented. 10 refs., 9 figs

  12. Quantitative Analysis of the Security of Software-Defined Network Controller Using Threat/Effort Model

    Directory of Open Access Journals (Sweden)

    Zehui Wu

    2017-01-01

    Full Text Available SDN-based controller, which is responsible for the configuration and management of the network, is the core of Software-Defined Networks. Current methods, which focus on the secure mechanism, use qualitative analysis to estimate the security of controllers, leading to inaccurate results frequently. In this paper, we employ a quantitative approach to overcome the above shortage. Under the analysis of the controller threat model we give the formal model results of the APIs, the protocol interfaces, and the data items of controller and further provide our Threat/Effort quantitative calculation model. With the help of Threat/Effort model, we are able to compare not only the security of different versions of the same kind controller but also different kinds of controllers and provide a basis for controller selection and secure development. We evaluated our approach in four widely used SDN-based controllers which are POX, OpenDaylight, Floodlight, and Ryu. The test, which shows the similarity outcomes with the traditional qualitative analysis, demonstrates that with our approach we are able to get the specific security values of different controllers and presents more accurate results.

  13. Analysis of children's perception of triatomine vectors of chagas disease through drawings: opportunities for targeted health education.

    Science.gov (United States)

    Yevstigneyeva, Violetta; Camara-Mejia, Javier; Dumonteil, Eric

    2014-10-01

    Chagas disease is a tropical parasitic disease affecting about 10 million people, mostly in the Americas, and transmitted mainly by triatomine bugs. Insect vector control with indoor residual insecticides and the promotion of housing improvement is the main control intervention. The success of such interventions relies on their acceptance and appropriation by communities, which depends on their knowledge and perceptions of both the disease and the vector. In this study, we investigated school-aged children's knowledge and perception on triatomine vectors and Chagas disease to further understand how communities view this vector and the disease in Yucatan, Mexico. We performed an analysis of children's drawings on the theme of triatomines and their house in several rural villages, to explore in an open-ended manner their views, understanding and misconceptions. A total of 261 drawings were collected from children ages 6-12 from four villages. We found that children are very familiar with triatomine vectors, and know very well many aspects of their biology and ecology, and in particular their blood-feeding habits. On the other hand, their drawings suggest that the role of triatomines as vectors of a chronic and severe cardiac disease is less understood, and the main perceived health threat appears limited to the bite itself, as previously observed in adults. These results have important implications for the specific design of future education materials and campaigns, and for the promotion of the inclusion of children in raising Chagas disease awareness in these endemic communities.

  14. An outbreak of Leishmania major from an endemic to a non-endemic region posed a public health threat in Iraq from 2014-2017: Epidemiological, molecular and phylogenetic studies.

    Directory of Open Access Journals (Sweden)

    Mariwan M M Al-Bajalan

    2018-03-01

    Full Text Available Cutaneous leishmaniasis (CL is a neglected worldwide, zoonotic, vector-borne, tropical disease that is a threat to public health. This threat may spread from endemic to non-endemic areas. Current research has exploited epidemiological, molecular and phylogenetical studies to determine the danger of an outbreak of CL in the borderline area between northern and central Iraq from 2014-2017.For the first time, using sequence analysis of the cytochrome b gene, the occurrence of CL in the borderline area between northern and central Iraq was confirmed to be due to Leishmania major. The phylogenetic analysis indicated that it was closely related to the L. major MRHO/IR/75/ER strain in Iran.In conclusion, the genotype confirmation of the L. major strain will improve our understanding of the epidemiology of the disease. This is important for facilitating control programs to prevent the further spread of CL. Furthermore, this area could be considered as a model for further research on the risk of global CL epidemics in other non-endemic countries where both reservoir hosts and sandfly vectors are present.

  15. An outbreak of Leishmania major from an endemic to a non-endemic region posed a public health threat in Iraq from 2014-2017: Epidemiological, molecular and phylogenetic studies.

    Science.gov (United States)

    Al-Bajalan, Mariwan M M; Al-Jaf, Sirwan M A; Niranji, Sherko S; Abdulkareem, Dler R; Al-Kayali, Khudhair K; Kato, Hirotomo

    2018-03-01

    Cutaneous leishmaniasis (CL) is a neglected worldwide, zoonotic, vector-borne, tropical disease that is a threat to public health. This threat may spread from endemic to non-endemic areas. Current research has exploited epidemiological, molecular and phylogenetical studies to determine the danger of an outbreak of CL in the borderline area between northern and central Iraq from 2014-2017. For the first time, using sequence analysis of the cytochrome b gene, the occurrence of CL in the borderline area between northern and central Iraq was confirmed to be due to Leishmania major. The phylogenetic analysis indicated that it was closely related to the L. major MRHO/IR/75/ER strain in Iran. In conclusion, the genotype confirmation of the L. major strain will improve our understanding of the epidemiology of the disease. This is important for facilitating control programs to prevent the further spread of CL. Furthermore, this area could be considered as a model for further research on the risk of global CL epidemics in other non-endemic countries where both reservoir hosts and sandfly vectors are present.

  16. Threat in Context: School Moderation of the Impact of Social Identity Threat on Racial/Ethnic Achievement Gaps

    Science.gov (United States)

    Hanselman, Paul; Bruch, Sarah K.; Gamoran, Adam; Borman, Geoffrey D.

    2014-01-01

    Schools with very few and relatively low-performing marginalized students may be most likely to trigger social identity threats (including stereotype threats) that contribute to racial disparities. We test this hypothesis by assessing variation in the benefits of a self-affirmation intervention designed to counteract social identity threat in a…

  17. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    Energy Technology Data Exchange (ETDEWEB)

    McDonald, K [Mayo Clinic, Rochester, MN (United States); Curran, B [The Warren Alpert Medical School of Brown University, Providence, RI (United States)

    2014-06-15

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusion Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment.

  18. TH-A-12A-01: Medical Physicist's Role in Digital Information Security: Threats, Vulnerabilities and Best Practices

    International Nuclear Information System (INIS)

    McDonald, K; Curran, B

    2014-01-01

    I. Information Security Background (Speaker = Kevin McDonald) Evolution of Medical Devices Living and Working in a Hostile Environment Attack Motivations Attack Vectors Simple Safety Strategies Medical Device Security in the News Medical Devices and Vendors Summary II. Keeping Radiation Oncology IT Systems Secure (Speaker = Bruce Curran) Hardware Security Double-lock Requirements “Foreign” computer systems Portable Device Encryption Patient Data Storage System Requirements Network Configuration Isolating Critical Devices Isolating Clinical Networks Remote Access Considerations Software Applications / Configuration Passwords / Screen Savers Restricted Services / access Software Configuration Restriction Use of DNS to restrict accesse. Patches / Upgrades Awareness Intrusion Prevention Intrusion Detection Threat Risk Analysis Conclusion Learning Objectives: Understanding how Hospital IT Requirements affect Radiation Oncology IT Systems. Illustrating sample practices for hardware, network, and software security. Discussing implementation of good IT security practices in radiation oncology. Understand overall risk and threats scenario in a networked environment

  19. Rare Hadronic B Decays to Vector, Axial-Vector and Tensors

    International Nuclear Information System (INIS)

    Gao, Y.Y.

    2011-01-01

    The authors review BABAR measurements of several rare B decays, including vector-axial-vector decays B ± → φK 1 ± (1270), B ± → φ K 1 ± (1400) and B ± → b 1 # -+ρ# ± , vector-vector decays B ± → φK* ± (1410), B 0 → K* 0 (bar K)* 0 , B 0 → K*0K*0 and B 0 → K*+K*-, vector-tensor decays B ± → φK* 2 (1430) ± and φK 2 (1770)/ ± (1820), and vector-scalar decays B ± → φK* 0 (1430) ± . Understanding the observed polarization pattern requires amplitude contributions from an uncertain source.

  20. Threats: power, family mealtimes, and social influence.

    Science.gov (United States)

    Hepburn, Alexa; Potter, Jonathan

    2011-03-01

    One of the most basic topics in social psychology is the way one agent influences the behaviour of another. This paper will focus on threats, which are an intensified form of attempted behavioural influence. Despite the centrality to the project of social psychology, little attention has been paid to threats. This paper will start to rectify this oversight. It reviews early examples of the way social psychology handles threats and highlights key limitations and presuppositions about the nature and role of threats. By contrast, we subject them to a programme of empirical research. Data comprise video records of a collection of family mealtimes that include preschool children. Threats are recurrent in this material. A preliminary conceptualization of features of candidate threats from this corpus will be used as an analytic start point. A series of examples are used to explicate basic features and dimensions that build the action of threatening. The basic structure of the threats uses a conditional logic: if the recipient continues problem action/does not initiate required action then negative consequences will be produced by the speaker. Further analysis clarifies how threats differ from warnings and admonishments. Sequential analysis suggests threats set up basic response options of compliance or defiance. However, recipients of threats can evade these options by, for example, reworking the unpleasant upshot specified in the threat, or producing barely minimal compliance. The implications for broader social psychological concerns are explored in a discussion of power, resistance, and asymmetry; the paper ends by reconsidering the way social influence can be studied in social psychology. ©2010 The British Psychological Society.

  1. Fear, threat and efficacy in threat appeals: Message involvement as a key mediator to message acceptance

    OpenAIRE

    Cauberghe, Verolien; De Pelsmacker, Patrick; JANSSENS, Wim; Dens, Nathalie

    2009-01-01

    In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts. on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement...

  2. Exotic mosquito threats require strategic surveillance and response planning.

    Science.gov (United States)

    Webb, Cameron E; Doggett, Stephen L

    2016-12-14

    Mosquito-borne diseases caused by endemic pathogens such as Ross River, Barmah Forest and Murray Valley encephalitis viruses are an annual concern in New South Wales (NSW), Australia. More than a dozen mosquito species have been implicated in the transmission of these pathogens, with each mosquito occupying a specialised ecological niche that influences their habitat associations, host feeding preferences and the environmental drivers of their abundance. The NSW Arbovirus Surveillance and Mosquito Monitoring Program provides an early warning system for potential outbreaks of mosquito-borne disease by tracking annual activity of these mosquitoes and their associated pathogens. Although the program will effectively track changes in local mosquito populations that may increase with a changing climate, urbanisation and wetland rehabilitation, it will be less effective with current surveillance methodologies at detecting or monitoring changes in exotic mosquito threats, where different surveillance strategies need to be used. Exotic container-inhabiting mosquitoes such as Aedes aegypti and Ae. albopictus pose a threat to NSW because they are nuisance-biting pests and vectors of pathogens such as dengue, chikungunya and Zika viruses. International movement of humans and their belongings have spread these mosquitoes to many regions of the world. In recent years, these two mosquitoes have been detected by the Australian Government Department of Agriculture and Water Resources at local airports and seaports. To target the detection of these exotic mosquitoes, new trapping technologies and networks of surveillance locations are required. Additionally, incursions of these mosquitoes into urban areas of the state will require strategic responses to minimise substantial public health and economic burdens to local communities.

  3. Migration of vectorized iterative solvers to distributed memory architectures

    Energy Technology Data Exchange (ETDEWEB)

    Pommerell, C. [AT& T Bell Labs., Murray Hill, NJ (United States); Ruehl, R. [CSCS-ETH, Manno (Switzerland)

    1994-12-31

    Both necessity and opportunity motivate the use of high-performance computers for iterative linear solvers. Necessity results from the size of the problems being solved-smaller problems are often better handled by direct methods. Opportunity arises from the formulation of the iterative methods in terms of simple linear algebra operations, even if this {open_quote}natural{close_quotes} parallelism is not easy to exploit in irregularly structured sparse matrices and with good preconditioners. As a result, high-performance implementations of iterative solvers have attracted a lot of interest in recent years. Most efforts are geared to vectorize or parallelize the dominating operation-structured or unstructured sparse matrix-vector multiplication, or to increase locality and parallelism by reformulating the algorithm-reducing global synchronization in inner products or local data exchange in preconditioners. Target architectures for iterative solvers currently include mostly vector supercomputers and architectures with one or few optimized (e.g., super-scalar and/or super-pipelined RISC) processors and hierarchical memory systems. More recently, parallel computers with physically distributed memory and a better price/performance ratio have been offered by vendors as a very interesting alternative to vector supercomputers. However, programming comfort on such distributed memory parallel processors (DMPPs) still lags behind. Here the authors are concerned with iterative solvers and their changing computing environment. In particular, they are considering migration from traditional vector supercomputers to DMPPs. Application requirements force one to use flexible and portable libraries. They want to extend the portability of iterative solvers rather than reimplementing everything for each new machine, or even for each new architecture.

  4. Effect of evaluation threat on procrastination behavior.

    Science.gov (United States)

    Bui, Ngoc H

    2007-06-01

    The author evaluated the effects of evaluation apprehension and trait procrastination on behaviors. The author examined private university students from southern California (N = 72) on two independent variables: evaluation threat (manipulated) and trait procrastination (nonmanipulated). The author found a significant interaction effect between type of evaluation threat and level of trait procrastination on the number of days to complete an assigned essay. Post hoc analyses showed high trait procrastinators in the high evaluation threat group significantly delayed returning essays compared with those in the low evaluation threat group. Also, in the low evaluation threat group, low trait procrastinators delayed more than did high trait procrastinators. These results suggest that educators can reduce behavioral delays by increasing evaluation threat, depending on a student's level of trait procrastination.

  5. Does imminent threat capture and hold attention?

    Science.gov (United States)

    Koster, Ernst H W; Crombez, Geert; Van Damme, Stefaan; Verschuere, Bruno; De Houwer, Jan

    2004-09-01

    According to models of attention and emotion, threat captures and holds attention. In behavioral tasks, robust evidence has been found for attentional holding but not for attentional capture by threat. An important explanation for the absence of attentional capture effects is that the visual stimuli used posed no genuine threat. The present study investigated whether visual cues that signal an aversive white noise can elicit attentional capture and holding effects. Cues presented in an attentional task were simultaneously provided with a threat value through an aversive conditioning procedure. Response latencies showed that threatening cues captured and held attention. These results support recent views on attention to threat, proposing that imminent threat captures attention in everyone. (c) 2004 APA, all rights reserved

  6. Insider Threat to Computer Security at Nuclear Facilities

    Energy Technology Data Exchange (ETDEWEB)

    West, Rebecca Lynn [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-01-29

    After completing this session, you should be able to: Describe the Insider Threat; Characterize the cyber insider threat; Describe preventive measures against the insider threat; Describe protective measures against the insider threat.

  7. An Effective NoSQL-Based Vector Map Tile Management Approach

    Directory of Open Access Journals (Sweden)

    Lin Wan

    2016-11-01

    Full Text Available Within a digital map service environment, the rapid growth of Spatial Big-Data is driving new requirements for effective mechanisms for massive online vector map tile processing. The emergence of Not Only SQL (NoSQL databases has resulted in a new data storage and management model for scalable spatial data deployments and fast tracking. They better suit the scenario of high-volume, low-latency network map services than traditional standalone high-performance computer (HPC or relational databases. In this paper, we propose a flexible storage framework that provides feasible methods for tiled map data parallel clipping and retrieval operations within a distributed NoSQL database environment. We illustrate the parallel vector tile generation and querying algorithms with the MapReduce programming model. Three different processing approaches, including local caching, distributed file storage, and the NoSQL-based method, are compared by analyzing the concurrent load and calculation time. An online geological vector tile map service prototype was developed to embed our processing framework in the China Geological Survey Information Grid. Experimental results show that our NoSQL-based parallel tile management framework can support applications that process huge volumes of vector tile data and improve performance of the tiled map service.

  8. Vector analysis

    CERN Document Server

    Brand, Louis

    2006-01-01

    The use of vectors not only simplifies treatments of differential geometry, mechanics, hydrodynamics, and electrodynamics, but also makes mathematical and physical concepts more tangible and easy to grasp. This text for undergraduates was designed as a short introductory course to give students the tools of vector algebra and calculus, as well as a brief glimpse into these subjects' manifold applications. The applications are developed to the extent that the uses of the potential function, both scalar and vector, are fully illustrated. Moreover, the basic postulates of vector analysis are brou

  9. Vectors and Rotations in 3-Dimensions: Vector Algebra for the C++ Programmer

    Science.gov (United States)

    2016-12-01

    release; distribution is unlimited. 1. Introduction This report describes 2 C++ classes: a Vector class for performing vector algebra in 3-dimensional...ARL-TR-7894•DEC 2016 US Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier...Army Research Laboratory Vectors and Rotations in 3-Dimensions:Vector Algebra for the C++ Programmer by Richard Saucier Survivability/Lethality

  10. PMCAP: A Threat Model of Process Memory Data on the Windows Operating System

    Directory of Open Access Journals (Sweden)

    Jiaye Pan

    2017-01-01

    Full Text Available Research on endpoint security involves both traditional PC platform and prevalent mobile platform, among which the analysis of software vulnerability and malware is one of the important contents. For researchers, it is necessary to carry out nonstop exploration of the insecure factors in order to better protect the endpoints. Driven by this motivation, we propose a new threat model named Process Memory Captor (PMCAP on the Windows operating system which threatens the live process volatile memory data. Compared with other threats, PMCAP aims at dynamic data in the process memory and uses a noninvasive approach for data extraction. In this paper we describe and analyze the model and then give a detailed implementation taking four popular web browsers IE, Edge, Chrome, and Firefox as examples. Finally, the model is verified through real experiments and case studies. Compared with existing technologies, PMCAP can extract valuable data at a lower cost; some techniques in the model are also suitable for memory forensics and malware analysis.

  11. Assessing the threat of chikungunya virus emergence in Australia.

    Science.gov (United States)

    Viennet, Elvina; Knope, Katrina; Faddy, Helen M; Williams, Craig R; Harley, David

    2013-06-30

    Chikungunya virus (CHIKV) is a major threat to Australia given the distribution of competent vectors, and the large number of travellers returning from endemic regions. We describe current knowledge of CHIKV importations into Australia, and quantify reported viraemic cases, with the aim of facilitating the formulation of public health policy and ensuring maintenance of blood safety. Cases reported to the National Notifiable Disease Surveillance System (NNDSS) from 2002 to 2012 were analysed by place, month of acquisition, and place of residence. Rates of chikungunya importation were estimated based on reported cases and on the numbers of short-term movements. Between 2002 and 2012, there were 168 cases of chikungunya virus (CHIKV) imported into Australia. Victoria and New South Wales had the largest number of notifications. The main sources were Indonesia, India and Malaysia. The number of cases increased from 2008 to reach a peak in 2010 (n=64; 40%). Although Indonesia accounted for the majority of CHIKV notifications in Australia, travel from India had the highest CHIKV importation rate (number of imported cases per 100,000 travellers). The Australian population is increasingly at risk from CHIKV. Arrivals from endemic countries have increased concurrently with vector incursions via imported goods, as well as via local movement from the Torres Strait to North Queensland ports. An outbreak of CHIKV could have a significant impact on health, the safety of the blood supply and on tourism. Case and vector surveillance as well as population health responses are crucial for minimising any potential impact of CHIKV establishment in Australia. This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to the Commonwealth Copyright Administration, Attorney General

  12. How Is Existential Threat Related to Intergroup Conflict? Introducing the Multidimensional Existential Threat (MET) Model

    Science.gov (United States)

    Hirschberger, Gilad; Ein-Dor, Tsachi; Leidner, Bernhard; Saguy, Tamar

    2016-01-01

    Existential threat lies at the heart of intergroup conflict, but the literature on existential concerns lacks clear conceptualization and integration. To address this problem, we offer a new conceptualization and measurement of existential threat. We establish the reliability and validity of our measure, and to illustrate its utility, we examine whether different existential threats underlie the association between political ideology and support for specific political policies. Study 1 (N = 798) established the construct validity of the scale, and revealed four distinct existential threats: personal death (PD), physical collective annihilation (PA), symbolic collective annihilation (SA), and past victimization (PV). Study 2 (N = 424) confirmed the 4-factor structure, and the convergent and discriminant validity of the scale. Study 3 (N = 170) revealed that the association between a hawkish political ideology and support for hardline policies was mediated by PV, whereas the association between a dovish political ideology and conciliatory policies was mediated by concerns over collective symbolic annihilation. Study 4 (N = 503) conceptually replicated the pattern of findings found in Study 3, and showed that at times of conflict, PA concerns also mediate the relationship between hawkish ideologies and support for hardline policies. In both Studies 3 and 4, when controlling for other threats, PD did not play a significant role. These results underscore the need to consider the multidimensional nature of existential threat, especially in the context of political conflict. PMID:27994561

  13. Intelligent Torque Vectoring Approach for Electric Vehicles with Per-Wheel Motors

    Directory of Open Access Journals (Sweden)

    Alberto Parra

    2018-01-01

    Full Text Available Transport electrification is currently a priority for authorities, manufacturers, and research centers around the world. The development of electric vehicles and the improvement of their functionalities are key elements in this strategy. As a result, there is a need for further research in emission reduction, efficiency improvement, or dynamic handling approaches. In order to achieve these objectives, the development of suitable Advanced Driver-Assistance Systems (ADAS is required. Although traditional control techniques have been widely used for ADAS implementation, the complexity of electric multimotor powertrains makes intelligent control approaches appropriate for these cases. In this work, a novel intelligent Torque Vectoring (TV system, composed of a neuro-fuzzy vertical tire forces estimator and a fuzzy yaw moment controller, is proposed, which allows enhancing the dynamic behaviour of electric multimotor vehicles. The proposed approach is compared with traditional strategies using the high fidelity vehicle dynamics simulator Dynacar. Results show that the proposed intelligent Torque Vectoring system is able to increase the efficiency of the vehicle by 10%, thanks to the optimal torque distribution and the use of a neuro-fuzzy vertical tire forces estimator which provides 3 times more accurate estimations than analytical approaches.

  14. Stereotype threat spillover: how coping with threats to social identity affects aggression, eating, decision making, and attention.

    Science.gov (United States)

    Inzlicht, Michael; Kang, Sonia K

    2010-09-01

    Stereotype threat spillover is a situational predicament in which coping with the stress of stereotype confirmation leaves one in a depleted volitional state and thus less likely to engage in effortful self-control in a variety of domains. We examined this phenomenon in 4 studies in which we had participants cope with stereotype and social identity threat and then measured their performance in domains in which stereotypes were not "in the air." In Study 1 we examined whether taking a threatening math test could lead women to respond aggressively. In Study 2 we investigated whether coping with a threatening math test could lead women to indulge themselves with unhealthy food later on and examined the moderation of this effect by personal characteristics that contribute to identity-threat appraisals. In Study 3 we investigated whether vividly remembering an experience of social identity threat results in risky decision making. Finally, in Study 4 we asked whether coping with threat could directly influence attentional control and whether the effect was implemented by inefficient performance monitoring, as assessed by electroencephalography. Our results indicate that stereotype threat can spill over and impact self-control in a diverse array of nonstereotyped domains. These results reveal the potency of stereotype threat and that its negative consequences might extend further than was previously thought. (PsycINFO Database Record (c) 2010 APA, all rights reserved).

  15. Power and threat in intergroup conflict : How emotional and behavioral responses depend on amount and content of threat

    NARCIS (Netherlands)

    Kamans, Elanor; Otten, Sabine; Gordijn, Ernestine H.

    We propose that in intergroup conflict threat content is important in understanding the reactions of those who experience threats the most: the powerless. Studies 1 and 2 show that powerless groups experience more threat than powerful groups, resulting in the experience of both more anger and fear.

  16. Insular threat associations within taxa worldwide.

    Science.gov (United States)

    Leclerc, Camille; Courchamp, Franck; Bellard, Céline

    2018-04-23

    The global loss of biodiversity can be attributed to numerous threats. While pioneer studies have investigated their relative importance, the majority of those studies are restricted to specific geographic regions and/or taxonomic groups and only consider a small subset of threats, generally in isolation despite their frequent interaction. Here, we investigated 11 major threats responsible for species decline on islands worldwide. We applied an innovative method of network analyses to disentangle the associations of multiple threats on vertebrates, invertebrates, and plants in 15 insular regions. Biological invasions, wildlife exploitation, and cultivation, either alone or in association, were found to be the three most important drivers of species extinction and decline on islands. Specifically, wildlife exploitation and cultivation are largely associated with the decline of threatened plants and terrestrial vertebrates, whereas biological invasions mostly threaten invertebrates and freshwater fish. Furthermore, biodiversity in the Indian Ocean and near the Asian coasts is mostly affected by wildlife exploitation and cultivation compared to biological invasions in the Pacific and Atlantic insular regions. We highlighted specific associations of threats at different scales, showing that the analysis of each threat in isolation might be inadequate for developing effective conservation policies and managements.

  17. Measurement of Charmless B to Vector-Vector decays at BaBar

    International Nuclear Information System (INIS)

    Olaiya, Emmanuel

    2011-01-01

    The authors present results of B → vector-vector (VV) and B → vector-axial vector (VA) decays B 0 → φX(X = φ,ρ + or ρ 0 ), B + → φK (*)+ , B 0 → K*K*, B 0 → ρ + b 1 - and B + → K* 0 α 1 + . The largest dataset used for these results is based on 465 x 10 6 Υ(4S) → B(bar B) decays, collected with the BABAR detector at the PEP-II B meson factory located at the Stanford Linear Accelerator Center (SLAC). Using larger datasets, the BABAR experiment has provided more precise B → VV measurements, further supporting the smaller than expected longitudinal polarization fraction of B → φK*. Additional B meson to vector-vector and vector-axial vector decays have also been studied with a view to shedding light on the polarization anomaly. Taking into account the available errors, we find no disagreement between theory and experiment for these additional decays.

  18. Linear and support vector regressions based on geometrical correlation of data

    Directory of Open Access Journals (Sweden)

    Kaijun Wang

    2007-10-01

    Full Text Available Linear regression (LR and support vector regression (SVR are widely used in data analysis. Geometrical correlation learning (GcLearn was proposed recently to improve the predictive ability of LR and SVR through mining and using correlations between data of a variable (inner correlation. This paper theoretically analyzes prediction performance of the GcLearn method and proves that GcLearn LR and SVR will have better prediction performance than traditional LR and SVR for prediction tasks when good inner correlations are obtained and predictions by traditional LR and SVR are far away from their neighbor training data under inner correlation. This gives the applicable condition of GcLearn method.

  19. Forecasting Lightning Threat Using WRF Proxy Fields

    Science.gov (United States)

    McCaul, E. W., Jr.

    2010-01-01

    Objectives: Given that high-resolution WRF forecasts can capture the character of convective outbreaks, we seek to: 1. Create WRF forecasts of LTG threat (1-24 h), based on 2 proxy fields from explicitly simulated convection: - graupel flux near -15 C (captures LTG time variability) - vertically integrated ice (captures LTG threat area). 2. Calibrate each threat to yield accurate quantitative peak flash rate densities. 3. Also evaluate threats for areal coverage, time variability. 4. Blend threats to optimize results. 5. Examine sensitivity to model mesh, microphysics. Methods: 1. Use high-resolution 2-km WRF simulations to prognose convection for a diverse series of selected case studies. 2. Evaluate graupel fluxes; vertically integrated ice (VII). 3. Calibrate WRF LTG proxies using peak total LTG flash rate densities from NALMA; relationships look linear, with regression line passing through origin. 4. Truncate low threat values to make threat areal coverage match NALMA flash extent density obs. 5. Blend proxies to achieve optimal performance 6. Study CAPS 4-km ensembles to evaluate sensitivities.

  20. The major antigenic membrane protein of "Candidatus Phytoplasma asteris" selectively interacts with ATP synthase and actin of leafhopper vectors.

    Directory of Open Access Journals (Sweden)

    Luciana Galetto

    Full Text Available Phytoplasmas, uncultivable phloem-limited phytopathogenic wall-less bacteria, represent a major threat to agriculture worldwide. They are transmitted in a persistent, propagative manner by phloem-sucking Hemipteran insects. Phytoplasma membrane proteins are in direct contact with hosts and are presumably involved in determining vector specificity. Such a role has been proposed for phytoplasma transmembrane proteins encoded by circular extrachromosomal elements, at least one of which is a plasmid. Little is known about the interactions between major phytoplasma antigenic membrane protein (Amp and insect vector proteins. The aims of our work were to identify vector proteins interacting with Amp and to investigate their role in transmission specificity. In controlled transmission experiments, four Hemipteran species were identified as vectors of "Candidatus Phytoplasma asteris", the chrysanthemum yellows phytoplasmas (CYP strain, and three others as non-vectors. Interactions between a labelled (recombinant CYP Amp and insect proteins were analysed by far Western blots and affinity chromatography. Amp interacted specifically with a few proteins from vector species only. Among Amp-binding vector proteins, actin and both the α and β subunits of ATP synthase were identified by mass spectrometry and Western blots. Immunofluorescence confocal microscopy and Western blots of plasma membrane and mitochondrial fractions confirmed the localisation of ATP synthase, generally known as a mitochondrial protein, in plasma membranes of midgut and salivary gland cells in the vector Euscelidius variegatus. The vector-specific interaction between phytoplasma Amp and insect ATP synthase is demonstrated for the first time, and this work also supports the hypothesis that host actin is involved in the internalization and intracellular motility of phytoplasmas within their vectors. Phytoplasma Amp is hypothesized to play a crucial role in insect transmission specificity.

  1. Seasonal and Spatial Dynamics of the Primary Vector of Plasmodium knowlesi within a Major Transmission Focus in Sabah, Malaysia.

    Directory of Open Access Journals (Sweden)

    Meng L Wong

    Full Text Available The simian malaria parasite Plasmodium knowlesi is emerging as a public health problem in Southeast Asia, particularly in Malaysian Borneo where it now accounts for the greatest burden of malaria cases and deaths. Control is hindered by limited understanding of the ecology of potential vector species.We conducted a one year longitudinal study of P. knowlesi vectors in three sites within an endemic area of Sabah, Malaysia. All mosquitoes were captured using human landing catch. Anopheles mosquitoes were dissected to determine, oocyst, sporozoites and parous rate. Anopheles balabacensis is confirmed as the primary vector of. P. knowlesi (using nested PCR in Sabah for the first time. Vector densities were significantly higher and more seasonally variable in the village than forest or small scale farming site. However An. balabacensis survival and P. knowlesi infection rates were highest in forest and small scale farm sites. Anopheles balabacensis mostly bites humans outdoors in the early evening between 1800 to 2000 hrs.This study indicates transmission is unlikely to be prevented by bednets. This combined with its high vectorial capacity poses a threat to malaria elimination programmes within the region.

  2. Establishing 'design basis threat' in Norway

    International Nuclear Information System (INIS)

    Maerli, M.B.; Naadland, E.; Reistad, O.

    2002-01-01

    Full text: INFCIRC 225 (Rev. 4) assumes that a state's physical protection system should be based on the state's evaluation of the threat, and that this should be reflected in the relevant legislation. Other factors should also be considered, including the state's emergency response capabilities and the existing and relevant measures of the state's system of accounting for and control of nuclear material. A design basis threat developed from an evaluation by the state of the threat of unauthorized removal of nuclear material and of sabotage of nuclear material and nuclear facilities is an essential element of a state's system of physical protection. The state should continuously review the threat, and evaluate the implications of any changes in that threat for the required levels and the methods of physical protection. As part of a national design basis threat assessment, this paper evaluates the risk of nuclear or radiological terrorism and sabotage in Norway. Possible scenarios are presented and plausible consequences are discussed with a view to characterize the risks. The need for more stringent regulatory requirements will be discussed, together with the (positive) impact of improved systems and procedures of physical protection on nuclear emergency planning. Special emphasis is placed on discussing the design basis threat for different scenarios in order to systemize regulatory efforts to update the current legislation, requirement for operators' contingency planning, response efforts and the need for emergency exercises. (author)

  3. Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Rodriquez, Jose [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2008-01-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt theft of nuclear materials. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat.

  4. Mempertahankan Eksistensi Traditional Travel Agency Dalam Menghadapi Ancaman Online Travel Agency

    OpenAIRE

    Anjastantri, Windya; Dewantara, Rizki Yudhi

    2017-01-01

    Online travel agencies, with their own financial capability, not only making them daring to take the initial risk by investing on great magnitude of promotions, but also dare to lower the price extremely below the normal principle that others could not compete to it, which later becomes threat to the existence of traditional travel agencies that clearly not capable of providing the same benefit due to enormous operational cost. Therefore, competitive strategies are needed to maintain the exis...

  5. Vectorization of KENO IV code and an estimate of vector-parallel processing

    International Nuclear Information System (INIS)

    Asai, Kiyoshi; Higuchi, Kenji; Katakura, Jun-ichi; Kurita, Yutaka.

    1986-10-01

    The multi-group criticality safety code KENO IV has been vectorized and tested on FACOM VP-100 vector processor. At first the vectorized KENO IV on a scalar processor became slower than the original one by a factor of 1.4 because of the overhead introduced by the vectorization. Making modifications of algorithms and techniques for vectorization, the vectorized version has become faster than the original one by a factor of 1.4 and 3.0 on the vector processor for sample problems of complex and simple geometries, respectively. For further speedup of the code, some improvements on compiler and hardware, especially on addition of Monte Carlo pipelines to the vector processor, are discussed. Finally a pipelined parallel processor system is proposed and its performance is estimated. (author)

  6. Vector control of wind turbine on the basis of the fuzzy selective neural net*

    Science.gov (United States)

    Engel, E. A.; Kovalev, I. V.; Engel, N. E.

    2016-04-01

    An article describes vector control of wind turbine based on fuzzy selective neural net. Based on the wind turbine system’s state, the fuzzy selective neural net tracks an maximum power point under random perturbations. Numerical simulations are accomplished to clarify the applicability and advantages of the proposed vector wind turbine’s control on the basis of the fuzzy selective neuronet. The simulation results show that the proposed intelligent control of wind turbine achieves real-time control speed and competitive performance, as compared to a classical control model with PID controllers based on traditional maximum torque control strategy.

  7. Linking terrestrial and marine conservation planning and threats analysis.

    Science.gov (United States)

    Tallis, Heather; Ferdaña, Zach; Gray, Elizabeth

    2008-02-01

    The existence of the Gulf of Mexico dead zone makes it clear that marine ecosystems can be damaged by terrestrial inputs. Marine and terrestrial conservation planning need to be aligned in an explicit fashion to fully represent threats to marine systems. To integrate conservation planning for terrestrial and marine systems, we used a novel threats assessment that included 5 cross-system threats in a site-prioritization exercise for the Pacific Northwest coast ecoregion (U.S.A.). Cross-system threats are actions or features in one ecological realm that have effects on species in another realm. We considered bulkheads and other forms of shoreline hardening threats to terrestrial systems and roads, logging, agriculture, and urban areas threats to marine systems. We used 2 proxies of freshwater influence on marine environments, validated against a mechanistic model and field observations, to propagate land-based threats into marine sites. We evaluated the influence of cross-system threats on conservation priorities by comparing MARXAN outputs for 3 scenarios that identified terrestrial and marine priorities simultaneously: (1) no threats, (2) single-system threats, and (3) single- and cross-system threats. Including cross-system threats changed the threat landscape dramatically. As a result the best plan that included only single-system threats identified 323 sites (161,500 ha) at risk from cross-system threats. Including these threats changed the location of best sites. By comparing the best and sum solutions of the single- and cross-system scenarios, we identified areas ideal for preservation or restoration through integrated management. Our findings lend quantitative support to the call for explicitly integrated decision making and management action in terrestrial and marine ecosystems.

  8. Participatory action research designs in applied disability and rehabilitation science: protecting against threats to social validity.

    Science.gov (United States)

    Seekins, Tom; White, Glen W

    2013-01-01

    Researchers and disability advocates have been debating consumer involvement in disability and rehabilitation science since at least 1972. Despite the length of this debate, much confusion remains. Consumer involvement may represent a spirit of democracy or even empowerment, but as a tool of science, it is necessary to understand how to judge its application. To realize consumer involvement as a design element in science, researchers need a framework for understanding how it can contribute to the scientific process. The thesis of this article is that a primary scientific function of consumer involvement is to reduce threats to the social validity of research, the extent to which those expected to use or benefit from research products judge them as useful and actually use them. Social validity has traditionally not been treated with the same rigor as concerns for internal and external validity. This article presents a framework that describes 7 threats to social validity and explains how 15 forms of consumer involvement protect against those threats. We also suggest procedures for reporting and reviewing consumer involvement in proposals and manuscripts. This framework offers tools familiar to all scientists for identifying threats to the quality of research, and for judging the effectiveness of strategies for protecting against those threats. It may also enhance the standing of consumer involvement strategies as tools for protecting research quality by organizing them in a way that allows for systematic criticism of their effectiveness and subsequent improvement. Copyright © 2013 American Congress of Rehabilitation Medicine. Published by Elsevier Inc. All rights reserved.

  9. Spread of Zika virus:The key role of mosquito vector control

    Institute of Scientific and Technical Information of China (English)

    Giovanni Benelli

    2016-01-01

    Mosquitoes (Diptera: Culicidae) represent a key threat for millions of humans and ani-mals worldwide, since they act as vectors for important parasites and pathogens, including malaria, filariasis and a wide number of arboviruses. The recent outbreaks of Zika virus infections occurring in South America, Central America, and the Caribbean, represent the most recent four arrivals of important arboviruses in the western hemi-sphere, over the last 20 years, namely dengue, West Nile virus, and chikungunya. Since there are no specific treatments for Zika virus and the other arboviruses mentioned above, it should be highlighted that the eco-friendly and effective control of mosquito vectors is of pivotal importance. Besides radiation, transgenic and symbiont-based mosquito control approaches, an effective option may be the employ of biological control agents of mosquito young instars, in presence of ultra-low quantities of green-synthesized nano-particles, which magnify their predation efficiency. Furthermore, behaviour-based control tools relying on the employ of swarming behaviour manipulation (i.e. the“lure and kill”approach), pheromone traps, sound traps need further research attention. In particular, detailed basic information on the physical and chemical cues routing mosquito swarming and mating dynamics is urgently required.

  10. Spread of Zika virus:The key role of mosquito vector control

    Institute of Scientific and Technical Information of China (English)

    Giovanni Benelli

    2016-01-01

    Mosquitoes(Diptera: Culicidae) represent a key threat for millions of humans and animals worldwide, since they act as vectors for important parasites and pathogens,including malaria, filariasis and a wide number of arboviruses. The recent outbreaks of Zika virus infections occurring in South America, Central America, and the Caribbean,represent the most recent four arrivals of important arboviruses in the western hemisphere, over the last 20 years, namely dengue, West Nile virus, and chikungunya. Since there are no specific treatments for Zika virus and the other arboviruses mentioned above,it should be highlighted that the eco-friendly and effective control of mosquito vectors is of pivotal importance. Besides radiation, transgenic and symbiont-based mosquito control approaches, an effective option may be the employ of biological control agents of mosquito young instars, in presence of ultra-low quantities of green-synthesized nanoparticles, which magnify their predation efficiency. Furthermore, behaviour-based control tools relying on the employ of swarming behaviour manipulation(i.e. the "lure and kill"approach), pheromone traps, sound traps need further research attention. In particular,detailed basic information on the physical and chemical cues routing mosquito swarming and mating dynamics is urgently required.

  11. Spread of Zika virus: The key role of mosquito vector control

    Directory of Open Access Journals (Sweden)

    Giovanni Benelli

    2016-06-01

    Full Text Available Mosquitoes (Diptera: Culicidae represent a key threat for millions of humans and animals worldwide, since they act as vectors for important parasites and pathogens, including malaria, filariasis and a wide number of arboviruses. The recent outbreaks of Zika virus infections occurring in South America, Central America, and the Caribbean, represent the most recent four arrivals of important arboviruses in the western hemisphere, over the last 20 years, namely dengue, West Nile virus, and chikungunya. Since there are no specific treatments for Zika virus and the other arboviruses mentioned above, it should be highlighted that the eco-friendly and effective control of mosquito vectors is of pivotal importance. Besides radiation, transgenic and symbiont-based mosquito control approaches, an effective option may be the employ of biological control agents of mosquito young instars, in presence of ultra-low quantities of green-synthesized nanoparticles, which magnify their predation efficiency. Furthermore, behaviour-based control tools relying on the employ of swarming behaviour manipulation (i.e. the “lure and kill” approach, pheromone traps, sound traps need further research attention. In particular, detailed basic information on the physical and chemical cues routing mosquito swarming and mating dynamics is urgently required.

  12. Bomb Threat Assessments. Fact Sheet

    Science.gov (United States)

    Tunkel, Ronald F.

    2010-01-01

    This information provides a brief, summary outline of how investigators should assess anonymous bomb threats at schools. Applying these principles may help administrators and law enforcement personnel accurately assess the viability and credibility of a threat and appropriately gauge their response. Any credible evidence provided by teachers or…

  13. Stereotype threat in classroom settings: the interactive effect of domain identification, task difficulty and stereotype threat on female students' maths performance.

    Science.gov (United States)

    Keller, Johannes

    2007-06-01

    Stereotype threat research revealed that negative stereotypes can disrupt the performance of persons targeted by such stereotypes. This paper contributes to stereotype threat research by providing evidence that domain identification and the difficulty level of test items moderate stereotype threat effects on female students' maths performance. The study was designed to test theoretical ideas derived from stereotype threat theory and assumptions outlined in the Yerkes-Dodson law proposing a nonlinear relationship between arousal, task difficulty and performance. Participants were 108 high school students attending secondary schools. Participants worked on a test comprising maths problems of different difficulty levels. Half of the participants learned that the test had been shown to produce gender differences (stereotype threat). The other half learned that the test had been shown not to produce gender differences (no threat). The degree to which participants identify with the domain of maths was included as a quasi-experimental factor. Maths-identified female students showed performance decrements under conditions of stereotype threat. Moreover, the stereotype threat manipulation had different effects on low and high domain identifiers' performance depending on test item difficulty. On difficult items, low identifiers showed higher performance under threat (vs. no threat) whereas the reverse was true in high identifiers. This interaction effect did not emerge on easy items. Domain identification and test item difficulty are two important factors that need to be considered in the attempt to understand the impact of stereotype threat on performance.

  14. Threats Management Throughout the Software Service Life-Cycle

    Directory of Open Access Journals (Sweden)

    Erlend Andreas Gjære

    2014-04-01

    Full Text Available Software services are inevitably exposed to a fluctuating threat picture. Unfortunately, not all threats can be handled only with preventive measures during design and development, but also require adaptive mitigations at runtime. In this paper we describe an approach where we model composite services and threats together, which allows us to create preventive measures at design-time. At runtime, our specification also allows the service runtime environment (SRE to receive alerts about active threats that we have not handled, and react to these automatically through adaptation of the composite service. A goal-oriented security requirements modelling tool is used to model business-level threats and analyse how they may impact goals. A process flow modelling tool, utilising Business Process Model and Notation (BPMN and standard error boundary events, allows us to define how threats should be responded to during service execution on a technical level. Throughout the software life-cycle, we maintain threats in a centralised threat repository. Re-use of these threats extends further into monitoring alerts being distributed through a cloud-based messaging service. To demonstrate our approach in practice, we have developed a proof-of-concept service for the Air Traffic Management (ATM domain. In addition to the design-time activities, we show how this composite service duly adapts itself when a service component is exposed to a threat at runtime.

  15. Stereotype threat can reduce older adults' memory errors.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-01-01

    Stereotype threat often incurs the cost of reducing the amount of information that older adults accurately recall. In the current research, we tested whether stereotype threat can also benefit memory. According to the regulatory focus account of stereotype threat, threat induces a prevention focus in which people become concerned with avoiding errors of commission and are sensitive to the presence or absence of losses within their environment. Because of this, we predicted that stereotype threat might reduce older adults' memory errors. Results were consistent with this prediction. Older adults under stereotype threat had lower intrusion rates during free-recall tests (Experiments 1 and 2). They also reduced their false alarms and adopted more conservative response criteria during a recognition test (Experiment 2). Thus, stereotype threat can decrease older adults' false memories, albeit at the cost of fewer veridical memories, as well.

  16. Versatile generation of optical vector fields and vector beams using a non-interferometric approach.

    Science.gov (United States)

    Tripathi, Santosh; Toussaint, Kimani C

    2012-05-07

    We present a versatile, non-interferometric method for generating vector fields and vector beams which can produce all the states of polarization represented on a higher-order Poincaré sphere. The versatility and non-interferometric nature of this method is expected to enable exploration of various exotic properties of vector fields and vector beams. To illustrate this, we study the propagation properties of some vector fields and find that, in general, propagation alters both their intensity and polarization distribution, and more interestingly, converts some vector fields into vector beams. In the article, we also suggest a modified Jones vector formalism to represent vector fields and vector beams.

  17. Stereotype Threat, Test Anxiety, and Mathematics Performance

    Science.gov (United States)

    Tempel, Tobias; Neumann, Roland

    2014-01-01

    We investigated the combined effects of stereotype threat and trait test anxiety on mathematics test performance. Stereotype threat and test anxiety interacted with each other in affecting performance. Trait test anxiety predicted performance only in a diagnostic condition that prevented stereotype threat by stereotype denial. A state measure of…

  18. Biological Control Strategies for Mosquito Vectors of Arboviruses.

    Science.gov (United States)

    Huang, Yan-Jang S; Higgs, Stephen; Vanlandingham, Dana L

    2017-02-10

    Historically, biological control utilizes predatory species and pathogenic microorganisms to reduce the population of mosquitoes as disease vectors. This is particularly important for the control of mosquito-borne arboviruses, which normally do not have specific antiviral therapies available. Although development of resistance is likely, the advantages of biological control are that the resources used are typically biodegradable and ecologically friendly. Over the past decade, the advancement of molecular biology has enabled optimization by the manipulation of genetic materials associated with biological control agents. Two significant advancements are the discovery of cytoplasmic incompatibility induced by Wolbachia bacteria, which has enhanced replacement programs, and the introduction of dominant lethal genes into local mosquito populations through the release of genetically modified mosquitoes. As various arboviruses continue to be significant public health threats, biological control strategies have evolved to be more diverse and become critical tools to reduce the disease burden of arboviruses.

  19. Protecting against cyber threats in networked information systems

    Science.gov (United States)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  20. The threat of male-to-female erotic transference.

    Science.gov (United States)

    Celenza, Andrea

    2006-01-01

    Vignettes from an ongoing psychoanalysis with a patient, Michael, are presented to illustrate the various dimensions of the erotic transference at different phases of the treatment. The relation to power, the experience and expression of aggression, how these may be organized by gender, and the female analyst's countertransference are discussed as potentially fostering or inhibitory in the development of an erotic transference. Traditional sociocultural gender stereotypes kept alive in fantasy can cause female analysts to subtly foreclose the impending threat of an intense erotic transference with male analysands due to a fear of outwardly directed male aggression. It is suggested that the maternal/containing transference can be unconsciously fostered by both analyst and analysand to defensively avoid expression of the aggressivized erotic transference in its full intensity. Similarities and differences in cases of sexual boundary violations with opposite-gender pairings are discussed.

  1. 49 CFR 1544.303 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1544.303 Section 1544... AND COMMERCIAL OPERATORS Threat and Threat Response § 1544.303 Bomb or air piracy threats. (a) Flight.... (d) Notification. Upon receipt of any bomb threat against the security of a flight or facility, or...

  2. Vectorized Monte Carlo

    International Nuclear Information System (INIS)

    Brown, F.B.

    1981-01-01

    Examination of the global algorithms and local kernels of conventional general-purpose Monte Carlo codes shows that multigroup Monte Carlo methods have sufficient structure to permit efficient vectorization. A structured multigroup Monte Carlo algorithm for vector computers is developed in which many particle events are treated at once on a cell-by-cell basis. Vectorization of kernels for tracking and variance reduction is described, and a new method for discrete sampling is developed to facilitate the vectorization of collision analysis. To demonstrate the potential of the new method, a vectorized Monte Carlo code for multigroup radiation transport analysis was developed. This code incorporates many features of conventional general-purpose production codes, including general geometry, splitting and Russian roulette, survival biasing, variance estimation via batching, a number of cutoffs, and generalized tallies of collision, tracklength, and surface crossing estimators with response functions. Predictions of vectorized performance characteristics for the CYBER-205 were made using emulated coding and a dynamic model of vector instruction timing. Computation rates were examined for a variety of test problems to determine sensitivities to batch size and vector lengths. Significant speedups are predicted for even a few hundred particles per batch, and asymptotic speedups by about 40 over equivalent Amdahl 470V/8 scalar codes arepredicted for a few thousand particles per batch. The principal conclusion is that vectorization of a general-purpose multigroup Monte Carlo code is well worth the significant effort required for stylized coding and major algorithmic changes

  3. Stereotype threat affects financial decision making.

    Science.gov (United States)

    Carr, Priyanka B; Steele, Claude M

    2010-10-01

    The research presented in this article provides the first evidence that one's decision making can be influenced by concerns about stereotypes and the devaluation of one's identity. Many studies document gender differences in decision making, and often attribute these differences to innate and stable factors, such as biological and hormonal differences. In three studies, we found that stereotype threat affected decision making and led to gender differences in loss-aversion and risk-aversion behaviors. In Study 1, women subjected to stereotype threat in academic and business settings were more loss averse than both men and women who were not facing the threat of being viewed in light of negative stereotypes. We found no gender differences in loss-aversion behavior in the absence of stereotype threat. In Studies 2a and 2b, we found the same pattern of effects for risk-aversion behavior that we had observed for loss-aversion behavior. In addition, in Study 2b, ego depletion mediated the effects of stereotype threat on women's decision making. These results suggest that individuals' decision making can be influenced by stereotype concerns.

  4. EMMA: An Extensible Mammalian Modular Assembly Toolkit for the Rapid Design and Production of Diverse Expression Vectors.

    Science.gov (United States)

    Martella, Andrea; Matjusaitis, Mantas; Auxillos, Jamie; Pollard, Steven M; Cai, Yizhi

    2017-07-21

    Mammalian plasmid expression vectors are critical reagents underpinning many facets of research across biology, biomedical research, and the biotechnology industry. Traditional cloning methods often require laborious manual design and assembly of plasmids using tailored sequential cloning steps. This process can be protracted, complicated, expensive, and error-prone. New tools and strategies that facilitate the efficient design and production of bespoke vectors would help relieve a current bottleneck for researchers. To address this, we have developed an extensible mammalian modular assembly kit (EMMA). This enables rapid and efficient modular assembly of mammalian expression vectors in a one-tube, one-step golden-gate cloning reaction, using a standardized library of compatible genetic parts. The high modularity, flexibility, and extensibility of EMMA provide a simple method for the production of functionally diverse mammalian expression vectors. We demonstrate the value of this toolkit by constructing and validating a range of representative vectors, such as transient and stable expression vectors (transposon based vectors), targeting vectors, inducible systems, polycistronic expression cassettes, fusion proteins, and fluorescent reporters. The method also supports simple assembly combinatorial libraries and hierarchical assembly for production of larger multigenetic cargos. In summary, EMMA is compatible with automated production, and novel genetic parts can be easily incorporated, providing new opportunities for mammalian synthetic biology.

  5. Vector Network Coding

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L X L coding matrices that play a similar role as coding coefficients in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector co...

  6. A simple method of equine limb force vector analysis and its potential applications.

    Science.gov (United States)

    Hobbs, Sarah Jane; Robinson, Mark A; Clayton, Hilary M

    2018-01-01

    Ground reaction forces (GRF) measured during equine gait analysis are typically evaluated by analyzing discrete values obtained from continuous force-time data for the vertical, longitudinal and transverse GRF components. This paper describes a simple, temporo-spatial method of displaying and analyzing sagittal plane GRF vectors. In addition, the application of statistical parametric mapping (SPM) is introduced to analyse differences between contra-lateral fore and hindlimb force-time curves throughout the stance phase. The overall aim of the study was to demonstrate alternative methods of evaluating functional (a)symmetry within horses. GRF and kinematic data were collected from 10 horses trotting over a series of four force plates (120 Hz). The kinematic data were used to determine clean hoof contacts. The stance phase of each hoof was determined using a 50 N threshold. Vertical and longitudinal GRF for each stance phase were plotted both as force-time curves and as force vector diagrams in which vectors originating at the centre of pressure on the force plate were drawn at intervals of 8.3 ms for the duration of stance. Visual evaluation was facilitated by overlay of the vector diagrams for different limbs. Summary vectors representing the magnitude (VecMag) and direction (VecAng) of the mean force over the entire stance phase were superimposed on the force vector diagram. Typical measurements extracted from the force-time curves (peak forces, impulses) were compared with VecMag and VecAng using partial correlation (controlling for speed). Paired samples t -tests (left v. right diagonal pair comparison and high v. low vertical force diagonal pair comparison) were performed on discrete and vector variables using traditional methods and Hotelling's T 2 tests on normalized stance phase data using SPM. Evidence from traditional statistical tests suggested that VecMag is more influenced by the vertical force and impulse, whereas VecAng is more influenced by the

  7. Cyber threats within civil aviation

    Science.gov (United States)

    Heitner, Kerri A.

    Existing security policies in civil aviation do not adequately protect against evolving cyber threats. Cybersecurity has been recognized as a top priority among some aviation industry leaders. Heightened concerns regarding cyber threats and vulnerabilities surround components utilized in compliance with the Federal Aviation Administration's (FAA) Next Generation Air Transportation (NextGen) implementation. Automated Dependent Surveillance-B (ADS-B) and Electronic Flight Bags (EFB) have both been exploited through the research of experienced computer security professionals. Civil aviation is essential to international infrastructure and if its critical assets were compromised, it could pose a great risk to public safety and financial infrastructure. The purpose of this research was to raise awareness of aircraft system vulnerabilities in order to provoke change among current national and international cybersecurity policies, procedures and standards. Although the education of cyber threats is increasing in the aviation industry, there is not enough urgency when creating cybersecurity policies. This project intended to answer the following questions: What are the cyber threats to ADS-B of an aircraft in-flight? What are the cyber threats to EFB? What is the aviation industry's response to the issue of cybersecurity and in-flight safety? ADS-B remains unencrypted while the FAA's mandate to implement this system is rapidly approaching. The cyber threat of both portable and non-portable EFB's have received increased publicity, however, airlines are not responding quick enough (if at all) to create policies for the use of these devices. Collectively, the aviation industry is not being proactive enough to protect its aircraft or airport network systems. That is not to say there are not leaders in cybersecurity advancement. These proactive organizations must set the standard for the future to better protect society and it's most reliable form of transportation.

  8. Vector independent transmission of the vector-borne bluetongue virus.

    Science.gov (United States)

    van der Sluijs, Mirjam Tineke Willemijn; de Smit, Abraham J; Moormann, Rob J M

    2016-01-01

    Bluetongue is an economically important disease of ruminants. The causative agent, Bluetongue virus (BTV), is mainly transmitted by insect vectors. This review focuses on vector-free BTV transmission, and its epizootic and economic consequences. Vector-free transmission can either be vertical, from dam to fetus, or horizontal via direct contract. For several BTV-serotypes, vertical (transplacental) transmission has been described, resulting in severe congenital malformations. Transplacental transmission had been mainly associated with live vaccine strains. Yet, the European BTV-8 strain demonstrated a high incidence of transplacental transmission in natural circumstances. The relevance of transplacental transmission for the epizootiology is considered limited, especially in enzootic areas. However, transplacental transmission can have a substantial economic impact due to the loss of progeny. Inactivated vaccines have demonstrated to prevent transplacental transmission. Vector-free horizontal transmission has also been demonstrated. Since direct horizontal transmission requires close contact of animals, it is considered only relevant for within-farm spreading of BTV. The genetic determinants which enable vector-free transmission are present in virus strains circulating in the field. More research into the genetic changes which enable vector-free transmission is essential to better evaluate the risks associated with outbreaks of new BTV serotypes and to design more appropriate control measures.

  9. GLOBAL WARMING: IS A NEW THREAT?

    Energy Technology Data Exchange (ETDEWEB)

    Ayca Eminoglu

    2008-09-30

    In the Post Cold War era, the concepts of ''security'', ''national security'', and ''international security'' have changed with regard to their contents and meanings. Such developments made states to renew their national security policies. Security is a special form of politics as well. All security issues are political problems but not all political conflicts are security issues. In the Post Cold War era, differentiating and increasing numbers of elements that constitutes threat changed the concept of threat and widen the capacity of security. In this term, many elements lost its effect of being a threat but also new threatening elements emerged. Environmental problems, human rights, mass migration, micro nationalism, ethnic conflicts, religious fundamentalism, contagious diseases, international terrorism, economic instabilities, drug and weapon smuggling and human trafficking are the new problems emerged in international security agenda. Environmental problems no longer take place in security issues and can be mentioned as a ''low security'' issue. They are threats to the global commons i.e. the oceans, the seas, the ozone layer and the climate system, which are life supports for mankind as a whole. Global warming is one of the most important environmental issues of our day that effects human life in every field and can be defined as a 'serious threat to international security'. Because of global warming, environmental changes will occur and these changes will cause conflicting issues in international relations. Because of global warming dwindling freshwater supplies, food shortages, political instability and other conflicts may take place. Some IR scholars see a need for global cooperation in order to face the threat. At the background of global warming and its effects, states have to get preventive measures and normally, each state form its own measures, therefore as a

  10. Cyber Threats to Nuclear Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  11. Cyber Threats to Nuclear Infrastructures

    International Nuclear Information System (INIS)

    Anderson, Robert S.; Moskowitz, Paul; Schanfein, Mark; Bjornard, Trond; St. Michel, Curtis

    2010-01-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  12. Twin Support Vector Machine: A review from 2007 to 2014

    Directory of Open Access Journals (Sweden)

    Divya Tomar

    2015-03-01

    Full Text Available Twin Support Vector Machine (TWSVM is an emerging machine learning method suitable for both classification and regression problems. It utilizes the concept of Generalized Eigen-values Proximal Support Vector Machine (GEPSVM and finds two non-parallel planes for each class by solving a pair of Quadratic Programming Problems. It enhances the computational speed as compared to the traditional Support Vector Machine (SVM. TWSVM was initially constructed to solve binary classification problems; later researchers successfully extended it for multi-class problem domain. TWSVM always gives promising empirical results, due to which it has many attractive features which enhance its applicability. This paper presents the research development of TWSVM in recent years. This study is divided into two main broad categories - variant based and multi-class based TWSVM methods. The paper primarily discusses the basic concept of TWSVM and highlights its applications in recent years. A comparative analysis of various research contributions based on TWSVM is also presented. This is helpful for researchers to effectively utilize the TWSVM as an emergent research methodology and encourage them to work further in the performance enhancement of TWSVM.

  13. Comparative Visualization of Vector Field Ensembles Based on Longest Common Subsequence

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Richen; Guo, Hanqi; Zhang, Jiang; Yuan, Xiaoru

    2016-04-19

    We propose a longest common subsequence (LCS) based approach to compute the distance among vector field ensembles. By measuring how many common blocks the ensemble pathlines passing through, the LCS distance defines the similarity among vector field ensembles by counting the number of sharing domain data blocks. Compared to the traditional methods (e.g. point-wise Euclidean distance or dynamic time warping distance), the proposed approach is robust to outlier, data missing, and sampling rate of pathline timestep. Taking the advantages of smaller and reusable intermediate output, visualization based on the proposed LCS approach revealing temporal trends in the data at low storage cost, and avoiding tracing pathlines repeatedly. Finally, we evaluate our method on both synthetic data and simulation data, which demonstrate the robustness of the proposed approach.

  14. Threat Assessment in College Settings

    Science.gov (United States)

    Cornell, Dewey

    2010-01-01

    In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…

  15. How you perceive threat determines your behavior

    Directory of Open Access Journals (Sweden)

    Orlando Fernandes Junior

    2013-10-01

    Full Text Available The prioritization of processing emotional stimuli usually produces deleterious effects on task performance when it distracts from a task. One common explanation is that brain resources are consumed by emotional stimuli, diverting resources away from executing the task. Viewing unpleasant stimuli also generates defensive reactions, and these responses may be at least partially responsible for the effect of the emotional modulation observed in various reaction time (RT paradigms. We investigated whether modulatory effects on RT vary if we presented threat stimuli to prompt different defensive responses. To trigger different responses, we manipulated threat perception by moving the direction of threatening stimuli. Threatening or neutral stimuli were presented as distractors during a bar orientation discrimination task. The results demonstrated that threat stimuli directed towards the observer produced a decrease in RT; in contrast, threat stimuli directed away from the observer produced an increase in RT, when compared to neutral stimuli. Accelerated RT during direct threat stimuli was attributed to increased motor preparation resulting from strong activation of the defense response cascade. In contrast, no direct threat stimuli likely activated the defense cascade, but less intensively, prompting immobility. Different threat stimuli produced varying effects, which was interpreted as evidence that the modulation of RT by emotional stimuli represents the summation of attentional and motivational effects. Additionally, participants who had been previously exposed to diverse types of violent crime were more strongly influenced by direct threat stimuli. In sum, our data support the concept that emotions are indeed action tendencies.

  16. Single-cycle adenovirus vectors in the current vaccine landscape.

    Science.gov (United States)

    Barry, Michael

    2018-02-01

    Traditional inactivated and protein vaccines generate strong antibodies, but struggle to generate T cell responses. Attenuated pathogen vaccines generate both, but risk causing the disease they aim to prevent. Newer gene-based vaccines drive both responses and avoid the risk of infection. While these replication-defective (RD) vaccines work well in small animals, they can be weak in humans because they do not replicate antigen genes like more potent replication-competent (RC) vaccines. RC vaccines generate substantially stronger immune responses, but also risk causing their own infections. To circumvent these problems, we developed single-cycle adenovirus (SC-Ad) vectors that amplify vaccine genes, but that avoid the risk of infection. This review will discuss these vectors and their prospects for use as vaccines. Areas covered: This review provides a background of different types of vaccines. The benefits of gene-based vaccines and their ability to replicate antigen genes are described. Adenovirus vectors are discussed and compared to other vaccine types. Replication-defective, single-cycle, and replication-competent Ad vaccines are compared. Expert commentary: The potential utility of these vaccines are discussed when used against infectious diseases and as cancer vaccines. We propose a move away from replication-defective vaccines towards more robust replication-competent or single-cycle vaccines.

  17. VectorBase

    Data.gov (United States)

    U.S. Department of Health & Human Services — VectorBase is a Bioinformatics Resource Center for invertebrate vectors. It is one of four Bioinformatics Resource Centers funded by NIAID to provide web-based...

  18. Custodial vector model

    DEFF Research Database (Denmark)

    Becciolini, Diego; Franzosi, Diogo Buarque; Foadi, Roshan

    2015-01-01

    We analyze the Large Hadron Collider (LHC) phenomenology of heavy vector resonances with a $SU(2)_L\\times SU(2)_R$ spectral global symmetry. This symmetry partially protects the electroweak S-parameter from large contributions of the vector resonances. The resulting custodial vector model spectrum...

  19. International network for capacity building for the control of emerging viral vector-borne zoonotic diseases: ARBO-ZOONET.

    Science.gov (United States)

    Ahmed, J; Bouloy, M; Ergonul, O; Fooks, Ar; Paweska, J; Chevalier, V; Drosten, C; Moormann, R; Tordo, N; Vatansever, Z; Calistri, P; Estrada-Pena, A; Mirazimi, A; Unger, H; Yin, H; Seitzer, U

    2009-03-26

    Arboviruses are arthropod-borne viruses, which include West Nile fever virus (WNFV), a mosquito-borne virus, Rift Valley fever virus (RVFV), a mosquito-borne virus, and Crimean-Congo haemorrhagic fever virus (CCHFV), a tick-borne virus. These arthropod-borne viruses can cause disease in different domestic and wild animals and in humans, posing a threat to public health because of their epidemic and zoonotic potential. In recent decades, the geographical distribution of these diseases has expanded. Outbreaks of WNF have already occurred in Europe, especially in the Mediterranean basin. Moreover, CCHF is endemic in many European countries and serious outbreaks have occurred, particularly in the Balkans, Turkey and Southern Federal Districts of Russia. In 2000, RVF was reported for the first time outside the African continent, with cases being confirmed in Saudi Arabia and Yemen. This spread was probably caused by ruminant trade and highlights that there is a threat of expansion of the virus into other parts of Asia and Europe. In the light of global warming and globalisation of trade and travel, public interest in emerging zoonotic diseases has increased. This is especially evident regarding the geographical spread of vector-borne diseases. A multi-disciplinary approach is now imperative, and groups need to collaborate in an integrated manner that includes vector control, vaccination programmes, improved therapy strategies, diagnostic tools and surveillance, public awareness, capacity building and improvement of infrastructure in endemic regions.

  20. Information security practices emerging threats and perspectives

    CERN Document Server

    Awad, Ahmed; Woungang, Isaac

    2017-01-01

    This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners. .

  1. Experimental demonstration of vector E x vector B plasma divertor

    International Nuclear Information System (INIS)

    Strait, E.J.; Kerst, D.W.; Sprott, J.C.

    1977-01-01

    The vector E x vector B drift due to an applied radial electric field in a tokamak with poloidal divertor can speed the flow of plasma out of the scrape-off region, and provide a means of externally controlling the flow rate and thus the width of the density fall-off. An experiment in the Wisconsin levitated toroidal octupole, using vector E x vector B drifts alone, demonstrates divertor-like behavior, including 70% reduction of plasma density near the wall and 40% reduction of plasma flux to the wall, with no adverse effects on confinement of the main plasma

  2. The impact of threat and cognitive stress on speech motor control in people who stutter.

    Science.gov (United States)

    Lieshout, Pascal van; Ben-David, Boaz; Lipski, Melinda; Namasivayam, Aravind

    2014-06-01

    In the present study, an Emotional Stroop and Classical Stroop task were used to separate the effect of threat content and cognitive stress from the phonetic features of words on motor preparation and execution processes. A group of 10 people who stutter (PWS) and 10 matched people who do not stutter (PNS) repeated colour names for threat content words and neutral words, as well as for traditional Stroop stimuli. Data collection included speech acoustics and movement data from upper lip and lower lip using 3D EMA. PWS in both tasks were slower to respond and showed smaller upper lip movement ranges than PNS. For the Emotional Stroop task only, PWS were found to show larger inter-lip phase differences compared to PNS. General threat words were executed with faster lower lip movements (larger range and shorter duration) in both groups, but only PWS showed a change in upper lip movements. For stutter specific threat words, both groups showed a more variable lip coordination pattern, but only PWS showed a delay in reaction time compared to neutral words. Individual stuttered words showed no effects. Both groups showed a classical Stroop interference effect in reaction time but no changes in motor variables. This study shows differential motor responses in PWS compared to controls for specific threat words. Cognitive stress was not found to affect stuttering individuals differently than controls or that its impact spreads to motor execution processes. After reading this article, the reader will be able to: (1) discuss the importance of understanding how threat content influences speech motor control in people who stutter and non-stuttering speakers; (2) discuss the need to use tasks like the Emotional Stroop and Regular Stroop to separate phonetic (word-bound) based impact on fluency from other factors in people who stutter; and (3) describe the role of anxiety and cognitive stress on speech motor processes. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. An Examination of Age-Based Stereotype Threat About Cognitive Decline.

    Science.gov (United States)

    Barber, Sarah J

    2017-01-01

    "Stereotype threat" is often thought of as a singular construct, with moderators and mechanisms that are stable across groups and domains. However, this is not always true. To illustrate this, the current review focuses on the stereotype threat that older adults face about their cognitive abilities. Drawing upon the multithreat framework, I first provide evidence that this is a self-concept threat and not a group-reputation threat. Because this differs from the forms of stereotype threat experienced by other groups (e.g., the threat that minority students face about their intellectual abilities), the moderators of stereotype threat observed in other groups (i.e., group identification) do not always generalize to age-based stereotype threat about cognitive decline. Looking beyond the forms of stereotype threat elicited, this review also provides evidence that the mechanisms underlying stereotype-threat effects may vary across the adult life span. Because of age-related improvements in emotion-regulation abilities, stereotype threat does not seem to reduce older adults' executive-control resources. Overall, this review highlights the need to approach the concept of stereotype threat with more granularity, allowing researchers to design more effective stereotype-threat interventions. It will also shed light on why certain stereotype threat effects "fail to replicate" across domains or groups.

  4. Temporo-spatial distribution of insecticide-resistance in Indian malaria vectors in the last quarter-century: Need for regular resistance monitoring and management.

    Science.gov (United States)

    Raghavendra, Kamaraju; Velamuri, Poonam Sharma; Verma, Vaishali; Elamathi, Natarajan; Barik, Tapan Kumar; Bhatt, Rajendra Mohan; Dash, Aditya Prasad

    2017-01-01

    The Indian vector control programme similar to other programmes in the world is still reliant on chemical insecticides. Anopheles culicifacies is the major vector out of six primary malaria vectors in India and alone contributes about 2/3 malaria cases annually; and per se its control is actually control of malaria in India. For effective management of vectors, current information on their susceptibility status to different insecticides is essential. In this review, an attempt was made to compile and present the available data on the susceptibility status of different malaria vector species in India from the last 2.5 decades. Literature search was conducted by different means mainly web and library search; susceptibility data was collated from 62 sources for the nine malaria vector species from 145 districts in 21 states and two union territories between 1991 and 2016. Interpretation of the susceptibility/resistance status was made on basis of the recent WHO criteria. Comprehensive analysis of the data indicated that An. culicifacies, a major vector species was resistant to at least one insecticide in 70% (101/145) of the districts. It was reported mostly resistant to DDT and malathion whereas, its resistant status against deltamethrin varied across the districts. The major threat for the malaria control programmes is multiple-insecticide-resistance in An. culicifacies which needs immediate attention for resistance management in order to sustain the gains achieved so far, as the programmes have targeted malaria elimination by 2030.

  5. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  6. Rotations with Rodrigues' vector

    International Nuclear Information System (INIS)

    Pina, E

    2011-01-01

    The rotational dynamics was studied from the point of view of Rodrigues' vector. This vector is defined here by its connection with other forms of parametrization of the rotation matrix. The rotation matrix was expressed in terms of this vector. The angular velocity was computed using the components of Rodrigues' vector as coordinates. It appears to be a fundamental matrix that is used to express the components of the angular velocity, the rotation matrix and the angular momentum vector. The Hamiltonian formalism of rotational dynamics in terms of this vector uses the same matrix. The quantization of the rotational dynamics is performed with simple rules if one uses Rodrigues' vector and similar formal expressions for the quantum operators that mimic the Hamiltonian classical dynamics.

  7. Viral vectors for production of recombinant proteins in plants.

    Science.gov (United States)

    Lico, Chiara; Chen, Qiang; Santi, Luca

    2008-08-01

    Global demand for recombinant proteins has steadily accelerated for the last 20 years. These recombinant proteins have a wide range of important applications, including vaccines and therapeutics for human and animal health, industrial enzymes, new materials and components of novel nano-particles for various applications. The majority of recombinant proteins are produced by traditional biological "factories," that is, predominantly mammalian and microbial cell cultures along with yeast and insect cells. However, these traditional technologies cannot satisfy the increasing market demand due to prohibitive capital investment requirements. During the last two decades, plants have been under intensive investigation to provide an alternative system for cost-effective, highly scalable, and safe production of recombinant proteins. Although the genetic engineering of plant viral vectors for heterologous gene expression can be dated back to the early 1980s, recent understanding of plant virology and technical progress in molecular biology have allowed for significant improvements and fine tuning of these vectors. These breakthroughs enable the flourishing of a variety of new viral-based expression systems and their wide application by academic and industry groups. In this review, we describe the principal plant viral-based production strategies and the latest plant viral expression systems, with a particular focus on the variety of proteins produced and their applications. We will summarize the recent progress in the downstream processing of plant materials for efficient extraction and purification of recombinant proteins. (c) 2008 Wiley-Liss, Inc.

  8. GNSS Single Frequency, Single Epoch Reliable Attitude Determination Method with Baseline Vector Constraint

    Directory of Open Access Journals (Sweden)

    Ang Gong

    2015-12-01

    Full Text Available For Global Navigation Satellite System (GNSS single frequency, single epoch attitude determination, this paper proposes a new reliable method with baseline vector constraint. First, prior knowledge of baseline length, heading, and pitch obtained from other navigation equipment or sensors are used to reconstruct objective function rigorously. Then, searching strategy is improved. It substitutes gradually Enlarged ellipsoidal search space for non-ellipsoidal search space to ensure correct ambiguity candidates are within it and make the searching process directly be carried out by least squares ambiguity decorrelation algorithm (LAMBDA method. For all vector candidates, some ones are further eliminated by derived approximate inequality, which accelerates the searching process. Experimental results show that compared to traditional method with only baseline length constraint, this new method can utilize a priori baseline three-dimensional knowledge to fix ambiguity reliably and achieve a high success rate. Experimental tests also verify it is not very sensitive to baseline vector error and can perform robustly when angular error is not great.

  9. Violation of vector dominance in the vector manifestation

    International Nuclear Information System (INIS)

    Sasaki, Chihiro

    2003-01-01

    The vector manifestation (VM) is a new pattern for realizing the chiral symmetry in QCD. In the VM, the massless vector meson becomes the chiral partner of pion at the critical point, in contrast with the restoration based on the linear sigma model. Including the intrinsic temperature dependences of the parameters of the hidden local symmetry (HLS) Lagrangian determined from the underlying QCD through the Wilsonian matching together with the hadronic thermal corrections, we present a new prediction of the VM on the direct photon-π-π coupling which measures the validity of the vector dominance (VD) of the electromagnetic form factor of the pion. We find that the VD is largely violated at the critical temperature, which indicates that the assumption of the VD made in several analysis on the dilepton spectra in hot matter may need to be weakened for consistently including the effect of the dropping mass of the vector meson. (author)

  10. Energy Systems in the Era of Energy Vectors A Key to Define, Analyze and Design Energy Systems Beyond Fossil Fuels

    CERN Document Server

    Orecchini, Fabio

    2012-01-01

    What lies beyond the era of fossil fuels? While most answers focus on different primary energy resources, Energy Systems in the Era of Energy Vectors provides a completely new approach. Instead of providing a traditional consumption analysis of classical primary energy resources such as oil, coal, nuclear power and gas, Energy Systems in the Era of Energy Vectors describes and assesses energy technologies, markets and future strategies, focusing on their capacity to produce, exchange, and use energy vectors. Special attention is given to the renewable energy resources available in different areas of the world and made exploitable by the integration of energy vectors in the global energy system. Clear definitions of energy vectors and energy systems are used as the basis for a complete explanation and assessment of up-to-date, available technologies for energy resources, transport and storage systems, conversion and use. The energy vectors scheme allows the potential realisation of a worldwide sustainable ener...

  11. The nuclear threat and the Nuclear Threat Initiative

    International Nuclear Information System (INIS)

    Curtis, Charles

    2001-01-01

    Full text: President and chief operating officer of the Nuclear Threat Initiative (NTI), was invited by the IAEA Director General to speak about NTI and its mission at the IAEA Safeguards Symposium. Established by CNN founder Ted Turner and former U.S. Senator Sam Nunn, NTI is a charitable organization working to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological and chemical weapons. The foundation is global, concentrating not just on the United States, Russia, and other nations of the former Soviet Union, but also on those regions of greatest proliferation concern in Asia and the Middle East. NTI is working to close what it perceives as an increasingly dangerous gap between the threat from nuclear, biological and chemical weapons and the global response. NTI is supported by a pledge from Mr. Turner of at least $250 million over five years, among the largest sums any private individual has ever invested in these security issues. NTI's Board of Directors, an international team of experienced and knowledgeable experts, determines the overall direction of the foundation. (author)

  12. Adenovirus-Vectored Vaccine as a Rapid-Response Tool Against Avian Influenza Pandemic

    International Nuclear Information System (INIS)

    Van Kampen, K. R.; Tang, D. C.

    2007-01-01

    Influenza viruses in nature undergo genetic mutation and reassortment. Three pandemics of avian influenza in man were recorded in the twentieth century. Highly pathogenic avian influenza (HPAI) viruses currently in circulation pose a threat for another world-wide pandemic, if they become transmissible from man to man. Manufacturing protective vaccines using current egg-based technology is often difficult due to the virulence of the virus and its adverse effects on the embryonating egg substrate. New technologies allow the creation of safe and protective pandemic influenza vaccines without the need for egg based substrates. These technologies allow new vaccines to be created in less than one month. Manufacturing is in tissue culture, not eggs. Vaccine can be administered to man non-invasively, without adjuvants, eliciting a rapid and protective immune response. Protective immunity against avian influenza (AI) virus was elicited in chickens by single-dose in ovo vaccination with a replication-competent adenovirus (RCA)-free human adenovirus serotype 5 (Ad5)-derived vector encoding an H5N9 avian influenza virus hemagglutinin. Vaccinated chickens were protected against both H5N1 and H5N2 HPAI virus challenges. Mass-administration of this bird flu vaccine can be streamlined with available robotic in ovo injectors. Vaccination using this vaccine could protect the the largest host reservoir (chickens) and greatly reduce the exposure of man to avian influenza. In addition, Ad5-vectored vaccines can be produced rapidly and the safety margin of a non-replicating vector is superior to that of a replicating counterpart. Furthermore, this mode of vaccination is compatible with epidemiological surveys of natural AI virus infections. In addition to mass immunization of poultry, both animals and humans have been effectively immunized by intranasal administration of Ad5-vectored influenza vaccines without any appreciable side effects, even in mice and human volunteers with

  13. Airborne Particulate Threat Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our

  14. [Applications of platelets in studies on traditional Chinese medicines promoting blood circulation to remove blood stasis].

    Science.gov (United States)

    Wang, Feng-Qin; Chen, Cen; Xia, Zhi-Ning; Yang, Feng-Qing

    2014-08-01

    Thrombotic diseases in different forms become a great threat to human health. Such anti-platelet aggregation drugs as aspirin and clopidogrel are common drugs in clinic. However, along with the appearance of resistance and side effects of western anti-platelet aggregation drugs, anti-platelet aggregation traditional Chinese medicines promoting blood circulation to remove blood stasis have gradually become an important study orientation. Platelet is one of major participant in thrombosis, and plays an important role as a bioactive material in studies on traditional Chinese medicines promoting blood circulation to remove blood stasis, mainly involving two aspects--the evaluation for the anti-platelet aggregation activity of traditional Chinese medicines and the screening of their active components. This paper summarized the applications of platelets in studies on traditional Chinese medicines promoting blood circulation to remove blood stasis, so as to provide basis for further studies.

  15. Measurement of K/sub NN/, K/sub LL/ in p vector d → n vector X and p vector 9Be → n vector X at 800 MeV

    International Nuclear Information System (INIS)

    Riley, P.J.; Hollas, C.L.; Newsom, C.R.

    1980-01-01

    The spin transfer parameters, K/sub NN/ and K/sub LL/, have been measured in p vector d → n vector X and p vector 9 Be → n vector X at 0 0 and 800 MeV. The rather large values of K/sub LL/ demonstrate that this transfer mechanism will provide a useful source of polarized neutrons at LAMPF energies

  16. Biological Control Strategies for Mosquito Vectors of Arboviruses

    Directory of Open Access Journals (Sweden)

    Yan-Jang S. Huang

    2017-02-01

    Full Text Available Historically, biological control utilizes predatory species and pathogenic microorganisms to reduce the population of mosquitoes as disease vectors. This is particularly important for the control of mosquito-borne arboviruses, which normally do not have specific antiviral therapies available. Although development of resistance is likely, the advantages of biological control are that the resources used are typically biodegradable and ecologically friendly. Over the past decade, the advancement of molecular biology has enabled optimization by the manipulation of genetic materials associated with biological control agents. Two significant advancements are the discovery of cytoplasmic incompatibility induced by Wolbachia bacteria, which has enhanced replacement programs, and the introduction of dominant lethal genes into local mosquito populations through the release of genetically modified mosquitoes. As various arboviruses continue to be significant public health threats, biological control strategies have evolved to be more diverse and become critical tools to reduce the disease burden of arboviruses.

  17. Raster images vectorization system

    OpenAIRE

    Genytė, Jurgita

    2006-01-01

    The problem of raster images vectorization was analyzed and researched in this work. Existing vectorization systems are quite expensive, the results are inaccurate, and the manual vectorization of a large number of drafts is impossible. That‘s why our goal was to design and develop a new raster images vectorization system using our suggested automatic vectorization algorithm and the way to record results in a new universal vectorial file format. The work consists of these main parts: analysis...

  18. Vectorization of phase space Monte Carlo code in FACOM vector processor VP-200

    International Nuclear Information System (INIS)

    Miura, Kenichi

    1986-01-01

    This paper describes the vectorization techniques for Monte Carlo codes in Fujitsu's Vector Processor System. The phase space Monte Carlo code FOWL is selected as a benchmark, and scalar and vector performances are compared. The vectorized kernel Monte Carlo routine which contains heavily nested IF tests runs up to 7.9 times faster in vector mode than in scalar mode. The overall performance improvement of the vectorized FOWL code over the original scalar code reaches 3.3. The results of this study strongly indicate that supercomputer can be a powerful tool for Monte Carlo simulations in high energy physics. (Auth.)

  19. Applying the multi-threat framework of stereotype threat in the context of digital gaming

    OpenAIRE

    Pennington, C. R.; Kaye, L. K.; McCann, J. J.

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-targe...

  20. Microbial Threats to Health. Emerging Infections: Microbial Threats to Health in the United States.

    Science.gov (United States)

    1992-10-01

    and HIV in- fection. Although in the United States, HIV infection occurs predominately in male homosexuals and intravenous substance abusers, the rate...Davis. W. A., J. G. Kane, and V. G. Garagusi. 1978. Human Aerononas infections : a review of the literature and a case report of endocarditis ...AD-A257 841 AD____ GRANT NO: DAMD17-90-Z-0047 TITLE: MICROBIAL THREATS TO HEALTH SUBTITLE: REmerging Infections - Microbial Threats to Health in the

  1. Neutron–gamma discrimination based on the support vector machine method

    International Nuclear Information System (INIS)

    Yu, Xunzhen; Zhu, Jingjun; Lin, ShinTed; Wang, Li; Xing, Haoyang; Zhang, Caixun; Xia, Yuxi; Liu, Shukui; Yue, Qian; Wei, Weiwei; Du, Qiang; Tang, Changjian

    2015-01-01

    In this study, the combination of the support vector machine (SVM) method with the moment analysis method (MAM) is proposed and utilized to perform neutron/gamma (n/γ) discrimination of the pulses from an organic liquid scintillator (OLS). Neutron and gamma events, which can be firmly separated on the scatter plot drawn by the charge comparison method (CCM), are detected to form the training data set and the test data set for the SVM, and the MAM is used to create the feature vectors for individual events in the data sets. Compared to the traditional methods, such as CCM, the proposed method can not only discriminate the neutron and gamma signals, even at lower energy levels, but also provide the corresponding classification accuracy for each event, which is useful in validating the discrimination. Meanwhile, the proposed method can also offer a predication of the classification for the under-energy-limit events

  2. The DANGERTOME Personal Risk Threat Assessment Scale: An Instrument to Help Aid Immediate Threat Assessment for Counselors, Faculty, and Teachers

    Science.gov (United States)

    Juhnke, Gerald A.

    2010-01-01

    Threats of violence are not uncommon to counselors, faculty, or teachers. Each must be taken seriously, quickly analyzed, and safety procedures implemented. Yet, there exists a paucity of brief, face-to-face, assessments designed to aid threat assessment. To address this paucity, the author created The DANGERTOME Personal Risk Threat Assessment…

  3. Aedes (Stegomyia albopictus (Skuse: a potential vector of Zika virus in Singapore.

    Directory of Open Access Journals (Sweden)

    Pei-Sze Jeslyn Wong

    Full Text Available Zika virus (ZIKV is a little known arbovirus until it caused a major outbreak in the Pacific Island of Yap in 2007. Although the virus has a wide geographic distribution, most of the known vectors are sylvatic Aedes mosquitoes from Africa where the virus was first isolated. Presently, Ae. aegypti is the only known vector to transmit the virus outside the African continent, though Ae. albopictus has long been a suspected vector. Currently, Ae. albopictus has been shown capable of transmitting more than 20 arboviruses and its notoriety as an important vector came to light during the recent chikungunya pandemic. The vulnerability of Singapore to emerging infectious arboviruses has stimulated our interest to determine the competence of local Ae. albopictus to transmit ZIKV.To determine the competence of Ae. albopictus to ZIKV, we orally infected local mosquito strains to a Ugandan strain virus. Fully engorged mosquitoes were maintained in an environmental chamber set at 29°C and 80-85%RH. Twelve mosquitoes were then sampled daily from day one to seven and on day 10 and 14 post infection (pi. Zika virus titre in the midgut and salivary glands of each mosquito were determined using tissue culture infectious dose50 assay, while transmissibility of the virus was determined by detecting viral antigen in the mosquito saliva by qRT-PCR. High dissemination and transmission rate of ZIKV were observed. By day 7-pi, all mosquitoes have disseminated infection and 73% of these mosquitoes have ZIKV in their saliva. By day 10-pi, all mosquitoes were potentially infectious.The study highlighted the potential of Ae. albopictus to transmit ZIKV and the possibility that the virus could be established locally. Nonetheless, the threat of ZIKV can be mitigated by existing dengue and chikungunya control program being implemented in Singapore.

  4. Hypersonic Threats to the Homeland

    Science.gov (United States)

    2017-03-28

    ADAM) system . This ground based system protects 7 soldiers against rocket threats and utilizes a 10 kW laser with an effective range out to...early warning systems for response to hypersonic threats . The integration of directed energy defensive systems with Space Based Infrared Sensors (SBIRS...and early warning radars already in operation will save costs. By capitalizing on Terminal High Altitude Area Defense (THAAD) system capabilities

  5. Key issues in body armour: threats, materials and design

    OpenAIRE

    Horsfall, Ian

    2012-01-01

    This chapter will examine the mechanics and materials of body armour in military, police and some security related applications to protect the wearer from penetrative threats. These threats will include battlefield threats such as shell fragments and high velocity bullets, and threats to law enforcement personnel such as handgun bullets and knives. Regardless of whether the threat is a high velocity bullet, or a knife, the essential requirements of body armour are the same; first an interacti...

  6. Getting to the Heart of Masculinity Stressors: Masculinity Threats Induce Pronounced Vagal Withdrawal During a Speaking Task.

    Science.gov (United States)

    Kramer, Brandon L; Himmelstein, Mary S; Springer, Kristen W

    2017-12-01

    Previous work has found that traditional masculinity ideals and behaviors play a crucial role in higher rates of morbidity and mortality for men. Some studies also suggest that threatening men's masculinity can be stressful. Over time, this stress can weigh on men's cardiovascular and metabolic systems, which may contribute to men's higher rates of cardiometabolic health issues. The purpose of this study is to explore how masculinity threats affect men's heart rate and heart rate variability reactivity (i.e., vagal withdrawal) to masculinity feedback on a social speaking task. Two hundred and eighty-five undergraduate males were randomly assigned to one of six conditions during a laboratory-based speech task. They received one of two feedback types (masculinity or control) and one of three feedback levels (low, high, or dropping) in order to assess whether masculinity threats influence heart rate reactivity and vagal withdrawal patterns during the speech task. Men who receive low masculinity feedback during the speech task experienced more pronounced vagal withdrawal relative to those who received the control. Masculinity threats can induce vagal withdrawal that may accumulate over the life course to contribute to men's relatively worse cardiometabolic health.

  7. Gender, Stereotype Threat and Mathematics Test Scores

    OpenAIRE

    Ming Tsui; Xiao Y. Xu; Edmond Venator

    2011-01-01

    Problem statement: Stereotype threat has repeatedly been shown to depress womens scores on difficult math tests. An attempt to replicate these findings in China found no support for the stereotype threat hypothesis. Our math test was characterized as being personally important for the student participants, an atypical condition in most stereotype threat laboratory research. Approach: To evaluate the effects of this personal demand, we conducted three experiments. Results: ...

  8. Risk of invasion predicted with support vector machines: A case study on northern pike (Esox Lucius, L.) and bleak (Alburnus alburnus, L.)

    OpenAIRE

    Muñoz Mas, Rafael; Vezza, Paolo; Alcaraz-Hernández, Juan Diego; Martinez-Capel, Francisco

    2016-01-01

    The impacts of invasive species are recognised as a major threat to global freshwater biodiversity. The risk of invasion (probability of presence) of two avowed invasive species, the northern pike (Esox Lucius, L.) and bleak (Alburnus alburnus, L.), was evaluated in the upper part of the Cabriel River (eastern Iberian Peninsula). Habitat suitability models for these invasive species were developed with Support Vector Machines (SVMs), which were trained with data collected downstream the Contr...

  9. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala–BNST connectivity during periods of threat vs safety

    Science.gov (United States)

    Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Abstract Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants’ self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala–BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. PMID:29126127

  10. Vector grammars and PN machines

    Institute of Scientific and Technical Information of China (English)

    蒋昌俊

    1996-01-01

    The concept of vector grammars under the string semantic is introduced.The dass of vector grammars is given,which is similar to the dass of Chomsky grammars.The regular vector grammar is divided further.The strong and weak relation between the vector grammar and scalar grammar is discussed,so the spectrum system graph of scalar and vector grammars is made.The equivalent relation between the regular vector grammar and Petri nets (also called PN machine) is pointed.The hybrid PN machine is introduced,and its language is proved equivalent to the language of the context-free vector grammar.So the perfect relation structure between vector grammars and PN machines is formed.

  11. Vector velocimeter

    DEFF Research Database (Denmark)

    2012-01-01

    The present invention relates to a compact, reliable and low-cost vector velocimeter for example for determining velocities of particles suspended in a gas or fluid flow, or for determining velocity, displacement, rotation, or vibration of a solid surface, the vector velocimeter comprising a laser...

  12. Stereotype Threat Lowers Older Adults' Self-Reported Hearing Abilities.

    Science.gov (United States)

    Barber, Sarah J; Lee, Soohyoung Rain

    2015-01-01

    Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults' subjective assessments of their own abilities or to the impact of stereotype threat in noncognitive domains. Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adults' subjective hearing abilities. To test this, 115 adults (mean age 50.03 years, range 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40s and early 50s were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50s and 60s rated their hearing as being subjectively worse when under stereotype threat. The current study provides a clear demonstration that stereotype threat negatively impacts older adults' subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype threat-free testing environment and also include assessments of stereotype threat within their studies. © 2015 S. Karger AG, Basel.

  13. Stereotype threat lowers older adults’ self-reported hearing abilities

    Science.gov (United States)

    Barber, Sarah J.; Lee, Soohyoung Rain

    2016-01-01

    Background Although stereotype threat is a well-documented phenomenon, previous studies examining it in older adults have almost exclusively focused on objective cognitive outcomes. Considerably less attention has been paid to the impact of stereotype threat on older adults’ subjective assessments of their own abilities or to the impact of stereotype threat in non-cognitive domains. Objective Older adults are stereotyped as having experienced not only cognitive declines, but physical declines as well. The current study tested the prediction that stereotype threat can negatively influence older adult's subjective hearing abilities. Methods To test this, 115 adults (M age = 50.02, range = 41-67) read either a positive or negative description about how aging affects hearing. All participants then answered a questionnaire in which they assessed their own hearing abilities. Results The impact of stereotype threat on self-reported hearing was moderated by chronological age. Participants in their 40's and early 50's were unaffected by the stereotype threat manipulation. In contrast, participants in their late 50's and 60's rated their hearing as being subjectively worse when under stereotype threat. Conclusion The current study provides a clear demonstration that stereotype threat negatively impacts older adults’ subjective assessments of their own abilities. It is also the first study to demonstrate an effect of stereotype threat within the domain of hearing. These results have important implications for researchers investigating age-related hearing decline. Stereotype threat can lead to overestimation of the prevalence of age-related hearing decline. It can also serve as a confounding variable when examining the psychosocial correlates of hearing loss. Because of this, researchers studying age-related hearing loss should aim to provide a stereotype-threat free testing environment and also include assessments of stereotype threat within their studies. PMID:26461273

  14. Cloning vector

    Science.gov (United States)

    Guilfoyle, Richard A.; Smith, Lloyd M.

    1994-01-01

    A vector comprising a filamentous phage sequence containing a first copy of filamentous phage gene X and other sequences necessary for the phage to propagate is disclosed. The vector also contains a second copy of filamentous phage gene X downstream from a promoter capable of promoting transcription in a bacterial host. In a preferred form of the present invention, the filamentous phage is M13 and the vector additionally includes a restriction endonuclease site located in such a manner as to substantially inactivate the second gene X when a DNA sequence is inserted into the restriction site.

  15. Cloning vector

    Science.gov (United States)

    Guilfoyle, R.A.; Smith, L.M.

    1994-12-27

    A vector comprising a filamentous phage sequence containing a first copy of filamentous phage gene X and other sequences necessary for the phage to propagate is disclosed. The vector also contains a second copy of filamentous phage gene X downstream from a promoter capable of promoting transcription in a bacterial host. In a preferred form of the present invention, the filamentous phage is M13 and the vector additionally includes a restriction endonuclease site located in such a manner as to substantially inactivate the second gene X when a DNA sequence is inserted into the restriction site. 2 figures.

  16. Sensitivity towards fear of electric shock in passive threat situations.

    Science.gov (United States)

    Ring, Patrick; Kaernbach, Christian

    2015-01-01

    Human judgment and decision-making (JDM) requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs) in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  17. The Financial Arm Of The FARC: A Threat Finance Perspective

    Directory of Open Access Journals (Sweden)

    Thomas Cook

    2011-01-01

    Full Text Available The FARC (Fuerzas Armadas Revolucionarias de Colombia or Revolutionary Armed Forces of Colombia transformed from a traditional guerrilla group into a full-fledged insurgency because of its ability to effectively convert the proceeds derived from illegal narcotic trafficking into operational funds. Those financial capabilities allowed the FARC to challenge government authority in large swathes of the Colombian state. The FARC moved into the drug trade, initially controlling production territory and subsequently engaging in trafficking, which allowed the organization to increase its war-fighting capabilities. This paper only scratches the surface of the mechanism by which the FARC utilized its coca revenue in order to fund its community reinvestment programs, engage in large scale military buildup, and buy political support throughout the region. The exploration of the financial side of the FARC adds to our understanding of how insurgencies become successful. Based on open source information, Threat Finance and financial investigative techniques are underutilized in foreign policy, law enforcement, and intelligence. The critical role played by financing in the rise of the FARC suggests that Threat Finance efforts can be most effective when used to track terrorist and criminal networks. American law enforcement and intelligence agencies should be given bigger budgets and tasked earlier to shut down or disrupt financial networks of foreign insurgencies, such as the FARC.

  18. 49 CFR 1546.301 - Bomb or air piracy threats.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Bomb or air piracy threats. 1546.301 Section 1546... Threat Response § 1546.301 Bomb or air piracy threats. No foreign air carrier may land or take off an airplane in the United States after receiving a bomb or air piracy threat against that airplane, unless the...

  19. From Threat to Relief: Expressing Prejudice toward Atheists as a Self-Regulatory Strategy Protecting the Religious Orthodox from Threat

    Science.gov (United States)

    Kossowska, Małgorzata; Szwed, Paulina; Czernatowicz-Kukuczka, Aneta; Sekerdej, Maciek; Wyczesany, Miroslaw

    2017-01-01

    We claim that religious orthodoxy is related to prejudice toward groups that violate important values, i.e., atheists. Moreover, we suggest that expressing prejudice may efficiently reduce the threat posed by this particular group among people who hold high levels, but not low levels, of orthodox belief. We tested these assumptions in an experimental study in which, after being exposed to atheistic worldviews (value-threat manipulation), high and low orthodox participants were allowed (experimental condition) or not (control condition) to express prejudice toward atheists. Threat was operationalized by cardiovascular reactivity, i.e., heart rate (HR); the higher the HR index, the higher the threat. The results found that people who hold high (vs. low) levels of orthodox belief responded with increased HR after the threat manipulation. However, we observed decreased HR after the expression of prejudice toward atheists among highly orthodox participants compared to the control condition. We did not find this effect among people holding low levels of orthodox belief. Thus, we conclude that expressing prejudice toward this particular group may be an efficient strategy to cope with the threat posed by this group for highly orthodox people. The results are discussed in light of previous findings on religious beliefs and the self-regulatory function of prejudice. PMID:28611715

  20. Vector 33: A reduce program for vector algebra and calculus in orthogonal curvilinear coordinates

    Science.gov (United States)

    Harper, David

    1989-06-01

    This paper describes a package with enables REDUCE 3.3 to perform algebra and calculus operations upon vectors. Basic algebraic operations between vectors and between scalars and vectors are provided, including scalar (dot) product and vector (cross) product. The vector differential operators curl, divergence, gradient and Laplacian are also defined, and are valid in any orthogonal curvilinear coordinate system. The package is written in RLISP to allow algebra and calculus to be performed using notation identical to that for operations. Scalars and vectors can be mixed quite freely in the same expression. The package will be of interest to mathematicians, engineers and scientists who need to perform vector calculations in orthogonal curvilinear coordinates.

  1. Probing deformed orbitals with vector A( vector e, e' N)B reactions

    International Nuclear Information System (INIS)

    Garrido, E.; Caballero, J.A.; Moya de Guerra, E.; Sarriguren, P.; Udias, J.M.

    1995-01-01

    We present results for response functions and asymmetries in the nuclear reactions 37 vector Ar( vector e, e' n) 36 Ar and 37 vector K( vector e,e' p) 36 Ar at quasifree kinematics. We compare PWIA results obtained using deformed HF wave functions with PWIA and DWIA results obtained assuming a spherical mean field. We show that the complex structure of the deformed orbitals can be probed by coincidence measurements with polarized beam and targets. ((orig.))

  2. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    Directory of Open Access Journals (Sweden)

    Aaron Zimba

    2018-03-01

    Full Text Available The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes in different SCADA and production subnets, and for the subsequent network propagation. Based on the uncovered artifacts, we recommend a cascaded network segmentation approach, which prioritizes the security of production network devices. Keywords: Critical infrastructure, Cyber-attack, Industrial control system, Crypto ransomware, Vulnerability

  3. The emerging threat of domestic terrorism: a systematic review of evolving needs, threats, and opportunities

    OpenAIRE

    Wright, Lynn M.

    2014-01-01

    Approved for public release; distribution is unlimited The domestic terrorist threat in the United States is active and complex, with ongoing threats from violent left- and right-wing extremist groups, and radicalization and recruitment efforts by international terrorist groups. In response, domestic intelligence agencies, at all levels of government, have instituted reforms and improvements since 9/11, but there are still gaps in information-sharing and community engagement. For example, ...

  4. Mosquitoes (Diptera: Culicidae) and their relevance as disease vectors in the city of Vienna, Austria.

    Science.gov (United States)

    Lebl, Karin; Zittra, Carina; Silbermayr, Katja; Obwaller, Adelheid; Berer, Dominik; Brugger, Katharina; Walter, Melanie; Pinior, Beate; Fuehrer, Hans-Peter; Rubel, Franz

    2015-02-01

    Mosquitoes (Diptera: Culicidae) are important vectors for a wide range of pathogenic organisms. As large parts of the human population in developed countries live in cities, the occurrence of vector-borne diseases in urban areas is of particular interest for epidemiologists and public health authorities. In this study, we investigated the mosquito occurrence in the city of Vienna, Austria, in order to estimate the risk of transmission of mosquito-borne diseases. Mosquitoes were captured using different sampling techniques at 17 sites in the city of Vienna. Species belonging to the Culex pipiens complex (78.8 %) were most abundant, followed by Coquillettidia richiardii (10.2 %), Anopheles plumbeus (5.4 %), Aedes vexans (3.8 %), and Ochlerotatus sticticus (0.7 %). Individuals of the Cx. pipiens complex were found at 80.2 % of the trap sites, while 58.8 % of the trap sites were positive for Cq. richiardii and Ae. vexans. Oc. sticticus was captured at 35.3 % of the sites, and An. plumbeus only at 23.5 % of the trap sites. Cx. pipiens complex is known to be a potent vector and pathogens like West Nile virus (WNV), Usutu virus (USUV), Tahyna virus (TAHV), Sindbis virus (SINV), Plasmodium sp., and Dirofilaria repens can be transmitted by this species. Cq. richiardii is a known vector species for Batai virus (BATV), SINV, TAHV, and WNV, while Ae. vexans can transmit TAHV, USUV, WNV, and Dirofilaria repens. An. plumbeus and Oc. sticticus seem to play only a minor role in the transmission of vector-borne diseases in Vienna. WNV, which is already wide-spread in Europe, is likely to be the highest threat in Vienna as it can be transmitted by several of the most common species, has already been shown to pose a higher risk in cities, and has the possibility to cause severe illness.

  5. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  6. Conservatism and the neural circuitry of threat: economic conservatism predicts greater amygdala-BNST connectivity during periods of threat vs safety.

    Science.gov (United States)

    Pedersen, Walker S; Muftuler, L Tugan; Larson, Christine L

    2018-01-01

    Political conservatism is associated with an increased negativity bias, including increased attention and reactivity toward negative and threatening stimuli. Although the human amygdala has been implicated in the response to threatening stimuli, no studies to date have investigated whether conservatism is associated with altered amygdala function toward threat. Furthermore, although an influential theory posits that connectivity between the amygdala and bed nucleus of the stria terminalis (BNST) is important in initiating the response to sustained or uncertain threat, whether individual differences in conservatism modulate this connectivity is unknown. To test whether conservatism is associated with increased reactivity in neural threat circuitry, we measured participants' self-reported social and economic conservatism and asked them to complete high-resolution fMRI scans while under threat of an unpredictable shock and while safe. We found that economic conservatism predicted greater connectivity between the BNST and a cluster of voxels in the left amygdala during threat vs safety. These results suggest that increased amygdala-BNST connectivity during threat may be a key neural correlate of the enhanced negativity bias found in conservatism. © The Author (2017). Published by Oxford University Press.

  7. Vectorization with SIMD extensions speeds up reconstruction in electron tomography.

    Science.gov (United States)

    Agulleiro, J I; Garzón, E M; García, I; Fernández, J J

    2010-06-01

    Electron tomography allows structural studies of cellular structures at molecular detail. Large 3D reconstructions are needed to meet the resolution requirements. The processing time to compute these large volumes may be considerable and so, high performance computing techniques have been used traditionally. This work presents a vector approach to tomographic reconstruction that relies on the exploitation of the SIMD extensions available in modern processors in combination to other single processor optimization techniques. This approach succeeds in producing full resolution tomograms with an important reduction in processing time, as evaluated with the most common reconstruction algorithms, namely WBP and SIRT. The main advantage stems from the fact that this approach is to be run on standard computers without the need of specialized hardware, which facilitates the development, use and management of programs. Future trends in processor design open excellent opportunities for vector processing with processor's SIMD extensions in the field of 3D electron microscopy.

  8. Multi-perspective views of students’ difficulties with one-dimensional vector and two-dimensional vector

    Science.gov (United States)

    Fauzi, Ahmad; Ratna Kawuri, Kunthi; Pratiwi, Retno

    2017-01-01

    Researchers of students’ conceptual change usually collects data from written tests and interviews. Moreover, reports of conceptual change often simply refer to changes in concepts, such as on a test, without any identification of the learning processes that have taken place. Research has shown that students have difficulties with vectors in university introductory physics courses and high school physics courses. In this study, we intended to explore students’ understanding of one-dimensional and two-dimensional vector in multi perspective views. In this research, we explore students’ understanding through test perspective and interviews perspective. Our research study adopted the mixed-methodology design. The participants of this research were sixty students of third semester of physics education department. The data of this research were collected by testand interviews. In this study, we divided the students’ understanding of one-dimensional vector and two-dimensional vector in two categories, namely vector skills of the addition of one-dimensionaland two-dimensional vector and the relation between vector skills and conceptual understanding. From the investigation, only 44% of students provided correct answer for vector skills of the addition of one-dimensional and two-dimensional vector and only 27% students provided correct answer for the relation between vector skills and conceptual understanding.

  9. Custodial vector model

    Science.gov (United States)

    Becciolini, Diego; Franzosi, Diogo Buarque; Foadi, Roshan; Frandsen, Mads T.; Hapola, Tuomas; Sannino, Francesco

    2015-07-01

    We analyze the Large Hadron Collider (LHC) phenomenology of heavy vector resonances with a S U (2 )L×S U (2 )R spectral global symmetry. This symmetry partially protects the electroweak S parameter from large contributions of the vector resonances. The resulting custodial vector model spectrum and interactions with the standard model fields lead to distinct signatures at the LHC in the diboson, dilepton, and associated Higgs channels.

  10. Vector Differential Calculus

    OpenAIRE

    HITZER, Eckhard MS

    2002-01-01

    This paper treats the fundamentals of the vector differential calculus part of universal geometric calculus. Geometric calculus simplifies and unifies the structure and notation of mathematics for all of science and engineering, and for technological applications. In order to make the treatment self-contained, I first compile all important geometric algebra relationships,which are necesssary for vector differential calculus. Then differentiation by vectors is introduced and a host of major ve...

  11. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    Energy Technology Data Exchange (ETDEWEB)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  12. Monitoring by Use of Clusters of Sensor-Data Vectors

    Science.gov (United States)

    Iverson, David L.

    2007-01-01

    The inductive monitoring system (IMS) is a system of computer hardware and software for automated monitoring of the performance, operational condition, physical integrity, and other aspects of the health of a complex engineering system (e.g., an industrial process line or a spacecraft). The input to the IMS consists of streams of digitized readings from sensors in the monitored system. The IMS determines the type and amount of any deviation of the monitored system from a nominal or normal ( healthy ) condition on the basis of a comparison between (1) vectors constructed from the incoming sensor data and (2) corresponding vectors in a database of nominal or normal behavior. The term inductive reflects the use of a process reminiscent of traditional mathematical induction to learn about normal operation and build the nominal-condition database. The IMS offers two major advantages over prior computational monitoring systems: The computational burden of the IMS is significantly smaller, and there is no need for abnormal-condition sensor data for training the IMS to recognize abnormal conditions. The figure schematically depicts the relationships among the computational processes effected by the IMS. Training sensor data are gathered during normal operation of the monitored system, detailed computational simulation of operation of the monitored system, or both. The training data are formed into vectors that are used to generate the database. The vectors in the database are clustered into regions that represent normal or nominal operation. Once the database has been generated, the IMS compares the vectors of incoming sensor data with vectors representative of the clusters. The monitored system is deemed to be operating normally or abnormally, depending on whether the vector of incoming sensor data is or is not, respectively, sufficiently close to one of the clusters. For this purpose, a distance between two vectors is calculated by a suitable metric (e.g., Euclidean

  13. Vectorization, parallelization and porting of nuclear codes. Vectorization and parallelization. Progress report fiscal 1999

    Energy Technology Data Exchange (ETDEWEB)

    Adachi, Masaaki; Ogasawara, Shinobu; Kume, Etsuo [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Ishizuki, Shigeru; Nemoto, Toshiyuki; Kawasaki, Nobuo; Kawai, Wataru [Fujitsu Ltd., Tokyo (Japan); Yatake, Yo-ichi [Hitachi Ltd., Tokyo (Japan)

    2001-02-01

    Several computer codes in the nuclear field have been vectorized, parallelized and trans-ported on the FUJITSU VPP500 system, the AP3000 system, the SX-4 system and the Paragon system at Center for Promotion of Computational Science and Engineering in Japan Atomic Energy Research Institute. We dealt with 18 codes in fiscal 1999. These results are reported in 3 parts, i.e., the vectorization and the parallelization part on vector processors, the parallelization part on scalar processors and the porting part. In this report, we describe the vectorization and parallelization on vector processors. In this vectorization and parallelization on vector processors part, the vectorization of Relativistic Molecular Orbital Calculation code RSCAT, a microscopic transport code for high energy nuclear collisions code JAM, three-dimensional non-steady thermal-fluid analysis code STREAM, Relativistic Density Functional Theory code RDFT and High Speed Three-Dimensional Nodal Diffusion code MOSRA-Light on the VPP500 system and the SX-4 system are described. (author)

  14. Elliptic-symmetry vector optical fields.

    Science.gov (United States)

    Pan, Yue; Li, Yongnan; Li, Si-Min; Ren, Zhi-Cheng; Kong, Ling-Jun; Tu, Chenghou; Wang, Hui-Tian

    2014-08-11

    We present in principle and demonstrate experimentally a new kind of vector fields: elliptic-symmetry vector optical fields. This is a significant development in vector fields, as this breaks the cylindrical symmetry and enriches the family of vector fields. Due to the presence of an additional degrees of freedom, which is the interval between the foci in the elliptic coordinate system, the elliptic-symmetry vector fields are more flexible than the cylindrical vector fields for controlling the spatial structure of polarization and for engineering the focusing fields. The elliptic-symmetry vector fields can find many specific applications from optical trapping to optical machining and so on.

  15. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons

    International Nuclear Information System (INIS)

    Blix, H.; Journe, V.

    2010-01-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  16. Terror weapons. Ridding the world of nuclear, biological and chemical weapons - Commission on mass destruction weapons; Armes de terreur. Debarrasser le monde des armes nucleaires, biologiques et chimiques - Commission sur les armes de destruction massive

    Energy Technology Data Exchange (ETDEWEB)

    Blix, H.; Journe, V.

    2010-07-01

    This book approaches in 8 chapters the ambitious challenge of ridding the world of all mass destruction weapons: 1 - re-launching disarmament; 2 - terror weapons: nature of threats and answers (weakness of traditional answers, counter-proliferation); 3 - nuclear weapons: preventing proliferation and terrorism, reducing threat and nuclear weapons number, from regulation to banning); 4 - biological or toxin weapons; 5 - chemical weapons; 6 - vectors, anti-missile defenses and space weapons; 7 - exports control, international assistance and non-governmental actors; 8 - respect, verification, enforcement and role of the United Nations. The recommendations and works of the Commission are presented in appendix together with the declaration adopted on April 30, 2009. (J.S.)

  17. Affirmative Action and Stereotype Threat

    OpenAIRE

    Cohen, Alma

    2015-01-01

    This paper provides experimental evidence on the effect of affirmative action (AA). In particular, we investigate whether affirmative action has a ”stereotype threat effect” – that is, whether AA cues a negative stereotype that leads individuals to conform to the stereotype and adversely affects their performance. Stereotype threat has been shown in the literature to be potentially significant for individuals who identify strongly with the domain of the stereotype and who engage in complex st...

  18. Chikungunya Virus–Vector Interactions

    Directory of Open Access Journals (Sweden)

    Lark L. Coffey

    2014-11-01

    Full Text Available Chikungunya virus (CHIKV is a mosquito-borne alphavirus that causes chikungunya fever, a severe, debilitating disease that often produces chronic arthralgia. Since 2004, CHIKV has emerged in Africa, Indian Ocean islands, Asia, Europe, and the Americas, causing millions of human infections. Central to understanding CHIKV emergence is knowledge of the natural ecology of transmission and vector infection dynamics. This review presents current understanding of CHIKV infection dynamics in mosquito vectors and its relationship to human disease emergence. The following topics are reviewed: CHIKV infection and vector life history traits including transmission cycles, genetic origins, distribution, emergence and spread, dispersal, vector competence, vector immunity and microbial interactions, and co-infection by CHIKV and other arboviruses. The genetics of vector susceptibility and host range changes, population heterogeneity and selection for the fittest viral genomes, dual host cycling and its impact on CHIKV adaptation, viral bottlenecks and intrahost diversity, and adaptive constraints on CHIKV evolution are also discussed. The potential for CHIKV re-emergence and expansion into new areas and prospects for prevention via vector control are also briefly reviewed.

  19. Extended vector-tensor theories

    Energy Technology Data Exchange (ETDEWEB)

    Kimura, Rampei; Naruko, Atsushi; Yoshida, Daisuke, E-mail: rampei@th.phys.titech.ac.jp, E-mail: naruko@th.phys.titech.ac.jp, E-mail: yoshida@th.phys.titech.ac.jp [Department of Physics, Tokyo Institute of Technology, 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8551 (Japan)

    2017-01-01

    Recently, several extensions of massive vector theory in curved space-time have been proposed in many literatures. In this paper, we consider the most general vector-tensor theories that contain up to two derivatives with respect to metric and vector field. By imposing a degeneracy condition of the Lagrangian in the context of ADM decomposition of space-time to eliminate an unwanted mode, we construct a new class of massive vector theories where five degrees of freedom can propagate, corresponding to three for massive vector modes and two for massless tensor modes. We find that the generalized Proca and the beyond generalized Proca theories up to the quartic Lagrangian, which should be included in this formulation, are degenerate theories even in curved space-time. Finally, introducing new metric and vector field transformations, we investigate the properties of thus obtained theories under such transformations.

  20. Hyperbolic-symmetry vector fields.

    Science.gov (United States)

    Gao, Xu-Zhen; Pan, Yue; Cai, Meng-Qiang; Li, Yongnan; Tu, Chenghou; Wang, Hui-Tian

    2015-12-14

    We present and construct a new kind of orthogonal coordinate system, hyperbolic coordinate system. We present and design a new kind of local linearly polarized vector fields, which is defined as the hyperbolic-symmetry vector fields because the points with the same polarization form a series of hyperbolae. We experimentally demonstrate the generation of such a kind of hyperbolic-symmetry vector optical fields. In particular, we also study the modified hyperbolic-symmetry vector optical fields with the twofold and fourfold symmetric states of polarization when introducing the mirror symmetry. The tight focusing behaviors of these vector fields are also investigated. In addition, we also fabricate micro-structures on the K9 glass surfaces by several tightly focused (modified) hyperbolic-symmetry vector fields patterns, which demonstrate that the simulated tightly focused fields are in good agreement with the fabricated micro-structures.

  1. Supergravity inspired vector curvaton

    International Nuclear Information System (INIS)

    Dimopoulos, Konstantinos

    2007-01-01

    It is investigated whether a massive Abelian vector field, whose gauge kinetic function is growing during inflation, can be responsible for the generation of the curvature perturbation in the Universe. Particle production is studied and it is shown that the vector field can obtain a scale-invariant superhorizon spectrum of perturbations with a reasonable choice of kinetic function. After inflation the vector field begins coherent oscillations, during which it corresponds to pressureless isotropic matter. When the vector field dominates the Universe, its perturbations give rise to the observed curvature perturbation following the curvaton scenario. It is found that this is possible if, after the end of inflation, the mass of the vector field increases at a phase transition at temperature of order 1 TeV or lower. Inhomogeneous reheating, whereby the vector field modulates the decay rate of the inflaton, is also studied

  2. Constraining vectors and axial-vectors in walking technicolour by a holographic principle

    DEFF Research Database (Denmark)

    D. Dietrich, Dennis; Kouvaris, Christoforos

    2008-01-01

    We use a holographic principle to study the low-energy spectrum of walking technicolour models. In particular, we predict the masses of the axial vectors as well as the decay constants of vectors and axial vectors as functions of the mass of the techni-rho. Given that there are very few...

  3. Stereotype Threat Alters the Subjective Experience of Memory.

    Science.gov (United States)

    Mazerolle, Marie; Régner, Isabelle; Rigalleau, François; Huguet, Pascal

    2015-01-01

    There is now evidence that negative age-related stereotypes about memory reduce older adults' memory performance, and inflate age differences in this domain. Here, we examine whether stereotype threat may also influence the basic feeling that one is more or less able to remember. Using the Remember/Know paradigm, we demonstrated that stereotype threat conducted older adults to a greater feeling of familiarity with events, while failing to retrieve any contextual detail. This finding indicates that stereotype threat alters older adults' subjective experience of memory, and strengthens our understanding of the mechanisms underlying stereotype threat effects.

  4. ON THE THREAT OF SUPPLIERS FOR THE ENGINEERING CONSULTING AND DESIGN SERVICES FIRMS

    Directory of Open Access Journals (Sweden)

    Gabriel Sorin STROE

    2014-06-01

    Full Text Available In the case of companies from engineering consulting and design services industry the classic models of analysis (e.g. Porter's five forces for structural analysis exhibit interesting aspects in comparison with the situation when applied to traditional services or industrial production firms, due to the distinctive characteristics of the industry. The purpose of this paper is to present a general overview of the engineering consulting and design industry also analyze different facets of the suppliers concept and their force and threat for the engineering services firms. The paper aims at analyzing the dual strategic role of aspecial type of suppliers for the engineering companies.

  5. Gauge anomaly with vector and axial-vector fields in 6D curved space

    Science.gov (United States)

    Yajima, Satoshi; Eguchi, Kohei; Fukuda, Makoto; Oka, Tomonori

    2018-03-01

    Imposing the conservation equation of the vector current for a fermion of spin 1/2 at the quantum level, a gauge anomaly for the fermion coupling with non-Abelian vector and axial-vector fields in 6D curved space is expressed in tensorial form. The anomaly consists of terms that resemble the chiral U(1) anomaly and the commutator terms that disappear if the axial-vector field is Abelian.

  6. A Novel Approach to Asynchronous MVP Data Interpretation Based on Elliptical-Vectors

    Science.gov (United States)

    Kruglyakov, M.; Trofimov, I.; Korotaev, S.; Shneyer, V.; Popova, I.; Orekhova, D.; Scshors, Y.; Zhdanov, M. S.

    2014-12-01

    We suggest a novel approach to asynchronous magnetic-variation profiling (MVP) data interpretation. Standard method in MVP is based on the interpretation of the coefficients of linear relation between vertical and horizontal components of the measured magnetic field.From mathematical point of view this pair of linear coefficients is not a vector which leads to significant difficulties in asynchronous data interpretation. Our approach allows us to actually treat such a pair of complex numbers as a special vector called an ellipse-vector (EV). By choosing the particular definitions of complex length and direction, the basic relation of MVP can be considered as the dot product. This considerably simplifies the interpretation of asynchronous data. The EV is described by four real numbers: the values of major and minor semiaxes, the angular direction of the major semiaxis and the phase. The notation choice is motivated by historical reasons. It is important that different EV's components have different sensitivity with respect to the field sources and the local heterogeneities. Namely, the value of major semiaxis and the angular direction are mostly determined by the field source and the normal cross-section. On the other hand, the value of minor semiaxis and the phase are responsive to local heterogeneities. Since the EV is the general form of complex vector, the traditional Schmucker vectors can be explicitly expressed through its components.The proposed approach was successfully applied to interpretation the results of asynchronous measurements that had been obtained in the Arctic Ocean at the drift stations "North Pole" in 1962-1976.

  7. A Nearest Neighbor Classifier Employing Critical Boundary Vectors for Efficient On-Chip Template Reduction.

    Science.gov (United States)

    Xia, Wenjun; Mita, Yoshio; Shibata, Tadashi

    2016-05-01

    Aiming at efficient data condensation and improving accuracy, this paper presents a hardware-friendly template reduction (TR) method for the nearest neighbor (NN) classifiers by introducing the concept of critical boundary vectors. A hardware system is also implemented to demonstrate the feasibility of using an field-programmable gate array (FPGA) to accelerate the proposed method. Initially, k -means centers are used as substitutes for the entire template set. Then, to enhance the classification performance, critical boundary vectors are selected by a novel learning algorithm, which is completed within a single iteration. Moreover, to remove noisy boundary vectors that can mislead the classification in a generalized manner, a global categorization scheme has been explored and applied to the algorithm. The global characterization automatically categorizes each classification problem and rapidly selects the boundary vectors according to the nature of the problem. Finally, only critical boundary vectors and k -means centers are used as the new template set for classification. Experimental results for 24 data sets show that the proposed algorithm can effectively reduce the number of template vectors for classification with a high learning speed. At the same time, it improves the accuracy by an average of 2.17% compared with the traditional NN classifiers and also shows greater accuracy than seven other TR methods. We have shown the feasibility of using a proof-of-concept FPGA system of 256 64-D vectors to accelerate the proposed method on hardware. At a 50-MHz clock frequency, the proposed system achieves a 3.86 times higher learning speed than on a 3.4-GHz PC, while consuming only 1% of the power of that used by the PC.

  8. Vector manifestation and violation of vector dominance in hot matter

    International Nuclear Information System (INIS)

    Harada, Masayasu; Sasaki, Chihiro

    2004-01-01

    We show the details of the calculation of the hadronic thermal corrections to the two-point functions in the effective field theory of QCD for pions and vector mesons based on the hidden local symmetry (HLS) in hot matter using the background field gauge. We study the temperature dependence of the pion velocity in the low-temperature region determined from the hadronic thermal corrections, and show that, due to the presence of the dynamical vector meson, the pion velocity is smaller than the speed of the light already at one-loop level, in contrast to the result obtained in the ordinary chiral perturbation theory including only the pion at one-loop. Including the intrinsic temperature dependences of the parameters of the HLS Lagrangian determined from the underlying QCD through the Wilsonian matching, we show how the vector manifestation (VM), in which the massless vector meson becomes the chiral partner of pion, is realized at the critical temperature. We present a new prediction of the VM on the direct photon-π-π coupling which measures the validity of the vector dominance (VD) of the electromagnetic form factor of the pion: we find that the VD is largely violated at the critical temperature, which indicates that the assumption of the VD made in several analyses on the dilepton spectra in hot matter may need to be weakened for consistently including the effect of the dropping mass of the vector meson

  9. One Step Solution to the Local Tie Vectors of GNSS/SLR in ITRF

    Directory of Open Access Journals (Sweden)

    MA Xiaping

    2018-01-01

    Full Text Available This paper proposes a one-step solution of local tie vectors,the solution takes RP (Reference Point and axes offsets of SLR telescope as unknown parameters,GNSS baselines network and conventional terrestrial observation (horizontal,vertical angle and distance are combined in ITRF (International Terrestrial Reference Frame,and multiply constraint conditions are established between RP and observation marks and two axes offsets.Local tie vectors and related covariance matrices of the 3 co-located sites in Beijing,Kunming,Xi'an of CMONOC (Crustal Movement Observation Network of China are solved with the proposed one step solution.The results show that the RMS (root mean square error of local tie vectors is less than 2.0 mm.Besides,the differences are less than 2.0 mm compared with the traditional step by step solution,and the offsets and corresponding RMS between the horizontal axis and vertical axis are 3.8 mm,0.7 mm,3.6 mm and 1.3 mm,1.2 mm,1.3 mm,respectively.

  10. Eastern forest environmental threat assessment center

    Science.gov (United States)

    Southern Research Station. USDA Forest Service

    2010-01-01

    The Eastern Forest Environmental Threat Assessment Center (EFETAC) provides the latest research and expertise concerning threats to healthy forests – such as insects and disease, wildland loss, invasive species, wildland fire, and climate change – to assist forest landowners, managers and scientists throughout the East. Established in 2005, EFETAC is a joint effort of...

  11. The Nature of the Bioterrorism Threat

    Energy Technology Data Exchange (ETDEWEB)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  12. Bomb Threats and Bomb Search Techniques.

    Science.gov (United States)

    Department of the Treasury, Washington, DC.

    This pamphlet explains how to be prepared and plan for bomb threats and describes procedures to follow once a call has been received. The content covers (1) preparation for bomb threats, (2) evacuation procedures, (3) room search methods, (4) procedures to follow once a bomb has been located, and (5) typical problems that search teams will…

  13. Self-Construal Priming Modulates Self-Evaluation under Social Threat

    Directory of Open Access Journals (Sweden)

    Tianyang Zhang

    2017-10-01

    Full Text Available Previous studies have shown that Westerners evaluate themselves in an especially flattering way when faced with a social-evaluative threat. The current study first investigated whether East Asians also have a similar pattern by recruiting Chinese participants and using social-evaluative threat manipulations in which participants perform self-evaluation tasks while adopting different social-evaluative feedbacks (Experiment 1. Then further examined whether the different response patterns can be modulated by different types of self-construal by using social-evaluative threat manipulations in conjunction with a self-construal priming task (Experiment 2. The results showed that, as opposed to Westerners' pattern, Chinese participants rated themselves as having significantly greater above-average effect only when faced with the nonthreatening feedback but not the social-evaluative threat. More importantly, we found that self-construal modulated the self-evaluation under social-evaluative threat: following independent self-construal priming, participants tended to show a greater above-average effect when faced with a social-evaluative threat. However, this pattern in conjunction with a social threat disappeared after participants received interdependent self-construal priming or neutral priming. These findings suggest that the effects of social-evaluative threat on self-evaluation are not culturally universal and is strongly modulated by self-construal priming.

  14. Heavy Scalar, Vector, and Axial-Vector Mesons in Hot and Dense Nuclear Medium

    Directory of Open Access Journals (Sweden)

    Arvind Kumar

    2014-01-01

    Full Text Available In this work we shall investigate the mass modifications of scalar mesons (D0; B0, vector mesons (D*; B*, and axial-vector mesons (D1; B1 at finite density and temperature of the nuclear medium. The above mesons are modified in the nuclear medium through the modification of quark and gluon condensates. We will find the medium modification of quark and gluon condensates within chiral SU(3 model through the medium modification of scalar-isoscalar fields σ and ζ at finite density and temperature. These medium modified quark and gluon condensates will further be used through QCD sum rules for the evaluation of in-medium properties of the above mentioned scalar, vector, and axial vector mesons. We will also discuss the effects of density and temperature of the nuclear medium on the scattering lengths of the above scalar, vector, and axial-vector mesons. The study of the medium modifications of the above mesons may be helpful for understanding their production rates in heavy-ion collision experiments. The results of present investigations of medium modifications of scalar, vector, and axial-vector mesons at finite density and temperature can be verified in the compressed baryonic matter (CBM experiment of FAIR facility at GSI, Germany.

  15. Vector Fields on Product Manifolds

    OpenAIRE

    Kurz, Stefan

    2011-01-01

    This short report establishes some basic properties of smooth vector fields on product manifolds. The main results are: (i) On a product manifold there always exists a direct sum decomposition into horizontal and vertical vector fields. (ii) Horizontal and vertical vector fields are naturally isomorphic to smooth families of vector fields defined on the factors. Vector fields are regarded as derivations of the algebra of smooth functions.

  16. Light scattering of rectangular slot antennas: parallel magnetic vector vs perpendicular electric vector

    Science.gov (United States)

    Lee, Dukhyung; Kim, Dai-Sik

    2016-01-01

    We study light scattering off rectangular slot nano antennas on a metal film varying incident polarization and incident angle, to examine which field vector of light is more important: electric vector perpendicular to, versus magnetic vector parallel to the long axis of the rectangle. While vector Babinet’s principle would prefer magnetic field along the long axis for optimizing slot antenna function, convention and intuition most often refer to the electric field perpendicular to it. Here, we demonstrate experimentally that in accordance with vector Babinet’s principle, the incident magnetic vector parallel to the long axis is the dominant component, with the perpendicular incident electric field making a small contribution of the factor of 1/|ε|, the reciprocal of the absolute value of the dielectric constant of the metal, owing to the non-perfectness of metals at optical frequencies.

  17. Generalization of concurrence vectors

    International Nuclear Information System (INIS)

    Yu Changshui; Song Heshan

    2004-01-01

    In this Letter, based on the generalization of concurrence vectors for bipartite pure state with respect to employing tensor product of generators of the corresponding rotation groups, we generalize concurrence vectors to the case of mixed states; a new criterion of separability of multipartite pure states is given out, for which we define a concurrence vector; we generalize the vector to the case of multipartite mixed state and give out a good measure of free entanglement

  18. Vector Network Coding Algorithms

    OpenAIRE

    Ebrahimi, Javad; Fragouli, Christina

    2010-01-01

    We develop new algebraic algorithms for scalar and vector network coding. In vector network coding, the source multicasts information by transmitting vectors of length L, while intermediate nodes process and combine their incoming packets by multiplying them with L x L coding matrices that play a similar role as coding c in scalar coding. Our algorithms for scalar network jointly optimize the employed field size while selecting the coding coefficients. Similarly, for vector coding, our algori...

  19. School Shooting : Threat Detection and Classification in Textual Leakage

    OpenAIRE

    Khan, Ajmal

    2013-01-01

    The continual occurrence of school shooting incidents underscores the need of taking preventive measures. Inductive measures of threat assessment have proved to be a bad strategy to solve the problem and new research is focusing on deductive approaches. Deductive threat assessment approaches are gaining ground and efforts are underway to mine text for automatic detection of threats in written text. Automatic detection and classification of threats in the digital world can help the decision ma...

  20. ROMANIAN TRADITIONAL MOTIF ELEMENT OF MODERNITY IN CLOTHING

    Directory of Open Access Journals (Sweden)

    ŞUTEU Marius Darius

    2017-05-01

    Full Text Available In this paper are presented the phases for improving from an aesthetic point of view a clothing item, the T-shirt for women using software design patterns, computerised graphics and textile different modern technologies including: industrial embroidery, digital printing, sublimation. In the first phase a documentation was prepared in the University of Oradea and traditional motif was selected from a collection comprising a number of Romanian traditional motifs from different parts of the country and were reintepreted and stylized whilst preserving the symbolism and color range specified to the area. For the styling phase was used CorelDraw vector graphics program that allows changing the shape, size and color of the drawings without affecting the identity of the pattern. The embroidery was done using BERNINA Embroidery Software Designer Plus Software. This software allows you to export the model to any domestic or industrial embroidery machine regardless of brand. Finally we observed the resistance of the printed and embroided model to various: elasticity, resistance to abrasion and a sensory analysis on the preservation of color. After testing we noticed the imprint resistance applied to the fabric, resulting in a quality that makes possible to keep the Romanian traditional motif from generation to generation.

  1. Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    Dias, Kealey

    vector fields. Since the class of complex polynomial vector fields in the plane is natural to consider, it is remarkable that its study has only begun very recently. There are numerous fundamental questions that are still open, both in the general classification of these vector fields, the decomposition...... of parameter spaces into structurally stable domains, and a description of the bifurcations. For this reason, the talk will focus on these questions for complex polynomial vector fields.......The two branches of dynamical systems, continuous and discrete, correspond to the study of differential equations (vector fields) and iteration of mappings respectively. In holomorphic dynamics, the systems studied are restricted to those described by holomorphic (complex analytic) functions...

  2. Validation of SplitVectors Encoding for Quantitative Visualization of Large-Magnitude-Range Vector Fields.

    Science.gov (United States)

    Henan Zhao; Bryant, Garnett W; Griffin, Wesley; Terrill, Judith E; Jian Chen

    2017-06-01

    We designed and evaluated SplitVectors, a new vector field display approach to help scientists perform new discrimination tasks on large-magnitude-range scientific data shown in three-dimensional (3D) visualization environments. SplitVectors uses scientific notation to display vector magnitude, thus improving legibility. We present an empirical study comparing the SplitVectors approach with three other approaches - direct linear representation, logarithmic, and text display commonly used in scientific visualizations. Twenty participants performed three domain analysis tasks: reading numerical values (a discrimination task), finding the ratio between values (a discrimination task), and finding the larger of two vectors (a pattern detection task). Participants used both mono and stereo conditions. Our results suggest the following: (1) SplitVectors improve accuracy by about 10 times compared to linear mapping and by four times to logarithmic in discrimination tasks; (2) SplitVectors have no significant differences from the textual display approach, but reduce cluttering in the scene; (3) SplitVectors and textual display are less sensitive to data scale than linear and logarithmic approaches; (4) using logarithmic can be problematic as participants' confidence was as high as directly reading from the textual display, but their accuracy was poor; and (5) Stereoscopy improved performance, especially in more challenging discrimination tasks.

  3. Modeling and simulation of botnet based cyber-threats

    Directory of Open Access Journals (Sweden)

    Kasprzyk Rafał

    2017-01-01

    Full Text Available The paper presents an analysis of cyber-threats, with particular emphasis on the threats resulting from botnet activity. Botnets are the most common types of threats and often perceived as crucial in terms of national security. Their classification and methods of spreading are the basis for creating cyberspace model including the presence of different types of cyber-threats. A well-designed cyberspace model enables to construct an experimental environment that allows for the analysis of botnet characteristics, testing its resistance to various events and simulation of the spread and evolution. For this purpose, dedicated platforms with capabilities and functional characteristics to meet these requirements have been proposed.

  4. The Conservation Value of Traditional Rural Landscapes: The Case of Woodpeckers in Transylvania, Romania.

    Science.gov (United States)

    Dorresteijn, Ine; Hartel, Tibor; Hanspach, Jan; von Wehrden, Henrik; Fischer, Joern

    2013-01-01

    Land use change is a major threat to global biodiversity. Forest species face the dual threats of deforestation and intensification of forest management. In regions where forests are under threat, rural landscapes that retain structural components of mature forests potentially provide valuable additional habitat for some forest species. Here, we illustrate the habitat value of traditional wood pastures for a woodpecker assemblage of six species in southern Transylvania, Romania. Wood pastures are created by long-term stable silvo-pastoral management practices, and are composed of open grassland with scattered large, old trees. Because of their demanding habitat requirements, woodpeckers share habitat with many other bird species, and have been considered as possible indicator species for bird species diversity. We first compared woodpecker assemblages between forests and wood pastures. Second, we grouped features of wood pastures into three spatial contexts and addressed how these features related to the occurrence of three woodpecker species that are formally protected. Woodpecker species composition, but not the number of species, differed between forests and wood pastures, with the green woodpecker occurring more commonly in wood pastures, and the lesser spotted woodpecker more commonly in forests. Within wood pastures, the intermediate context (especially surrounding forest cover) best explained the presence of the grey-headed and middle spotted woodpecker. By contrast, variables describing local vegetation structure and characteristics of the surrounding landscape did not affect woodpecker occurrence in wood pastures. In contrast to many other parts of Europe, in which several species of woodpeckers have declined, the traditional rural landscape of Transylvania continues to provide habitat for several woodpecker species, both in forests and wood pastures. Given the apparent habitat value of wood pastures for woodpeckers we recommend wood pastures be explicitly

  5. The Conservation Value of Traditional Rural Landscapes: The Case of Woodpeckers in Transylvania, Romania.

    Directory of Open Access Journals (Sweden)

    Ine Dorresteijn

    Full Text Available Land use change is a major threat to global biodiversity. Forest species face the dual threats of deforestation and intensification of forest management. In regions where forests are under threat, rural landscapes that retain structural components of mature forests potentially provide valuable additional habitat for some forest species. Here, we illustrate the habitat value of traditional wood pastures for a woodpecker assemblage of six species in southern Transylvania, Romania. Wood pastures are created by long-term stable silvo-pastoral management practices, and are composed of open grassland with scattered large, old trees. Because of their demanding habitat requirements, woodpeckers share habitat with many other bird species, and have been considered as possible indicator species for bird species diversity. We first compared woodpecker assemblages between forests and wood pastures. Second, we grouped features of wood pastures into three spatial contexts and addressed how these features related to the occurrence of three woodpecker species that are formally protected. Woodpecker species composition, but not the number of species, differed between forests and wood pastures, with the green woodpecker occurring more commonly in wood pastures, and the lesser spotted woodpecker more commonly in forests. Within wood pastures, the intermediate context (especially surrounding forest cover best explained the presence of the grey-headed and middle spotted woodpecker. By contrast, variables describing local vegetation structure and characteristics of the surrounding landscape did not affect woodpecker occurrence in wood pastures. In contrast to many other parts of Europe, in which several species of woodpeckers have declined, the traditional rural landscape of Transylvania continues to provide habitat for several woodpecker species, both in forests and wood pastures. Given the apparent habitat value of wood pastures for woodpeckers we recommend wood

  6. The Conservation Value of Traditional Rural Landscapes: The Case of Woodpeckers in Transylvania, Romania

    Science.gov (United States)

    Dorresteijn, Ine; Hartel, Tibor; Hanspach, Jan; von Wehrden, Henrik; Fischer, Joern

    2013-01-01

    Land use change is a major threat to global biodiversity. Forest species face the dual threats of deforestation and intensification of forest management. In regions where forests are under threat, rural landscapes that retain structural components of mature forests potentially provide valuable additional habitat for some forest species. Here, we illustrate the habitat value of traditional wood pastures for a woodpecker assemblage of six species in southern Transylvania, Romania. Wood pastures are created by long-term stable silvo-pastoral management practices, and are composed of open grassland with scattered large, old trees. Because of their demanding habitat requirements, woodpeckers share habitat with many other bird species, and have been considered as possible indicator species for bird species diversity. We first compared woodpecker assemblages between forests and wood pastures. Second, we grouped features of wood pastures into three spatial contexts and addressed how these features related to the occurrence of three woodpecker species that are formally protected. Woodpecker species composition, but not the number of species, differed between forests and wood pastures, with the green woodpecker occurring more commonly in wood pastures, and the lesser spotted woodpecker more commonly in forests. Within wood pastures, the intermediate context (especially surrounding forest cover) best explained the presence of the grey-headed and middle spotted woodpecker. By contrast, variables describing local vegetation structure and characteristics of the surrounding landscape did not affect woodpecker occurrence in wood pastures. In contrast to many other parts of Europe, in which several species of woodpeckers have declined, the traditional rural landscape of Transylvania continues to provide habitat for several woodpecker species, both in forests and wood pastures. Given the apparent habitat value of wood pastures for woodpeckers we recommend wood pastures be explicitly

  7. Vectorization, parallelization and porting of nuclear codes (vectorization and parallelization). Progress report fiscal 1998

    International Nuclear Information System (INIS)

    Ishizuki, Shigeru; Kawai, Wataru; Nemoto, Toshiyuki; Ogasawara, Shinobu; Kume, Etsuo; Adachi, Masaaki; Kawasaki, Nobuo; Yatake, Yo-ichi

    2000-03-01

    Several computer codes in the nuclear field have been vectorized, parallelized and transported on the FUJITSU VPP500 system, the AP3000 system and the Paragon system at Center for Promotion of Computational Science and Engineering in Japan Atomic Energy Research Institute. We dealt with 12 codes in fiscal 1998. These results are reported in 3 parts, i.e., the vectorization and parallelization on vector processors part, the parallelization on scalar processors part and the porting part. In this report, we describe the vectorization and parallelization on vector processors. In this vectorization and parallelization on vector processors part, the vectorization of General Tokamak Circuit Simulation Program code GTCSP, the vectorization and parallelization of Molecular Dynamics NTV (n-particle, Temperature and Velocity) Simulation code MSP2, Eddy Current Analysis code EDDYCAL, Thermal Analysis Code for Test of Passive Cooling System by HENDEL T2 code THANPACST2 and MHD Equilibrium code SELENEJ on the VPP500 are described. In the parallelization on scalar processors part, the parallelization of Monte Carlo N-Particle Transport code MCNP4B2, Plasma Hydrodynamics code using Cubic Interpolated Propagation Method PHCIP and Vectorized Monte Carlo code (continuous energy model / multi-group model) MVP/GMVP on the Paragon are described. In the porting part, the porting of Monte Carlo N-Particle Transport code MCNP4B2 and Reactor Safety Analysis code RELAP5 on the AP3000 are described. (author)

  8. The opportunity-threat theory of decision-making under risk

    OpenAIRE

    Mohan Pandey

    2018-01-01

    A new theory of decision-making under risk, the Opportunity-Threat Theory is proposed. Analysis of risk into opportunity and threat components allows description of behavior as a combination of opportunity seeking and threat aversion. Expected utility is a special case of this model. The final evaluation is an integration of the impacts of opportunity and threat with this expectation. The model can account for basic results as well as several ``new paradoxes'' that refuted c...

  9. Terrorist threat and perceived Islamic support for terrorist attacks as predictors of personal and institutional out-group discrimination and support for anti-immigration policies: evidence from 9 European countries

    NARCIS (Netherlands)

    Doosje, B.; Zimmermann, A.; Küpper, B.; Zick, A.; Meertens, R.

    2009-01-01

    Traditionally, research has shown that subtle and blatant prejudices are important predictors of out-group discrimination and support for anti-immigration policies. The present paper shows that, when controlling for these types of prejudices and for political conservatism, terrorist threat and

  10. Equivalent Vectors

    Science.gov (United States)

    Levine, Robert

    2004-01-01

    The cross-product is a mathematical operation that is performed between two 3-dimensional vectors. The result is a vector that is orthogonal or perpendicular to both of them. Learning about this for the first time while taking Calculus-III, the class was taught that if AxB = AxC, it does not necessarily follow that B = C. This seemed baffling. The…

  11. Using sensory experiments to determine consumers willingness to pay for traditional apple varieties

    Energy Technology Data Exchange (ETDEWEB)

    Dinis, I.; Simoes, O.; Moreira, J.

    2011-07-01

    The last two decades have witnessed an increasing enthusiasm of consumers for products with specific characteristics, whether related to origin or production technology. Several studies show that consumers are willing to pay price premium for organic products and we may expect that the same happens with other attributes, such as origin and tradition. The aim of this study, based on surveys conducted in the context of a taste panel, is to establish the price premium that consumers are willing to pay for the feature traditional variety, using Portuguese traditional varieties of apples as a case study. Using contingent valuation to determine the willingness to pay and panel data techniques for estimation, a hedonic price model is developed to explain how the price that consumers declare to be willing to pay is related, besides variety, to different attributes of apples, such as appearance and taste, production method and threat of extinction. The results suggest that consumers, regardless of their socio-economic characteristics, are willing to pay a higher price not only for apples with better taste, appearance and smell, but also for Portuguese traditional varieties. (Author) 48 refs.

  12. Pervasive competition between threat and reward in the brain.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Spechler, Philip; Pessoa, Luiz

    2014-06-01

    In the current functional MRI study, we investigated interactions between reward and threat processing. Visual cues at the start of each trial informed participants about the chance of winning monetary reward and/or receiving a mild aversive shock. We tested two competing hypothesis: according to the 'salience hypothesis', in the condition involving both reward and threat, enhanced activation would be observed because of increased salience; according to the 'competition hypothesis', the processing of reward and threat would trade-off against each other, leading to reduced activation. Analysis of skin conductance data during a delay phase revealed an interaction between reward and threat processing, such that the effect of reward was reduced during threat and the effect of threat was reduced during reward. Analysis of imaging data during the same task phase revealed interactions between reward and threat processing in several regions, including the midbrain/ventral tegmental area, caudate, putamen, bed nucleus of the stria terminalis, anterior insula, middle frontal gyrus and dorsal anterior cingulate cortex. Taken together, our findings reveal conditions during which reward and threat trade-off against each other across multiple sites. Such interactions are suggestive of competitive processes and may reflect the organization of opponent systems in the brain. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  13. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Science.gov (United States)

    Pennington, Charlotte R; Kaye, Linda K; McCann, Joseph J

    2018-01-01

    Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target) or gender group's ability (group-as-target) or would be non-diagnostic of gaming ability (control). In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source) or males (out-group source), or would be non-diagnostic of ability (control). Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  14. Applying the multi-threat framework of stereotype threat in the context of digital gaming.

    Directory of Open Access Journals (Sweden)

    Charlotte R Pennington

    Full Text Available Females often report experiencing stigmatisation pertaining to their competency in digital gaming communities. Employing the principles of the multi-threat framework of stereotype threat, the current research examined the impact of gender-related stereotypes on females' gaming performance and related self-perceptions. In Experiment 1, 90 females were assigned to one of three conditions in which they were primed that their performance would be either diagnostic of their personal (self-as-target or gender group's ability (group-as-target or would be non-diagnostic of gaming ability (control. In Experiment 2, 90 females were primed that their performance would be judged by a group of other females (in-group source or males (out-group source, or would be non-diagnostic of ability (control. Participants then completed a casual gaming task, as well as measures of competence beliefs, self-efficacy and self-esteem. Findings from Experiment 1 indicate that neither a self-as-target nor a group-as-target stereotype affected significantly gaming performance, or game-related self-efficacy, self-esteem and competency beliefs. Findings from Experiment 2 reveal further that females' gaming performance and associated self-perceptions were not impacted significantly by an in-group or out-group source of stereotype threat. The discussion turns to potential explanations for these findings, proposing that females may not perceive negative gender-gaming stereotypes to be an accurate representation of their personal or social group's gaming ability. We also discuss the implications of the experimental design and difficulty, as well as the potential for domain identification to moderate performance outcomes under stereotype threat.

  15. Comparative Analysis of Automatic Exudate Detection between Machine Learning and Traditional Approaches

    Science.gov (United States)

    Sopharak, Akara; Uyyanonvara, Bunyarit; Barman, Sarah; Williamson, Thomas

    To prevent blindness from diabetic retinopathy, periodic screening and early diagnosis are neccessary. Due to lack of expert ophthalmologists in rural area, automated early exudate (one of visible sign of diabetic retinopathy) detection could help to reduce the number of blindness in diabetic patients. Traditional automatic exudate detection methods are based on specific parameter configuration, while the machine learning approaches which seems more flexible may be computationally high cost. A comparative analysis of traditional and machine learning of exudates detection, namely, mathematical morphology, fuzzy c-means clustering, naive Bayesian classifier, Support Vector Machine and Nearest Neighbor classifier are presented. Detected exudates are validated with expert ophthalmologists' hand-drawn ground-truths. The sensitivity, specificity, precision, accuracy and time complexity of each method are also compared.

  16. Sensitivity towards fear of electric shock in passive threat situations.

    Directory of Open Access Journals (Sweden)

    Patrick Ring

    Full Text Available Human judgment and decision-making (JDM requires an assessment of different choice options. While traditional theories of choice argue that cognitive processes are the main driver to reach a decision, growing evidence highlights the importance of emotion in decision-making. Following these findings, it appears relevant to understand how individuals asses the attractiveness or riskiness of a situation in terms of emotional processes. The following study aims at a better understanding of the psychophysiological mechanisms underlying threat sensitivity by measuring skin conductance responses (SCRs in passive threat situations. While previous studies demonstrate the role of magnitude on emotional body reactions preceding an outcome, this study focuses on probability. In order to analyze emotional body reactions preceding negative events with varying probability of occurrence, we have our participants play a two-stage card game. The first stage of the card game reveals the probability of receiving an unpleasant electric shock. The second stage applies the electric shock with the previously announced probability. For the analysis, we focus on the time interval between the first and second stage. We observe a linear relation between SCRs in anticipation of receiving an electric shock and shock probability. This finding indicates that SCRs are able to code the likelihood of negative events. We outline how this coding function of SCRs during the anticipation of negative events might add to an understanding of human JDM.

  17. Vectorization at the KENO-IV code

    International Nuclear Information System (INIS)

    Asai, K.; Higuchi, K.; Katakura, J.

    1986-01-01

    The multigroup criticality safety code KENO-IV has been vectorized and tested on the FACOM VP-100 vector processor. At first, the vectorized KENO-IV on a scalar processor was slower than the original one by a factor of 1.4 because of the overhead introduced by vectorization. Making modifications of algorithms and techniques for vectorization, the vectorized version has become faster than the original one by a factor of 1.4 on the vector processor. For further speedup of the code, some improvements on compiler and hardware, especially on addition of Monte Carlo pipelines to the vector processor, are discussed

  18. Reciprocity relationships in vector acoustics and their application to vector field calculations.

    Science.gov (United States)

    Deal, Thomas J; Smith, Kevin B

    2017-08-01

    The reciprocity equation commonly stated in underwater acoustics relates pressure fields and monopole sources. It is often used to predict the pressure measured by a hydrophone for multiple source locations by placing a source at the hydrophone location and calculating the field everywhere for that source. A similar equation that governs the orthogonal components of the particle velocity field is needed to enable this computational method to be used for acoustic vector sensors. This paper derives a general reciprocity equation that accounts for both monopole and dipole sources. This vector-scalar reciprocity equation can be used to calculate individual components of the received vector field by altering the source type used in the propagation calculation. This enables a propagation model to calculate the received vector field components for an arbitrary number of source locations with a single model run for each vector field component instead of requiring one model run for each source location. Application of the vector-scalar reciprocity principle is demonstrated with analytic solutions for a range-independent environment and with numerical solutions for a range-dependent environment using a parabolic equation model.

  19. Vectors and their applications

    CERN Document Server

    Pettofrezzo, Anthony J

    2005-01-01

    Geared toward undergraduate students, this text illustrates the use of vectors as a mathematical tool in plane synthetic geometry, plane and spherical trigonometry, and analytic geometry of two- and three-dimensional space. Its rigorous development includes a complete treatment of the algebra of vectors in the first two chapters.Among the text's outstanding features are numbered definitions and theorems in the development of vector algebra, which appear in italics for easy reference. Most of the theorems include proofs, and coordinate position vectors receive an in-depth treatment. Key concept

  20. Stereotype threat in salary negotiations is mediated by reservation salary.

    Science.gov (United States)

    Tellhed, Una; Björklund, Fredrik

    2011-04-01

    Women are stereotypically perceived as worse negotiators than men, which may make them ask for less salary than men when under stereotype threat (Kray et al., 2001). However, the mechanisms of stereotype threat are not yet properly understood. The current study investigated whether stereotype threat effects in salary negotiations can be explained by motivational factors. A total of 116 business students negotiated salary with a confederate and were either told that this was diagnostic of negotiating ability (threat manipulation) or not. Measures of minimum (reservation) and ideal (aspiration) salary goals and regulatory focus were collected. The finding (Kray et al., 2001) that women make lower salary requests than men when under stereotype threat was replicated. Women in the threat condition further reported lower aspiration salary, marginally significantly lower reservation salary and less eagerness/more vigilance than men. Reservation salary mediated the stereotype threat effect, and there was a trend for regulatory focus to mediate the effect. Thus, reservation salary partly explains why women ask for less salary than men under stereotype threat. Female negotiators may benefit from learning that stereotype threat causes sex-differences in motivation. © 2010 The Authors. Scandinavian Journal of Psychology © 2010 The Scandinavian Psychological Associations.

  1. Convexity and Marginal Vectors

    NARCIS (Netherlands)

    van Velzen, S.; Hamers, H.J.M.; Norde, H.W.

    2002-01-01

    In this paper we construct sets of marginal vectors of a TU game with the property that if the marginal vectors from these sets are core elements, then the game is convex.This approach leads to new upperbounds on the number of marginal vectors needed to characterize convexity.An other result is that

  2. Maintaining distinctions under threat: heterosexual men endorse the biological theory of sexuality when equality is the norm.

    Science.gov (United States)

    Falomir-Pichastor, Juan M; Hegarty, Peter

    2014-12-01

    According to social identity theory, group members sometimes react to threats to their group's distinctiveness by asserting the distinctiveness of their group. In four studies (n = 261) we tested the hypothesis that heterosexual men with a greater propensity to be threatened by homosexuality would react to egalitarian norms by endorsing biological theories of sexuality. Heterosexual men, but not women, with narrow prototypes of their gender in-group endorsed biological theories the most (Study 1). Heterosexual men with higher gender self-esteem, with heterosexist attitudes, who endorsed traditional gender roles, and with narrow prototypes of their gender in-group, endorsed the biological theories more when egalitarian norms rather than anti-egalitarian norms (Studies 2 and 3) or pro-minority ideologies that emphasized group differences (Study 4) were made salient. These findings show group-level reactive distinctiveness among members of a high-status group in a context of threat to the unique privileges that they once enjoyed. © 2013 The British Psychological Society.

  3. Insider threat to secure facilities: data analysis

    International Nuclear Information System (INIS)

    1980-01-01

    Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs

  4. Optimized support vector regression for drilling rate of penetration estimation

    Science.gov (United States)

    Bodaghi, Asadollah; Ansari, Hamid Reza; Gholami, Mahsa

    2015-12-01

    In the petroleum industry, drilling optimization involves the selection of operating conditions for achieving the desired depth with the minimum expenditure while requirements of personal safety, environment protection, adequate information of penetrated formations and productivity are fulfilled. Since drilling optimization is highly dependent on the rate of penetration (ROP), estimation of this parameter is of great importance during well planning. In this research, a novel approach called `optimized support vector regression' is employed for making a formulation between input variables and ROP. Algorithms used for optimizing the support vector regression are the genetic algorithm (GA) and the cuckoo search algorithm (CS). Optimization implementation improved the support vector regression performance by virtue of selecting proper values for its parameters. In order to evaluate the ability of optimization algorithms in enhancing SVR performance, their results were compared to the hybrid of pattern search and grid search (HPG) which is conventionally employed for optimizing SVR. The results demonstrated that the CS algorithm achieved further improvement on prediction accuracy of SVR compared to the GA and HPG as well. Moreover, the predictive model derived from back propagation neural network (BPNN), which is the traditional approach for estimating ROP, is selected for comparisons with CSSVR. The comparative results revealed the superiority of CSSVR. This study inferred that CSSVR is a viable option for precise estimation of ROP.

  5. Top 10 ways to reconcile social media and 'traditional' education in emergency care.

    Science.gov (United States)

    Roland, Damian; Brazil, Victoria

    2015-10-01

    Social media has been viewed by some as a threat to traditional medical education. In emergency care, the underpinning educational principles of social media, while sometimes innovative in their delivery, are often no different than long-standing techniques and methods. This article aims to encourage discussion and debate that reduces the divide between these two communities of practice. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  6. Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    The two branches of dynamical systems, continuous and discrete, correspond to the study of differential equations (vector fields) and iteration of mappings respectively. In holomorphic dynamics, the systems studied are restricted to those described by holomorphic (complex analytic) functions...... or meromorphic (allowing poles as singularities) functions. There already exists a well-developed theory for iterative holomorphic dynamical systems, and successful relations found between iteration theory and flows of vector fields have been one of the main motivations for the recent interest in holomorphic...... vector fields. Since the class of complex polynomial vector fields in the plane is natural to consider, it is remarkable that its study has only begun very recently. There are numerous fundamental questions that are still open, both in the general classification of these vector fields, the decomposition...

  7. Left-Wing Extremism: The Current Threat

    Energy Technology Data Exchange (ETDEWEB)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  8. Emerging and Future Cyber Threats to Critical Systems

    OpenAIRE

    Djambazova , Edita; Almgren , Magnus; Dimitrov , Kiril; Jonsson , Erland

    2010-01-01

    Part 2: Adversaries; International audience; This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the character...

  9. Vector financial rogue waves

    International Nuclear Information System (INIS)

    Yan, Zhenya

    2011-01-01

    The coupled nonlinear volatility and option pricing model presented recently by Ivancevic is investigated, which generates a leverage effect, i.e., stock volatility is (negatively) correlated to stock returns, and can be regarded as a coupled nonlinear wave alternative of the Black–Scholes option pricing model. In this Letter, we analytically propose vector financial rogue waves of the coupled nonlinear volatility and option pricing model without an embedded w-learning. Moreover, we exhibit their dynamical behaviors for chosen different parameters. The vector financial rogue wave (rogon) solutions may be used to describe the possible physical mechanisms for the rogue wave phenomena and to further excite the possibility of relative researches and potential applications of vector rogue waves in the financial markets and other related fields. -- Highlights: ► We investigate the coupled nonlinear volatility and option pricing model. ► We analytically present vector financial rogue waves. ► The vector financial rogue waves may be used to describe the extreme events in financial markets. ► This results may excite the relative researches and potential applications of vector rogue waves.

  10. Video Vectorization via Tetrahedral Remeshing.

    Science.gov (United States)

    Wang, Chuan; Zhu, Jie; Guo, Yanwen; Wang, Wenping

    2017-02-09

    We present a video vectorization method that generates a video in vector representation from an input video in raster representation. A vector-based video representation offers the benefits of vector graphics, such as compactness and scalability. The vector video we generate is represented by a simplified tetrahedral control mesh over the spatial-temporal video volume, with color attributes defined at the mesh vertices. We present novel techniques for simplification and subdivision of a tetrahedral mesh to achieve high simplification ratio while preserving features and ensuring color fidelity. From an input raster video, our method is capable of generating a compact video in vector representation that allows a faithful reconstruction with low reconstruction errors.

  11. Game Theoretic Risk Analysis of Security Threats

    CERN Document Server

    Bier, Vicki M

    2008-01-01

    Introduces reliability and risk analysis in the face of threats by intelligent agents. This book covers applications to networks, including problems in both telecommunications and transportation. It provides a set of tools for applying game theory TO reliability problems in the presence of intentional, intelligent threats

  12. Advanced Insider Threat Mitigation Workshop Instructional Materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O' Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2009-02-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is an update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios. This report is a compilation of workshop materials consisting of lectures on technical and administrative measures used in Physical Protection (PP) and Material Control and Accounting (MC&A) and methods for analyzing their effectiveness against a postulated insider threat. The postulated threat includes both abrupt and protracted theft scenarios. Presentation is envisioned to be through classroom instruction and discussion. Several practical and group exercises are included for demonstration and application of the analysis approach contained in the lecture/discussion sessions as applied to a hypothetical nuclear facility.

  13. Implicit self-esteem compensation: automatic threat defense.

    Science.gov (United States)

    Rudman, Laurie A; Dohn, Matthew C; Fairchild, Kimberly

    2007-11-01

    Four experiments demonstrated implicit self-esteem compensation (ISEC) in response to threats involving gender identity (Experiment 1), implicit racism (Experiment 2), and social rejection (Experiments 3-4). Under conditions in which people might be expected to suffer a blow to self-worth, they instead showed high scores on 2 implicit self-esteem measures. There was no comparable effect on explicit self-esteem. However, ISEC was eliminated following self-affirmation (Experiment 3). Furthermore, threat manipulations increased automatic intergroup bias, but ISEC mediated these relationships (Experiments 2-3). Thus, a process that serves as damage control for the self may have negative social consequences. Finally, pretest anxiety mediated the relationship between threat and ISEC (Experiment 3), whereas ISEC negatively predicted anxiety among high-threat participants (Experiment 4), suggesting that ISEC may function to regulate anxiety. The implications of these findings for automatic emotion regulation, intergroup bias, and implicit self-esteem measures are discussed. (c) 2007 APA, all rights reserved.

  14. Surveillance of vector-borne diseases in Germany: trends and challenges in the view of disease emergence and climate change.

    Science.gov (United States)

    Jansen, Andreas; Frank, Christina; Koch, Judith; Stark, Klaus

    2008-12-01

    The changing epidemiology of vector-borne diseases represents a growing threat to human health. Contemporary surveillance systems have to adapt to these changes. We describe temporal trends and geographic origins of vector-borne diseases in Germany with regard to strengths of existing disease surveillance and to areas marked for improvement. We focused on hantavirus infection (endemic in Germany), chikungunya fever (recently emerging in Europe) and dengue fever (imported from tropical regions), representing important subgroups of vector-borne infections. Routine surveillance data on demographics, origin of infection and the date of reporting were analysed. From 2001 through 2007, 3,005 symptomatic hantavirus infections, and 85 cases of chikungunya fever were reported, similarly 1,048 cases of dengue fever in 2002 through 2007. The geographic origin of hantavirus infection was reported for 95.5% of all cases (dengue virus, 98.4%; chikungunya virus, 100%). Hantavirus infections were acquired in Germany in 97.6% of cases (n = 2800). In 2007, there was a marked increase of hantavirus cases, mainly in areas known to be endemic for hantavirus. In 2006, imported cases of chikungunya fever primarily returned from several islands of the Indian Ocean, while the majority of imported cases in 2007 came from India. The reported number of dengue fever cases have increased since 2004. Thailand contributed the largest proportion of cases (17-43% in individual years), followed by India, Brazil and Indonesia. Surveillance of notifiable vector-borne diseases in Germany is able to timely detect spatial and temporal changes of autochthonous an imported infections. Geographic and temporal data obtained by routine surveillance served as a basis for public health recommendations. In addition to surveillance of vector-borne infections in humans, nationwide monitoring programs and inventory techniques for emerging and reemerging vectors and for wildlife disease are warranted.

  15. Selection vector filter framework

    Science.gov (United States)

    Lukac, Rastislav; Plataniotis, Konstantinos N.; Smolka, Bogdan; Venetsanopoulos, Anastasios N.

    2003-10-01

    We provide a unified framework of nonlinear vector techniques outputting the lowest ranked vector. The proposed framework constitutes a generalized filter class for multichannel signal processing. A new class of nonlinear selection filters are based on the robust order-statistic theory and the minimization of the weighted distance function to other input samples. The proposed method can be designed to perform a variety of filtering operations including previously developed filtering techniques such as vector median, basic vector directional filter, directional distance filter, weighted vector median filters and weighted directional filters. A wide range of filtering operations is guaranteed by the filter structure with two independent weight vectors for angular and distance domains of the vector space. In order to adapt the filter parameters to varying signal and noise statistics, we provide also the generalized optimization algorithms taking the advantage of the weighted median filters and the relationship between standard median filter and vector median filter. Thus, we can deal with both statistical and deterministic aspects of the filter design process. It will be shown that the proposed method holds the required properties such as the capability of modelling the underlying system in the application at hand, the robustness with respect to errors in the model of underlying system, the availability of the training procedure and finally, the simplicity of filter representation, analysis, design and implementation. Simulation studies also indicate that the new filters are computationally attractive and have excellent performance in environments corrupted by bit errors and impulsive noise.

  16. Stereotype threat can both enhance and impair older adults' memory.

    Science.gov (United States)

    Barber, Sarah J; Mather, Mara

    2013-12-01

    Negative stereotypes about aging can impair older adults' memory via stereotype threat; however, the mechanisms underlying this phenomenon are unclear. In two experiments, we tested competing predictions derived from two theoretical accounts of stereotype threat: executive-control interference and regulatory fit. Older adults completed a working memory test either under stereotype threat about age-related memory declines or not under such threat. Monetary incentives were manipulated such that recall led to gains or forgetting led to losses. The executive-control-interference account predicts that stereotype threat decreases the availability of executive-control resources and hence should impair working memory performance. The regulatory-fit account predicts that threat induces a prevention focus, which should impair performance when gains are emphasized but improve performance when losses are emphasized. Results were consistent only with the regulatory-fit account. Although stereotype threat significantly impaired older adults' working memory performance when remembering led to gains, it significantly improved performance when forgetting led to losses.

  17. The consequences of chronic stereotype threat: domain disidentification and abandonment.

    Science.gov (United States)

    Woodcock, Anna; Hernandez, Paul R; Estrada, Mica; Schultz, P Wesley

    2012-10-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s "leak" from each juncture of the academic scientific pipeline in disproportionately greater numbers than their White and Asian counterparts. Using structural equation modeling, we tested the stereotype threat-disidentification hypothesis across 3 academic years with a national longitudinal panel of undergraduate minority science students. Experience of stereotype threat was associated with scientific disidentification, which in turn predicted a significant decline in the intention to pursue a scientific career. Race/ethnicity moderated this effect, whereby the effect was evident for Hispanic/Latino(a) students but not for all African American students. We discuss findings in terms of understanding chronic stereotype threat.

  18. 41 CFR 60-741.22 - Direct threat defense.

    Science.gov (United States)

    2010-07-01

    ... INDIVIDUALS WITH DISABILITIES Discrimination Prohibited § 60-741.22 Direct threat defense. The contractor may... individual or others in the workplace. (See § 60-741.2(y) defining direct threat.) ...

  19. Threat evaluation for impact assessment in situation analysis systems

    Science.gov (United States)

    Roy, Jean; Paradis, Stephane; Allouche, Mohamad

    2002-07-01

    Situation analysis is defined as a process, the examination of a situation, its elements, and their relations, to provide and maintain a product, i.e., a state of situation awareness, for the decision maker. Data fusion is a key enabler to meeting the demanding requirements of military situation analysis support systems. According to the data fusion model maintained by the Joint Directors of Laboratories' Data Fusion Group, impact assessment estimates the effects on situations of planned or estimated/predicted actions by the participants, including interactions between action plans of multiple players. In this framework, the appraisal of actual or potential threats is a necessary capability for impact assessment. This paper reviews and discusses in details the fundamental concepts of threat analysis. In particular, threat analysis generally attempts to compute some threat value, for the individual tracks, that estimates the degree of severity with which engagement events will potentially occur. Presenting relevant tracks to the decision maker in some threat list, sorted from the most threatening to the least, is clearly in-line with the cognitive demands associated with threat evaluation. A key parameter in many threat value evaluation techniques is the Closest Point of Approach (CPA). Along this line of thought, threatening tracks are often prioritized based upon which ones will reach their CPA first. Hence, the Time-to-CPA (TCPA), i.e., the time it will take for a track to reach its CPA, is also a key factor. Unfortunately, a typical assumption for the computation of the CPA/TCPA parameters is that the track velocity will remain constant. When a track is maneuvering, the CPA/TCPA values will change accordingly. These changes will in turn impact the threat value computations and, ultimately, the resulting threat list. This is clearly undesirable from a command decision-making perspective. In this regard, the paper briefly discusses threat value stabilization

  20. Symbolic computer vector analysis

    Science.gov (United States)

    Stoutemyer, D. R.

    1977-01-01

    A MACSYMA program is described which performs symbolic vector algebra and vector calculus. The program can combine and simplify symbolic expressions including dot products and cross products, together with the gradient, divergence, curl, and Laplacian operators. The distribution of these operators over sums or products is under user control, as are various other expansions, including expansion into components in any specific orthogonal coordinate system. There is also a capability for deriving the scalar or vector potential of a vector field. Examples include derivation of the partial differential equations describing fluid flow and magnetohydrodynamics, for 12 different classic orthogonal curvilinear coordinate systems.

  1. MODERN OR TRADITIONAL TEACHING STRATEGY IN LEARNING ENGINEERING MATHEMATICS COURSE

    Directory of Open Access Journals (Sweden)

    N. RAZALI

    2016-11-01

    Full Text Available First-year engineering students of the Faculty of Engineering and Built Environment, UKM are in the process of transition in the way they learn mathematics from pre-university level to the undergraduate level. It is essential for good engineers to have the ability to unfold mathematical problems in an efficient way. Thus, this research is done to investigate students preference in learning KKKQ1123 Engineering Mathematics I (Vector Calculus (VC course; either individually or in a team; using modern (e-learning or traditional (cooperative-learning teaching strategy. Questionnaires are given to the first year Chemical and Process Engineering students from academic year 2015/2016 and the results were analysed. Based on the finding, the students believed that the physical educators or teachers play an important role and that they have slightest preference in the traditional teaching strategy to learn engineering mathematics course.

  2. Credit Scoring by Fuzzy Support Vector Machines with a Novel Membership Function

    Directory of Open Access Journals (Sweden)

    Jian Shi

    2016-11-01

    Full Text Available Due to the recent financial crisis and European debt crisis, credit risk evaluation has become an increasingly important issue for financial institutions. Reliable credit scoring models are crucial for commercial banks to evaluate the financial performance of clients and have been widely studied in the fields of statistics and machine learning. In this paper a novel fuzzy support vector machine (SVM credit scoring model is proposed for credit risk analysis, in which fuzzy membership is adopted to indicate different contribution of each input point to the learning of SVM classification hyperplane. Considering the methodological consistency, support vector data description (SVDD is introduced to construct the fuzzy membership function and to reduce the effect of outliers and noises. The SVDD-based fuzzy SVM model is tested against the traditional fuzzy SVM on two real-world datasets and the research results confirm the effectiveness of the presented method.

  3. Antiviral Activities of Several Oral Traditional Chinese Medicines against Influenza Viruses.

    Science.gov (United States)

    Ma, Lin-Lin; Ge, Miao; Wang, Hui-Qiang; Yin, Jin-Qiu; Jiang, Jian-Dong; Li, Yu-Huan

    2015-01-01

    Influenza is still a serious threat to human health with significant morbidity and mortality. The emergence of drug-resistant influenza viruses poses a great challenge to existing antiviral drugs. Traditional Chinese medicines (TCMs) may be an alternative to overcome the challenge. Here, 10 oral proprietary Chinese medicines were selected to evaluate their anti-influenza activities. These drugs exhibit potent inhibitory effects against influenza A H1N1, influenza A H3N2, and influenza B virus. Importantly, they demonstrate potent antiviral activities against drug-resistant strains. In the study of mechanisms, we found that Xiaoqinglong mixture could increase antiviral interferon production by activating p38 MAPK, JNK/SAPK pathway, and relative nuclear transcription factors. Lastly, our studies also indicate that some of these medicines show inhibitory activities against EV71 and CVB strains. In conclusion, the 10 traditional Chinese medicines, as kind of compound combination medicines, show broad-spectrum antiviral activities, possibly also including inhibitory activities against strains resistant to available antiviral drugs.

  4. Identifying key conservation threats to Alpine birds through expert knowledge

    Science.gov (United States)

    Pedrini, Paolo; Brambilla, Mattia; Rolando, Antonio; Girardello, Marco

    2016-01-01

    Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds). For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community. PMID:26966659

  5. Identifying key conservation threats to Alpine birds through expert knowledge

    Directory of Open Access Journals (Sweden)

    Dan E. Chamberlain

    2016-02-01

    Full Text Available Alpine biodiversity is subject to a range of increasing threats, but the scarcity of data for many taxa means that it is difficult to assess the level and likely future impact of a given threat. Expert opinion can be a useful tool to address knowledge gaps in the absence of adequate data. Experts with experience in Alpine ecology were approached to rank threat levels for 69 Alpine bird species over the next 50 years for the whole European Alps in relation to ten categories: land abandonment, climate change, renewable energy, fire, forestry practices, grazing practices, hunting, leisure, mining and urbanization. There was a high degree of concordance in ranking of perceived threats among experts for most threat categories. The major overall perceived threats to Alpine birds identified through expert knowledge were land abandonment, urbanization, leisure and forestry, although other perceived threats were ranked highly for particular species groups (renewable energy and hunting for raptors, hunting for gamebirds. For groups of species defined according to their breeding habitat, open habitat species and treeline species were perceived as the most threatened. A spatial risk assessment tool based on summed scores for the whole community showed threat levels were highest for bird communities of the northern and western Alps. Development of the approaches given in this paper, including addressing biases in the selection of experts and adopting a more detailed ranking procedure, could prove useful in the future in identifying future threats, and in carrying out risk assessments based on levels of threat to the whole bird community.

  6. Threat ≠ prevention, challenge ≠ promotion: the impact of threat, challenge and regulatory focus on attention to negative stimuli.

    Science.gov (United States)

    Sassenberg, Kai; Sassenrath, Claudia; Fetterman, Adam K

    2015-01-01

    The purpose of the current experiment was to distinguish between the impact of strategic and affective forms of gain- and loss-related motivational states on the attention to negative stimuli. On the basis of the counter-regulation principle and regulatory focus theory, we predicted that individuals would attend more to negative than to neutral stimuli in a prevention focus and when experiencing challenge, but not in a promotion focus and under threat. In one experiment (N = 88) promotion, prevention, threat, or challenge states were activated through a memory task, and a subsequent dot probe task was administered. As predicted, those in the prevention focus and challenge conditions had an attentional bias towards negative words, but those in promotion and threat conditions did not. These findings provide support for the idea that strategic mindsets (e.g., regulatory focus) and hot emotional states (e.g., threat vs. challenge) differently affect the processing of affective stimuli.

  7. Vector continued fractions using a generalized inverse

    International Nuclear Information System (INIS)

    Haydock, Roger; Nex, C M M; Wexler, Geoffrey

    2004-01-01

    A real vector space combined with an inverse (involution) for vectors is sufficient to define a vector continued fraction whose parameters consist of vector shifts and changes of scale. The choice of sign for different components of the vector inverse permits construction of vector analogues of the Jacobi continued fraction. These vector Jacobi fractions are related to vector and scalar-valued polynomial functions of the vectors, which satisfy recurrence relations similar to those of orthogonal polynomials. The vector Jacobi fraction has strong convergence properties which are demonstrated analytically, and illustrated numerically

  8. Archaeological Vector Graphics and SVG: A case study from Cricklade

    Directory of Open Access Journals (Sweden)

    Holly Wright

    2006-07-01

    Full Text Available Currently, there are a variety of ways to make vector-based information available on the Web, but most are browser- and platform-dependent, proprietary, and unevenly supported (Laaker 2002, 13. Of the various solutions currently being explored by the greater Web community, one of the most promising is called Scalable Vector Graphics (SVG, which is part of the eXtensible Markup Language (XML. SVG was defined by a working group of the World Wide Web Consortium (W3C and has subsequently become their official recommendation for representing vector graphics on the Web in XML (Eisenberg 2002, 6; Watt 2002, xviii. Because SVG is an XML application, it is freely available, not dependent on a particular browser or platform, and interoperable with other XML applications. While there is no guarantee that SVG will be widely adopted for rendering vector-based information on the Web, development and recommendation by the W3C generally carries a great deal of weight, especially as browser developers move towards less proprietary support of W3C standards. In addition, use of XML continues to grow, so XML-based solutions like SVG should be explored by those interested in presenting vector graphics on the Web (Harold and Means 2002, 3. This discussion explores SVG as a potential tool for archaeologists. It includes some of the ways vector graphics are used in archaeology, and outlines the development and features of SVG, which are then demonstrated in the form of a case study. Large-scale plan and section drawings originally created on Permatrace were digitised by Guy Hopkinson for use in the Internet Archaeology publication Excavations at Cricklade, Wiltshire, 1975, by Jeremy Haslam, designed as an exercise in 'retrospective publication', to illustrate how traditional forms of visual recording might be digitised for online publication. Hopkinson went on to publish his methodology jointly with Internet Archaeology editor, Judith Winters in Problems with

  9. A tough egg to crack: recreational boats as vectors for invasive goby eggs and transdisciplinary management approaches.

    Science.gov (United States)

    Hirsch, Philipp E; Adrian-Kalchhauser, Irene; Flämig, Sylvie; N'Guyen, Anouk; Defila, Rico; Di Giulio, Antonietta; Burkhardt-Holm, Patricia

    2016-02-01

    Non-native invasive species are a major threat to biodiversity, especially in freshwater ecosystems. Freshwater ecosystems are naturally rather isolated from one another. Nonetheless, invasive species often spread rapidly across water sheds. This spread is to a large extent realized by human activities that provide vectors. For example, recreational boats can carry invasive species propagules as "aquatic hitch-hikers" within and across water sheds. We used invasive gobies in Switzerland as a case study to test the plausibility that recreational boats can serve as vectors for invasive fish and that fish eggs can serve as propagules. We found that the peak season of boat movements across Switzerland and the goby spawning season overlap temporally. It is thus plausible that goby eggs attached to boats, anchors, or gear may be transported across watersheds. In experimental trials, we found that goby eggs show resistance to physical removal (90 mN attachment strength of individual eggs) and stay attached if exposed to rapid water flow (2.8 m·s(-1)for 1 h). When exposing the eggs to air, we found that hatching success remained high (>95%) even after eggs had been out of water for up to 24 h. It is thus plausible that eggs survive pick up, within-water and overland transport by boats. We complemented the experimental plausibility tests with a survey on how decision makers from inside and outside academia rate the feasibility of managing recreational boats as vectors. We found consensus that an installation of a preventive boat vector management is considered an effective and urgent measure. This study advances our understanding of the potential of recreational boats to serve as vectors for invasive vertebrate species and demonstrates that preventive management of recreational boats is considered feasible by relevant decision makers inside and outside academia.

  10. Sequencing the threat and recommendation components of persuasive messages differentially improves the effectiveness of high- and low-distressing imagery in an anti-alcohol message in students.

    Science.gov (United States)

    Brown, Stephen L; West, Charlotte

    2015-05-01

    Distressing imagery is often used to improve the persuasiveness of mass-reach health promotion messages, but its effectiveness may be limited because audiences avoid attending to content. Prior self-affirmation or self-efficacy inductions have been shown to reduce avoidance and improve audience responsiveness to distressing messages, but these are difficult to introduce into a mass-reach context. Reasoning that a behavioural recommendation may have a similar effect, we reversed the traditional threat-behavioural recommendation health promotion message sequence. 2 × 2 experimental design: Factor 1, high- and low-distress images; Factor 2, threat-recommendation and recommendation-threat sequences. Ninety-one students were exposed to an identical text message accompanied by high- or low-distress imagery presented in threat-recommendation and recommendation-threat sequences. For the high-distress message, greater persuasion was observed for the recommendation-threat than the threat-recommendation sequence. This was partially mediated by participants' greater self-exposure to the threat component of the message, which we attribute to the effect of sequence in reducing attentional avoidance. For the low-distress message, greater persuasion was observed for the threat-recommendation sequence, which was not mediated by reading time allocated to the threat. Tailoring message sequence to suit the degree of distress that message developers wish to induce provides a tool that could improve persuasive messages. These findings provide a first step in this process and discuss further steps needed to consolidate and expand these findings. Statement of contribution What is already known on this subject? Health promotion messages accompanied by distressing imagery might, under some circumstances, persuade individuals to engage in healthier behaviour. Audiences can respond defensively to distressing imagery, but may be less inclined to do so when an easily followed behavioural

  11. The Cross Product of Two Vectors Is Not Just Another Vector--A Major Misconception Being Perpetuated in Calculus and Vector Analysis Textbooks.

    Science.gov (United States)

    Elk, Seymour B.

    1997-01-01

    Suggests that the cross product of two vectors can be more easily and accurately explained by starting from the perspective of dyadics because then the concept of vector multiplication has a simple geometrical picture that encompasses both the dot and cross products in any number of dimensions in terms of orthogonal unit vector components. (AIM)

  12. Major vectors and vector-borne diseases in small ruminants in Ethiopia: A systematic review.

    Science.gov (United States)

    Asmare, Kassahun; Abayneh, Takele; Sibhat, Berhanu; Shiferaw, Dessie; Szonyi, Barbara; Krontveit, Randi I; Skjerve, Eystein; Wieland, Barbara

    2017-06-01

    Vector-borne diseases are among major health constraints of small ruminant in Ethiopia. While various studies on single vector-borne diseases or presence of vectors have been conducted, no summarized evidence is available on the occurrence of these diseases and the related vectors. This systematic literature review provides a comprehensive summary on major vectors and vector-borne diseases in small ruminants in Ethiopia. Search for published and unpublished literature was conducted between 8th of January and 25th of June 2015. The search was both manual and electronic. The databases used in electronic search were PubMed, Web of Science, CAB Direct and AJOL. For most of the vector-borne diseases, the summary was limited to narrative synthesis due to lack of sufficient data. Meta-analysis was computed for trypanosomosis and dermatophilosis while meta-regression and sensitivity analysis was done only for trypanososmosis due to lack of sufficient reports on dermatophilosis. Owing emphasis to their vector role, ticks and flies were summarized narratively at genera/species level. In line with inclusion criteria, out of 106 initially identified research reports 43 peer-reviewed articles passed the quality assessment. Data on 7 vector-borne diseases were extracted at species and region level from each source. Accordingly, the pooled prevalence estimate of trypanosomosis was 3.7% with 95% confidence interval (CI) 2.8, 4.9), while that of dermatophilosis was 3.1% (95% CI: 1.6, 6.0). The in-between study variance noted for trypanosomosis was statistically significant (pparasitic presence in blood was documented for babesiosis (3.7% in goats); and anaplasmosis (3.9% in sheep). Serological evidence was retrieved for bluetongue ranging from 34.1% to 46.67% in sheep, and coxiellosis was 10.4% in goats. There was also molecular evidence on the presence of theileriosis in sheep (93%, n=160) and goats (1.9%, n=265). Regarding vectors of veterinary importance, 14 species of ticks in

  13. GPU Accelerated Vector Median Filter

    Science.gov (United States)

    Aras, Rifat; Shen, Yuzhong

    2011-01-01

    Noise reduction is an important step for most image processing tasks. For three channel color images, a widely used technique is vector median filter in which color values of pixels are treated as 3-component vectors. Vector median filters are computationally expensive; for a window size of n x n, each of the n(sup 2) vectors has to be compared with other n(sup 2) - 1 vectors in distances. General purpose computation on graphics processing units (GPUs) is the paradigm of utilizing high-performance many-core GPU architectures for computation tasks that are normally handled by CPUs. In this work. NVIDIA's Compute Unified Device Architecture (CUDA) paradigm is used to accelerate vector median filtering. which has to the best of our knowledge never been done before. The performance of GPU accelerated vector median filter is compared to that of the CPU and MPI-based versions for different image and window sizes, Initial findings of the study showed 100x improvement of performance of vector median filter implementation on GPUs over CPU implementations and further speed-up is expected after more extensive optimizations of the GPU algorithm .

  14. Elucidating transmission dynamics and host-parasite-vector relationships for rodent-borne Bartonella spp. in Madagascar

    Directory of Open Access Journals (Sweden)

    Cara E. Brook

    2017-09-01

    Full Text Available Bartonella spp. are erythrocytic bacteria transmitted via arthropod vectors, which infect a broad range of vertebrate hosts, including humans. We investigated transmission dynamics and host-parasite-vector relationships for potentially zoonotic Bartonella spp. in invasive Rattus rattus hosts and associated arthropod ectoparasites in Madagascar. We identified five distinct species of Bartonella (B. elizabethae 1, B. elizabethae 2, B. phoceensis 1, B. rattimassiliensis 1, and B. tribocorum 1 infecting R. rattus rodents and their ectoparasites. We fit standard epidemiological models to species-specific age-prevalence data for the four Bartonella spp. with sufficient data, thus quantifying age-structured force of infection. Known zoonotic agents, B. elizabethae 1 and 2, were best described by models exhibiting high forces of infection in early age class individuals and allowing for recovery from infection, while B. phoceensis 1 and B. rattimassiliensis 1 were best fit by models of lifelong infection without recovery and substantially lower forces of infection. Nested sequences of B. elizabethae 1 and 2 were recovered from rodent hosts and their Synopsyllus fonquerniei and Xenopsylla cheopsis fleas, with a particularly high prevalence in the outdoor-dwelling, highland-endemic S. fonquerniei. These findings expand on force of infection analyses to elucidate the ecological niche of the zoonotic Bartonella elizabethae complex in Madagascar, hinting at a potential vector role for S. fonquerniei. Our analyses underscore the uniqueness of such ecologies for Bartonella species, which pose a variable range of potential zoonotic threats.

  15. Fast vector quantization using a Bat algorithm for image compression

    Directory of Open Access Journals (Sweden)

    Chiranjeevi Karri

    2016-06-01

    Full Text Available Linde–Buzo–Gray (LBG, a traditional method of vector quantization (VQ generates a local optimal codebook which results in lower PSNR value. The performance of vector quantization (VQ depends on the appropriate codebook, so researchers proposed optimization techniques for global codebook generation. Particle swarm optimization (PSO and Firefly algorithm (FA generate an efficient codebook, but undergoes instability in convergence when particle velocity is high and non-availability of brighter fireflies in the search space respectively. In this paper, we propose a new algorithm called BA-LBG which uses Bat Algorithm on initial solution of LBG. It produces an efficient codebook with less computational time and results very good PSNR due to its automatic zooming feature using adjustable pulse emission rate and loudness of bats. From the results, we observed that BA-LBG has high PSNR compared to LBG, PSO-LBG, Quantum PSO-LBG, HBMO-LBG and FA-LBG, and its average convergence speed is 1.841 times faster than HBMO-LBG and FA-LBG but no significance difference with PSO.

  16. Space Vector Pulse Width Modulation Strategy for Single-Phase Three-Level CIC T-source Inverter

    DEFF Research Database (Denmark)

    Shults, Tatiana E.; Husev, Oleksandr O.; Blaabjerg, Frede

    2016-01-01

    This paper presents a novel space vector pulse-width modulation strategy for a single-phase three-level buck-boost inverter based on an impedance-source network. The case study system is based on T-source inverter with continuous input current. To demonstrate the improved performance of the inver......This paper presents a novel space vector pulse-width modulation strategy for a single-phase three-level buck-boost inverter based on an impedance-source network. The case study system is based on T-source inverter with continuous input current. To demonstrate the improved performance...... of the inverter, the strategy was compared the traditional pulse-width modulation. It is shown that the approach proposed has fewer switching states and does not suffer from neutral point misbalance....

  17. Effects of threat management interactions on conservation priorities.

    Science.gov (United States)

    Auerbach, Nancy A; Wilson, Kerrie A; Tulloch, Ayesha I T; Rhodes, Jonathan R; Hanson, Jeffrey O; Possingham, Hugh P

    2015-12-01

    Decisions need to be made about which biodiversity management actions are undertaken to mitigate threats and about where these actions are implemented. However, management actions can interact; that is, the cost, benefit, and feasibility of one action can change when another action is undertaken. There is little guidance on how to explicitly and efficiently prioritize management for multiple threats, including deciding where to act. Integrated management could focus on one management action to abate a dominant threat or on a strategy comprising multiple actions to abate multiple threats. Furthermore management could be undertaken at sites that are in close proximity to reduce costs. We used cost-effectiveness analysis to prioritize investments in fire management, controlling invasive predators, and reducing grazing pressure in a bio-diverse region of southeastern Queensland, Australia. We compared outcomes of 5 management approaches based on different assumptions about interactions and quantified how investment needed, benefits expected, and the locations prioritized for implementation differed when interactions were taken into account. Managing for interactions altered decisions about where to invest and in which actions to invest and had the potential to deliver increased investment efficiency. Differences in high priority locations and actions were greatest between the approaches when we made different assumptions about how management actions deliver benefits through threat abatement: either all threats must be managed to conserve species or only one management action may be required. Threatened species management that does not consider interactions between actions may result in misplaced investments or misguided expectations of the effort required to mitigate threats to species. © 2015 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of Society for Conservation Biology.

  18. The Consequences of Chronic Stereotype Threat: Domain Disidentification and Abandonment

    OpenAIRE

    Woodcock, Anna; Hernandez, Paul R.; Estrada, Mica; Schultz, P. Wesley

    2012-01-01

    Stereotype threat impairs performance across many domains. Despite a wealth of research, the long-term consequences of chronic stereotype threat have received little empirical attention. Beyond the immediate impact on performance, the experience of chronic stereotype threat is hypothesized to lead to domain disidentification and eventual domain abandonment. Stereotype threat is 1 explanation why African Americans and Hispanic/Latino(a)s “leak” from each juncture of the academic scientific pip...

  19. Effects of Climate and Climate Change on Vectors and Vector-Borne Diseases: Ticks Are Different.

    Science.gov (United States)

    Ogden, Nick H; Lindsay, L Robbin

    2016-08-01

    There has been considerable debate as to whether global risk from vector-borne diseases will be impacted by climate change. This has focussed on important mosquito-borne diseases that are transmitted by the vectors from infected to uninfected humans. However, this debate has mostly ignored the biological diversity of vectors and vector-borne diseases. Here, we review how climate and climate change may impact those most divergent of arthropod disease vector groups: multivoltine insects and hard-bodied (ixodid) ticks. We contrast features of the life cycles and behaviour of these arthropods, and how weather, climate, and climate change may have very different impacts on the spatiotemporal occurrence and abundance of vectors, and the pathogens they transmit. Crown Copyright © 2016. Published by Elsevier Ltd. All rights reserved.

  20. Hierarchal scalar and vector tetrahedra

    International Nuclear Information System (INIS)

    Webb, J.P.; Forghani, B.

    1993-01-01

    A new set of scalar and vector tetrahedral finite elements are presented. The elements are hierarchal, allowing mixing of polynomial orders; scalar orders up to 3 and vector orders up to 2 are defined. The vector elements impose tangential continuity on the field but not normal continuity, making them suitable for representing the vector electric or magnetic field. Further, the scalar and vector elements are such that they can easily be used in the same mesh, a requirement of many quasi-static formulations. Results are presented for two 50 Hz problems: the Bath Cube, and TEAM Problem 7

  1. Generation of arbitrary vector fields based on a pair of orthogonal elliptically polarized base vectors.

    Science.gov (United States)

    Xu, Danfeng; Gu, Bing; Rui, Guanghao; Zhan, Qiwen; Cui, Yiping

    2016-02-22

    We present an arbitrary vector field with hybrid polarization based on the combination of a pair of orthogonal elliptically polarized base vectors on the Poincaré sphere. It is shown that the created vector field is only dependent on the latitude angle 2χ but is independent on the longitude angle 2ψ on the Poincaré sphere. By adjusting the latitude angle 2χ, which is related to two identical waveplates in a common path interferometric arrangement, one could obtain arbitrary type of vector fields. Experimentally, we demonstrate the generation of such kind of vector fields and confirm the distribution of state of polarization by the measurement of Stokes parameters. Besides, we investigate the tight focusing properties of these vector fields. It is found that the additional degree of freedom 2χ provided by arbitrary vector field with hybrid polarization allows one to control the spatial structure of polarization and to engineer the focusing field.

  2. The perfect storm of information: combining traditional and non-traditional data sources for public health situational awareness during hurricane response.

    Science.gov (United States)

    Bennett, Kelly J; Olsen, Jennifer M; Harris, Sara; Mekaru, Sumiko; Livinski, Alicia A; Brownstein, John S

    2013-12-16

    Hurricane Isaac made landfall in southeastern Louisiana in late August 2012, resulting in extensive storm surge and inland flooding. As the lead federal agency responsible for medical and public health response and recovery coordination, the Department of Health and Human Services (HHS) must have situational awareness to prepare for and address state and local requests for assistance following hurricanes. Both traditional and non-traditional data have been used to improve situational awareness in fields like disease surveillance and seismology. This study investigated whether non-traditional data (i.e., tweets and news reports) fill a void in traditional data reporting during hurricane response, as well as whether non-traditional data improve the timeliness for reporting identified HHS Essential Elements of Information (EEI). HHS EEIs provided the information collection guidance, and when the information indicated there was a potential public health threat, an event was identified and categorized within the larger scope of overall Hurricane Issac situational awareness. Tweets, news reports, press releases, and federal situation reports during Hurricane Isaac response were analyzed for information about EEIs. Data that pertained to the same EEI were linked together and given a unique event identification number to enable more detailed analysis of source content. Reports of sixteen unique events were examined for types of data sources reporting on the event and timeliness of the reports. Of these sixteen unique events identified, six were reported by only a single data source, four were reported by two data sources, four were reported by three data sources, and two were reported by four or more data sources. For five of the events where news tweets were one of multiple sources of information about an event, the tweet occurred prior to the news report, press release, local government\\emergency management tweet, and federal situation report. In all circumstances where

  3. High-Resolution WRF Forecasts of Lightning Threat

    Science.gov (United States)

    Goodman, S. J.; McCaul, E. W., Jr.; LaCasse, K.

    2007-01-01

    Tropical Rainfall Measuring Mission (TRMM)lightning and precipitation observations have confirmed the existence of a robust relationship between lightning flash rates and the amount of large precipitating ice hydrometeors in storms. This relationship is exploited, in conjunction with the capabilities of the Weather Research and Forecast (WRF) model, to forecast the threat of lightning from convective storms using the output fields from the model forecasts. The simulated vertical flux of graupel at -15C is used in this study as a proxy for charge separation processes and their associated lightning risk. Initial experiments using 6-h simulations are conducted for a number of case studies for which three-dimensional lightning validation data from the North Alabama Lightning Mapping Array are available. The WRF has been initialized on a 2 km grid using Eta boundary conditions, Doppler radar radial velocity and reflectivity fields, and METAR and ACARS data. An array of subjective and objective statistical metrics is employed to document the utility of the WRF forecasts. The simulation results are also compared to other more traditional means of forecasting convective storms, such as those based on inspection of the convective available potential energy field.

  4. Use of media and public-domain Internet sources for detection and assessment of plant health threats.

    Science.gov (United States)

    Thomas, Carla S; Nelson, Noele P; Jahn, Gary C; Niu, Tianchan; Hartley, David M

    2011-09-05

    Event-based biosurveillance is a recognized approach to early warning and situational awareness of emerging health threats. In this study, we build upon previous human and animal health work to develop a new approach to plant pest and pathogen surveillance. We show that monitoring public domain electronic media for indications and warning of epidemics and associated social disruption can provide information about the emergence and progression of plant pest infestation or disease outbreak. The approach is illustrated using a case study, which describes a plant pest and pathogen epidemic in China and Vietnam from February 2006 to December 2007, and the role of ducks in contributing to zoonotic virus spread in birds and humans. This approach could be used as a complementary method to traditional plant pest and pathogen surveillance to aid global and national plant protection officials and political leaders in early detection and timely response to significant biological threats to plant health, economic vitality, and social stability. This study documents the inter-relatedness of health in human, animal, and plant populations and emphasizes the importance of plant health surveillance.

  5. Calculus with vectors

    CERN Document Server

    Treiman, Jay S

    2014-01-01

    Calculus with Vectors grew out of a strong need for a beginning calculus textbook for undergraduates who intend to pursue careers in STEM. fields. The approach introduces vector-valued functions from the start, emphasizing the connections between one-variable and multi-variable calculus. The text includes early vectors and early transcendentals and includes a rigorous but informal approach to vectors. Examples and focused applications are well presented along with an abundance of motivating exercises. All three-dimensional graphs have rotatable versions included as extra source materials and may be freely downloaded and manipulated with Maple Player; a free Maple Player App is available for the iPad on iTunes. The approaches taken to topics such as the derivation of the derivatives of sine and cosine, the approach to limits, and the use of "tables" of integration have been modified from the standards seen in other textbooks in order to maximize the ease with which students may comprehend the material. Additio...

  6. Test of understanding of vectors: A reliable multiple-choice vector concept test

    Science.gov (United States)

    Barniol, Pablo; Zavala, Genaro

    2014-06-01

    In this article we discuss the findings of our research on students' understanding of vector concepts in problems without physical context. First, we develop a complete taxonomy of the most frequent errors made by university students when learning vector concepts. This study is based on the results of several test administrations of open-ended problems in which a total of 2067 students participated. Using this taxonomy, we then designed a 20-item multiple-choice test [Test of understanding of vectors (TUV)] and administered it in English to 423 students who were completing the required sequence of introductory physics courses at a large private Mexican university. We evaluated the test's content validity, reliability, and discriminatory power. The results indicate that the TUV is a reliable assessment tool. We also conducted a detailed analysis of the students' understanding of the vector concepts evaluated in the test. The TUV is included in the Supplemental Material as a resource for other researchers studying vector learning, as well as instructors teaching the material.

  7. The use of handwriting examinations beyond the traditional court purpose.

    Science.gov (United States)

    Agius, Anna; Jones, Kylie; Epple, Rochelle; Morelato, Marie; Moret, Sébastien; Chadwick, Scott; Roux, Claude

    2017-09-01

    Traditionally, forensic science has predominantly focused its resources and objectives on addressing court related questions. However, this view restricts the contribution of forensic science to one function and results in lost opportunities as investigative and intelligence roles are often overlooked. A change of perspective and expansion of the contributions of forensic science is required to take advantage of the benefits of abductive and inductive thought processes throughout the investigative and intelligence functions. One forensic discipline that has the potential to broaden its traditional focus is handwriting examination. Typically used in investigations that are focused on both criminal and civil cases, the examination procedure and outcome are time consuming and subjective, requiring a detailed study of the features of the handwriting in question. Traditionally, the major handwriting features exploited are characteristics that are often considered individual (or at least highly polymorphic) and habitual. However, handwriting can be considered as an information vector in an intelligence framework. One such example is the recognition of key elements related to the author's native language. This paper discusses the traditional method generally used around the world and proposes a theoretical approach to expand the application of handwriting examination towards gaining additional information for intelligence purposes. This concept will be designed and tested in a future research project. Copyright © 2017 The Chartered Society of Forensic Sciences. All rights reserved.

  8. Movements Indicate Threat Response Phases in Children at Risk for Anxiety.

    Science.gov (United States)

    McGinnis, Ellen W; McGinnis, Ryan S; Muzik, Maria; Hruschak, Jessica; Lopez-Duran, Nestor L; Perkins, Noel C; Fitzgerald, Kate; Rosenblum, Katherine L

    2017-09-01

    Temporal phases of threat response, including potential threat (anxiety), acute threat (startle, fear), and post-threat response modulation, have been identified as the underlying markers of anxiety disorders. Objective measures of response during these phases may help identify children at risk for anxiety; however, the complexity of current assessment techniques prevent their adoption in many research and clinical contexts. We propose an alternative technology, an inertial measurement unit (IMU), that enables noninvasive measurement of the movements associated with threat response, and test its ability to detect threat response phases in young children at a heightened risk for developing anxiety. We quantified the motion of 18 children (3-7 years old) during an anxiety-/fear-provoking behavioral task using an IMU. Specifically, measurements from a single IMU secured to the child's waist were used to extract root-mean-square acceleration and angular velocity in the horizontal and vertical directions, and tilt and yaw range of motion during each threat response phase. IMU measurements detected expected differences in child motion by threat phase. Additionally, potential threat motion was positively correlated to familial anxiety risk, startle range of motion was positively correlated with child internalizing symptoms, and response modulation motion was negatively correlated to familial anxiety risk. Results suggest differential theory-driven threat response phases and support previous literature connecting maternal child risk to anxiety with behavioral measures using more feasible objective methods. This is the first study demonstrating the utility of an IMU for characterizing the motion of young children to mark the phases of threat response modulation. The technique provides a novel and objective measure of threat response for mental health researchers.

  9. Toxicological Threats of Plastic

    Science.gov (United States)

    Plastics pose both physical (e.g., entanglement, gastrointestinal blockage, reef destruction) and chemical threats (e.g., bioaccumulation of the chemical ingredients of plastic or toxic chemicals sorbed to plastics) to wildlife and the marine ecosystem.

  10. External Threat Risk Assessment Algorithm (ExTRAA)

    Energy Technology Data Exchange (ETDEWEB)

    Powell, Troy C. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-08-01

    Two risk assessment algorithms and philosophies have been augmented and combined to form a new algorit hm, the External Threat Risk Assessment Algorithm (ExTRAA), that allows for effective and statistically sound analysis of external threat sources in relation to individual attack methods . In addition to the attack method use probability and the attack method employment consequence, t he concept of defining threat sources is added to the risk assessment process. Sample data is tabulated and depicted in radar plots and bar graphs for algorithm demonstration purposes. The largest success of ExTRAA is its ability to visualize the kind of r isk posed in a given situation using the radar plot method.

  11. Preparing the United States for Zika Virus: Pre-emptive Vector Control and Personal Protection.

    Science.gov (United States)

    Diaz, James H

    2016-12-01

    Discovered in 1947 in a monkey in the Zika forest of Uganda, Zika virus was dismissed as a cause of a mild illness that was confined to Africa and Southeast Asia and transmitted by Aedes mosquitoes. In 2007, Zika virus appeared outside of its endemic borders in an outbreak on the South Pacific Island of Yap. In 2013, Zika virus was associated with a major neurological complication, Guillain-Barré syndrome, in a larger outbreak in the French Polynesian Islands. From the South Pacific, Zika invaded Brazil in 2015 and caused another severe neurological complication, fetal microcephaly. The mosquito-borne transmission of Zika virus can be propagated by sexual transmission and, possibly, by blood transfusions, close personal contacts, and organ transplants, like other flaviviruses. Since these combined mechanisms of infectious disease transmission could result in catastrophic incidences of severe neurological diseases in adults and children, the public should know what to expect from Zika virus, how to prevent infection, and what the most likely failures in preventive measures will be. With federal research funding stalled, a Zika vaccine is far away. The only national strategies to prepare the United States for Zika virus invasion now are effective vector control measures and personal protection from mosquito bites. In addition to a basic knowledge of Aedes mosquito vectors and their biting behaviors, an understanding of simple household vector control measures, and the selection of the best chemical and physical mosquito repellents will be required to repel the Zika threat. Copyright © 2016 Wilderness Medical Society. Published by Elsevier Inc. All rights reserved.

  12. Leishmaniasis vector behaviour in Kenya

    International Nuclear Information System (INIS)

    Mutinga, M.J.

    1980-01-01

    Leishmaniasis in Kenya exists in two forms: cutaneous and visceral. The vectors of visceral leishmaniasis have been the subject of investigation by various researchers since World War II, when the outbreak of the disease was first noticed. The vectors of cutaneous leishmaniasis were first worked on only a decade ago after the discovery of the disease focus in Mt. Elgon. The vector behaviour of these diseases, namely Phlebotomus pedifer, the vector of cutaneous leishmaniasis, and Phlebotomus martini, the vector of visceral leishmaniasis, are discussed in detail. P. pedifer has been found to breed and bite inside caves, whereas P. martini mainly bites inside houses. (author)

  13. Radiological threat, public and media: a psychosociological view

    Energy Technology Data Exchange (ETDEWEB)

    Arciszewski, T. [University Rene Descartes - Paris 5, 92 - Boulogne (France)

    2006-07-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  14. Radiological threat, public and media: a psychosociological view

    International Nuclear Information System (INIS)

    Arciszewski, T.

    2006-01-01

    Nuclear risk has become a major social communication along the 20. century because of its critical socio-political impact. That communication is not limited to expert speeches and simple acceptation. The way people understand that kind of threat is based on beliefs and on imaginary pictures. Consequently, and because it shapes people attitude, expectations and behaviours, their analysis is a key for policy and prevention. We will present, in the light of the research on risk perception and social psychology theoretical background, how people can manage with the nuclear fear. Some particular points will be studied: the nature of nuclear threat and fear, the cultural and media coverage and the consequences of this threat on behaviour. We will first focus on what a societal threat is and of which nature is the nuclear threat. We will rely on statistical data on risk perception. We have to consider the two main fields of information: first the nuclear threat as a mass destruction weapon and second, the radiological risk as a consequence of civil use of radiological material. Those two aspects, deeply related for most people, make the roots for the described fears. Then, the perception of the risks relative to nuclear is necessarily influenced by this representation. The representation of the nuclear power is and will be for next years, related to the nuclear mushroom as experimentally pointed o ut by Fiske, both with the abnormal children of Chernobyl. How can we change that vision? Not to be a liar, it will be hard work because it a old story, a long construction of what will be the future of mankind, something deeply influenced by media, movie, geopolitical facts like the cold war or technological accident like Three Mile Island or Chernobyl. It has to deal with the problem of media transmission of fears, which is a problem in itself, but due to the scientific base of our problem, particularly relevant. Moreover, there is a strong cultural background that maintains

  15. Threat affects risk preferences in movement decision making

    Science.gov (United States)

    O'Brien, Megan K.; Ahmed, Alaa A.

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks. PMID:26106311

  16. Threat affects risk preferences in movement decision making

    Directory of Open Access Journals (Sweden)

    Megan K. O'Brien

    2015-06-01

    Full Text Available Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching and whole-body leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory. Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the whole-body task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the whole-body movements than in arm-reaching at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects’ inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  17. Threat affects risk preferences in movement decision making.

    Science.gov (United States)

    O'Brien, Megan K; Ahmed, Alaa A

    2015-01-01

    Emotional states such as sadness, anger, and threat have been shown to play a critical role in decision-making processes. Here we addressed the question of whether risk preferences are influenced by postural threat and whether this influence generalizes across motor tasks. We examined risk attitudes in the context of arm-reaching (ARM) and whole-body (WB) leaning movements, expecting that increased postural threat would lead to proportionally similar changes in risk-sensitivity for each motor task. Healthy young adults were shown a series of two-alternative forced-choice lotteries, where they were asked to choose between a riskier lottery and a safer lottery on each trial. Our lotteries consisted of different monetary rewards and target sizes. Subjects performed each choice task at ground level and atop an elevated platform. In the presence of this postural threat, increased physiological arousal was correlated with decreased movement variability. To determine risk-sensitivity, we quantified the frequency with which a subject chose the riskier lottery and fit lottery responses to a choice model based on cumulative prospect theory (CPT). Subjects exhibited idiosyncratic changes in risk-sensitivity between motor tasks and between elevations. However, we found that overweighting of small probabilities increased with postural threat in the WB task, indicating a more cautious, risk-averse strategy is ascribed to the possibility of a fall. Subjects were also more risk-seeking in the WB movements than in ARM at low elevation; this behavior does not seem to derive from consistent distortions in utility or probability representations but may be explained by subjects' inaccurate estimation of their own motor variability. Overall, our findings suggest that implicit threat can modify risk attitudes in the motor domain, and the threat may induce risk-aversion in salient movement tasks.

  18. Web application security is a stack how to CYA (cover your apps) completely

    CERN Document Server

    Mac Vittie, Lori

    2015-01-01

    The web application stack - a growing threat vector   Understand the threat and learn how to defend your organisation This book is intended for application developers, system administrators and operators, as well as networking professionals who need a comprehensive top-level view of web application security in order to better defend and protect both the 'web' and the 'application' against potential attacks. This book examines the most common, fundamental attack vectors and shows readers the defence techniques used to combat them. ContentsIntroductionAttack SurfaceThreat VectorsThreat Mitigatio

  19. Can experience overcome stereotypes in times of terror threat?

    Directory of Open Access Journals (Sweden)

    Mirya R. Holman

    2017-02-01

    Full Text Available Research on evaluations of leaders has frequently found that female leaders receive lower ratings in times of national security crisis. However, less is known about countervailing factors. We contend that partisanship and leadership experience in relevant domains are two factors that can counteract the negative effects of terrorist threat on evaluations of female political leaders. To test this expectation, we implemented a national study in 2012 containing terrorist threat and non-threat conditions, and then asked participants to evaluate political leaders. The results show that Republican leaders, including women, are unaffected by terrorist threat; in contrast, Democratic leaders are punished during times of terrorist threat, but this negative effect is smaller for then-Secretary of State Hillary Clinton compared to Nancy Pelosi, who lacks similar experience. In short, Republican partisanship is a strong countervailing factor, while leadership experience in national security more modestly countervails.

  20. Relationships Among Attention Networks and Physiological Responding to Threat

    Science.gov (United States)

    Sarapas, Casey; Weinberg, Anna; Langenecker, Scott A.

    2016-01-01

    Although researchers have long hypothesized a relationship between attention and anxiety, theoretical and empirical accounts of this relationship have conflicted. We attempted to resolve these conflicts by examining relationships of attentional abilities with responding to predictable and unpredictable threat, related but distinct motivational process implicated in a number of anxiety disorders. Eighty-one individuals completed a behavioral task assessing efficiency of three components of attention – alerting, orienting, and executive control (Attention Network Test - Revised). We also assessed startle responding during anticipation of both predictable, imminent threat (of mild electric shock) and unpredictable contextual threat. Faster alerting and slower disengaging from non-emotional attention cues were related to heightened responding to unpredictable threat, whereas poorer executive control of attention was related to heightened responding to predictable threat. This double dissociation helps to integrate models of attention and anxiety and may be informative for treatment development. PMID:27816781

  1. Perceived control qualifies the effects of threat on prejudice.

    Science.gov (United States)

    Greenaway, Katharine H; Louis, Winnifred R; Hornsey, Matthew J; Jones, Janelle M

    2014-09-01

    People sometimes show a tendency to lash out in a prejudiced manner when they feel threatened. This research shows that the relationship between threat and prejudice is moderated by people's levels of perceived control: Threat leads to prejudice only when people feel concurrently low in control. In two studies, terrorist threat was associated with heightened prejudice among people who were low in perceived control over the threat (Study 1; N = 87) or over their lives in general (Study 2; N = 2,394), but was not associated with prejudice among people who were high in perceived control. Study 3 (N = 139) replicated this finding experimentally in the context of the Global Financial Crisis. The research identifies control as an important ingredient in threatening contexts that, if bolstered, can reduce general tendencies to lash out under threat. © 2013 The British Psychological Society.

  2. Does stereotype threat affect women in academic medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-04-01

    Multiple complex factors contribute to the slow pace of women's advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including (1) introducing the concept of stereotype threat to the academic medicine community, (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias, (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders, (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards, and (5) building leadership efficacy among female physicians and scientists.

  3. Registration of Urban Aerial Image and LiDAR Based on Line Vectors

    Directory of Open Access Journals (Sweden)

    Qinghong Sheng

    2017-09-01

    Full Text Available In a traditional registration of a single aerial image with airborne light detection and ranging (LiDAR data using linear features that regard line direction as a control or linear features as constraints in the solution, lacking the constraint of linear position leads to the error propagation of the adjustment model. To solve this problem, this paper presents a line vector-based registration mode (LVR in which image rays and LiDAR lines are expressed by a line vector that integrates the line direction and the line position. A registration equation of line vector is set up by coplanar imaging rays and corresponding control lines. Three types of datasets consisting of synthetic, theInternational Society for Photogrammetry and Remote Sensing (ISPRS test project, and real aerial data are used. A group of progressive experiments is undertaken to evaluate the robustness of the LVR. Experimental results demonstrate that the integrated line direction and the line position contributes a great deal to the theoretical and real accuracies of the unknowns, as well as the stability of the adjustment model. This paper provides a new suggestion that, for a single image and LiDAR data, registration in urban areas can be accomplished by accommodating rich line features.

  4. Counteracting effect of threat on reward enhancements during working memory.

    Science.gov (United States)

    Choi, Jong Moon; Padmala, Srikanth; Pessoa, Luiz

    2015-01-01

    Cognitive performance has been shown to be enhanced when performance-based rewards are at stake. On the other hand, task-irrelevant threat processing has been shown to have detrimental effects during several cognitive tasks. Crucially, the impact of reward and threat on cognition has been studied largely independently of one another. Hence, our understanding of how reward and threat simultaneously contribute to performance is incomplete. To fill in this gap, the present study investigated how reward and threat interact with one another during a cognitive task. We found that threat of shock counteracted the beneficial effect of reward during a working memory task. Furthermore, individual differences in self-reported reward-sensitivity and anxiety were linked to the extent to which reward and threat interacted during behaviour. Together, the current findings contribute to a limited but growing literature unravelling how positive and negative information processing jointly influence cognition.

  5. Assessment of Containment Structures Against Missile Impact Threats

    Institute of Scientific and Technical Information of China (English)

    LI Q M

    2006-01-01

    In order to ensure the highest safety requirements,nuclear power plant structures (the containment structures,the fuel storages and transportation systems) should be assessed against all possible internal and external impact threats.The internal impact threats include kinetic missiles generated by the failure of high pressure vessels and pipes,the failure of high speed rotating machineries and accidental drops.The external impact threats may come from airborne missiles,aircraft impact,explosion blast and fragments.The impact effects of these threats on concrete and steel structures in a nuclear power plant are discussed.Methods and procedures for the impact assessment of nuclear power plants are introduced.Recent studies on penetration and perforation mechanics as well as progresses on dynamic properties of concrete-like materials are presented to increase the understanding of the impact effects on concrete containment structures.

  6. Unhealthy interactions: the role of stereotype threat in health disparities.

    Science.gov (United States)

    Aronson, Joshua; Burgess, Diana; Phelan, Sean M; Juarez, Lindsay

    2013-01-01

    Stereotype threat is the unpleasant psychological experience of confronting negative stereotypes about race, ethnicity, gender, sexual orientation, or social status. Hundreds of published studies show how the experience of stereotype threat can impair intellectual functioning and interfere with test and school performance. Numerous published interventions derived from this research have improved the performance and motivation of individuals targeted by low-ability stereotypes. Stereotype threat theory and research provide a useful lens for understanding and reducing the negative health consequences of interracial interactions for African Americans and members of similarly stigmatized minority groups. Here we summarize the educational outcomes of stereotype threat and examine the implications of stereotype threat for health and health-related behaviors.

  7. Unleashing Latent Ability: Implications of Stereotype Threat for College Admissions

    Science.gov (United States)

    Logel, Christine R.; Walton, Gregory M.; Spencer, Steven J.; Peach, Jennifer; Mark, Zanna P.

    2012-01-01

    Social-psychological research conducted over the past 15 years provides compelling evidence that pervasive psychological threats are present in common academic environments--especially threats that originate in negative intellectual stereotypes--and that these threats undermine the real-world academic performance of non-Asian ethnic minority…

  8. Protected areas in tropical Africa: assessing threats and conservation activities.

    Science.gov (United States)

    Tranquilli, Sandra; Abedi-Lartey, Michael; Abernethy, Katharine; Amsini, Fidèle; Asamoah, Augustus; Balangtaa, Cletus; Blake, Stephen; Bouanga, Estelle; Breuer, Thomas; Brncic, Terry M; Campbell, Geneviève; Chancellor, Rebecca; Chapman, Colin A; Davenport, Tim R B; Dunn, Andrew; Dupain, Jef; Ekobo, Atanga; Eno-Nku, Manasseh; Etoga, Gilles; Furuichi, Takeshi; Gatti, Sylvain; Ghiurghi, Andrea; Hashimoto, Chie; Hart, John A; Head, Josephine; Hega, Martin; Herbinger, Ilka; Hicks, Thurston C; Holbech, Lars H; Huijbregts, Bas; Kühl, Hjalmar S; Imong, Inaoyom; Yeno, Stephane Le-Duc; Linder, Joshua; Marshall, Phil; Lero, Peter Minasoma; Morgan, David; Mubalama, Leonard; N'Goran, Paul K; Nicholas, Aaron; Nixon, Stuart; Normand, Emmanuelle; Nziguyimpa, Leonidas; Nzooh-Dongmo, Zacharie; Ofori-Amanfo, Richard; Ogunjemite, Babafemi G; Petre, Charles-Albert; Rainey, Hugo J; Regnaut, Sebastien; Robinson, Orume; Rundus, Aaron; Sanz, Crickette M; Okon, David Tiku; Todd, Angelique; Warren, Ymke; Sommer, Volker

    2014-01-01

    Numerous protected areas (PAs) have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism) was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  9. Hindrances are not threats: advancing the multidimensionality of work stress.

    Science.gov (United States)

    Tuckey, Michelle R; Searle, Ben J; Boyd, Carolyn M; Winefield, Anthony H; Winefield, Helen R

    2015-04-01

    The challenge-hindrance framework has proved useful for explaining inconsistencies in relationships between work stressors and important outcomes. By introducing the distinction between threat and hindrance to this framework, we capture the potential for personal harm or loss (threat) associated with stressors, as distinct from the potential to block goal attainment (hindrance) or promote gain (challenge). In Study 1, survey data were collected from 609 retail workers, 220 of whom responded 6 months later. The results supported a 3-factor threat-hindrance-challenge stressor structure and showed that threat stressors are associated with increased psychological distress and emotional exhaustion, and reduced dedication, whereas hindrance stressors undermine dedication but may not be related to distress or exhaustion with threats included in the model. Study 2 utilized a diary study design, with data collected from 207 workers over 3 workdays. Findings revealed that the threat, hindrance, and challenge appraisals of individual workers are statistically distinct, and associated with stressors and well-being as anticipated: threats with role conflict and anxiety, hindrances with organizational constraints and fatigue, and challenges with skill demands and enthusiasm. Overall, moving to a 3-dimensional challenge-hindrance-threat framework for stressors and stress appraisals will support a more accurate picture regarding the nature, processes, and effects of stressors on individuals and organizations, and ensure prevention efforts are not misguided. (c) 2015 APA, all rights reserved).

  10. Protected areas in tropical Africa: assessing threats and conservation activities.

    Directory of Open Access Journals (Sweden)

    Sandra Tranquilli

    Full Text Available Numerous protected areas (PAs have been created in Africa to safeguard wildlife and other natural resources. However, significant threats from anthropogenic activities and decline of wildlife populations persist, while conservation efforts in most PAs are still minimal. We assessed the impact level of the most common threats to wildlife within PAs in tropical Africa and the relationship of conservation activities with threat impact level. We collated data on 98 PAs with tropical forest cover from 15 countries across West, Central and East Africa. For this, we assembled information about local threats as well as conservation activities from published and unpublished literature, and questionnaires sent to long-term field workers. We constructed general linear models to test the significance of specific conservation activities in relation to the threat impact level. Subsistence and commercial hunting were identified as the most common direct threats to wildlife and found to be most prevalent in West and Central Africa. Agriculture and logging represented the most common indirect threats, and were most prevalent in West Africa. We found that the long-term presence of conservation activities (such as law enforcement, research and tourism was associated with lower threat impact levels. Our results highlight deficiencies in the management effectiveness of several PAs across tropical Africa, and conclude that PA management should invest more into conservation activities with long-term duration.

  11. Learning with LOGO: Logo and Vectors.

    Science.gov (United States)

    Lough, Tom; Tipps, Steve

    1986-01-01

    This is the first of a two-part series on the general concept of vector space. Provides tool procedures to allow investigation of vector properties, vector addition and subtraction, and X and Y components. Lists several sources of additional vector ideas. (JM)

  12. Interrelationships Among Men’s Threat Potential, Facial Dominance, and Vocal Dominance

    Directory of Open Access Journals (Sweden)

    Chengyang Han

    2017-03-01

    Full Text Available The benefits of minimizing the costs of engaging in violent conflict are thought to have shaped adaptations for the rapid assessment of others’ capacity to inflict physical harm. Although studies have suggested that men’s faces and voices both contain information about their threat potential, one recent study suggested that men’s faces are a more valid cue of their threat potential than their voices are. Consequently, the current study investigated the interrelationships among a composite measure of men’s actual threat potential (derived from the measures of their upper-body strength, height, and weight and composite measures of these men’s perceived facial and vocal threat potential (derived from dominance, strength, and weight ratings of their faces and voices, respectively. Although men’s perceived facial and vocal threat potential were positively correlated, men’s actual threat potential was related to their perceived facial, but not vocal, threat potential. These results present new evidence that men’s faces may be a more valid cue of these aspects of threat potential than their voices are.

  13. Functional effectiveness of threat appeals in exercise promotion messages

    Directory of Open Access Journals (Sweden)

    Olivier Mairesse

    2010-01-01

    Full Text Available As more than 70% of individuals in Western societies can be categorized as sedentary and inactivity has been recognized to lead to a series of serious physical and psychological disorders, the importance of physical activity promotion is ever more emphasized. Many social marketing campaigns use threat (or fear appeals to promote healthy behaviors. Theoretical models, such as the Extended Parallel Process Model integrate concepts as 'perceived threat' and 'perceived efficacy' to explain how such messages operate and can cause diverse behavioral reactions. It is however still not entirely clear how these different aspects are valuated and combined to determine desired versus undesired response behaviors in individuals. In a functional integration task, threat-appeal based exercise promotion messages varying in psychological threat and efficacy content were shown to sedentary employees in order to assess how they affect their intention to engage in physical exercise. Our results show that individuals can be categorized in 4 different clusters depending on the way they valuate threat and efficacy appeals: i.e. individuals sensitive to both types of cues, those sensitive to either the threat or the efficacy component in the message and those insensitive to either one of them. As different segments of receivers of the message react differently to threat and efficacy combinations, it is concluded that different approaches to designing effective mass media campaigns may be required for effective exercise promotion.

  14. Architectural model for crowdsourcing for human security threats ...

    African Journals Online (AJOL)

    Journal of Computer Science and Its Application ... Crowdsourcing for Human Security Threats Situation Information and Response System (CHSTSIRS) is proposed in this paper to report Human Security (HS) ... Keywords: Human security, Crowdsourcing, Threats, Situation Information, Agency, Google, Cloud Messaging ...

  15. The vectorization of a ray tracing program for image generation

    Science.gov (United States)

    Plunkett, D. J.; Cychosz, J. M.; Bailey, M. J.

    1984-01-01

    Ray tracing is a widely used method for producing realistic computer generated images. Ray tracing involves firing an imaginary ray from a view point, through a point on an image plane, into a three dimensional scene. The intersections of the ray with the objects in the scene determines what is visible at the point on the image plane. This process must be repeated many times, once for each point (commonly called a pixel) in the image plane. A typical image contains more than a million pixels making this process computationally expensive. A traditional ray tracing program processes one ray at a time. In such a serial approach, as much as ninety percent of the execution time is spent computing the intersection of a ray with the surface in the scene. With the CYBER 205, many rays can be intersected with all the bodies im the scene with a single series of vector operations. Vectorization of this intersection process results in large decreases in computation time. The CADLAB's interest in ray tracing stems from the need to produce realistic images of mechanical parts. A high quality image of a part during the design process can increase the productivity of the designer by helping him visualize the results of his work. To be useful in the design process, these images must be produced in a reasonable amount of time. This discussion will explain how the ray tracing process was vectorized and gives examples of the images obtained.

  16. Mosquitoes and Culicoides biting midges: vector range and the influence of climate change.

    Science.gov (United States)

    Elbers, A R W; Koenraadt, C J M; Meiswinkel, R

    2015-04-01

    Vector-borne animal diseases pose a continuous and substantial threat to livestock economies around the globe. Increasing international travel, the globalisation of trade, and climate change are likely to play a progressively more important role in the introduction, establishment and spread of arthropod-borne pathogens worldwide. A review of the literature reveals that many climatic variables, functioning singly or in combination, exert varying effects on the distribution and range of Culicoides vector midges and mosquitoes. For example, higher temperatures may be associated with increased insect abundance--thereby amplifying the risk of disease transmission--but there are no indications yet of dramatic shifts occurring in the geographic range of Culicoides midges. However, the same cannot be said for mosquitoes: over the last few decades, multiple Asian species have established themselves in Europe, spread and are unlikely to ever be eradicated. Research on how insects respond to changes in climate is still in its infancy. The authors argue that we need to grasp how other annectant changes, such as extremes in precipitation (drought and flooding), may affect the dispersal capability of mosquitoes. Models are useful for assessing the interplay between mosquito vectors expanding their range and the native flora and fauna; however, ecological studies employing classical mark-release-recapture techniques remain essential for addressing fundamental questions about the survival and dispersal of mosquito species, with the resulting parameters fed directly into new-generation disease transmission models. Studies on the eventual impact of mosquitoes on animal and human health should be tackled through large-scale integrated research programmes. Such an approach calls for more collaborative efforts, along the lines of the One Health Initiative.

  17. Application of Support Vector Machine to Forex Monitoring

    Science.gov (United States)

    Kamruzzaman, Joarder; Sarker, Ruhul A.

    Previous studies have demonstrated superior performance of artificial neural network (ANN) based forex forecasting models over traditional regression models. This paper applies support vector machines to build a forecasting model from the historical data using six simple technical indicators and presents a comparison with an ANN based model trained by scaled conjugate gradient (SCG) learning algorithm. The models are evaluated and compared on the basis of five commonly used performance metrics that measure closeness of prediction as well as correctness in directional change. Forecasting results of six different currencies against Australian dollar reveal superior performance of SVM model using simple linear kernel over ANN-SCG model in terms of all the evaluation metrics. The effect of SVM parameter selection on prediction performance is also investigated and analyzed.

  18. Strangeness Vector and Axial-Vector Form Factors of the Nucleon

    Directory of Open Access Journals (Sweden)

    Pate Stephen

    2014-03-01

    Full Text Available A revised global fit of electroweak ep and vp elastic scattering data has been performed, with the goal of determining the strange quark contribution to the vector and axial-vector form factors of the nucleon in the momentum-transfer range 0 < Q2 < 1 GeV2. The two vector (electric and magnetic form factors GsE(Q2 and GsM(Q2 are strongly constrained by ep elastic scattering data, while the major source of information on the axial-vector form factor GsA(Q2 is vp scattering data. Combining the two kinds of data into a single global fit makes possible additional precision in the determination of these form factors, and provides a unique way to determine the strange quark contribution to the nucleon spin, ΔS , independently of leptonic deep-inelastic scattering. The fit makes use of data from the BNL-E734, SAMPLE, HAPPEx, G0, and PVA4 experiments; we will also compare the result of the fit with recent data from MiniBooNE, and anticipate how this fit can be improved when new data from MicroBooNE become available.

  19. Multi-task Vector Field Learning.

    Science.gov (United States)

    Lin, Binbin; Yang, Sen; Zhang, Chiyuan; Ye, Jieping; He, Xiaofei

    2012-01-01

    Multi-task learning (MTL) aims to improve generalization performance by learning multiple related tasks simultaneously and identifying the shared information among tasks. Most of existing MTL methods focus on learning linear models under the supervised setting. We propose a novel semi-supervised and nonlinear approach for MTL using vector fields. A vector field is a smooth mapping from the manifold to the tangent spaces which can be viewed as a directional derivative of functions on the manifold. We argue that vector fields provide a natural way to exploit the geometric structure of data as well as the shared differential structure of tasks, both of which are crucial for semi-supervised multi-task learning. In this paper, we develop multi-task vector field learning (MTVFL) which learns the predictor functions and the vector fields simultaneously. MTVFL has the following key properties. (1) The vector fields MTVFL learns are close to the gradient fields of the predictor functions. (2) Within each task, the vector field is required to be as parallel as possible which is expected to span a low dimensional subspace. (3) The vector fields from all tasks share a low dimensional subspace. We formalize our idea in a regularization framework and also provide a convex relaxation method to solve the original non-convex problem. The experimental results on synthetic and real data demonstrate the effectiveness of our proposed approach.

  20. Kidnapping and abduction minimizing the threat and lessons in survival

    CERN Document Server

    Heard, Brian John

    2014-01-01

    Terrorist groups and organized crime cartels pose an increasing threat of kidnapping throughout many regions in the word. At the same time, international travel has become more commonplace for both business and leisure purposes. Kidnapping and Abduction: Minimizing the Threat and Lessons in Survival provides a practical guide on the precautions travelers can take to avoid being kidnapped or derail a kidnapping attempt in progress. In the event this cannot be avoided, the book supplies advice on how to ensure survival during captivity. Readers will learn: The basic elements of kidnapping and abduction The motivations and mechanisms of kidnappers The hotspots where kidnapping/hostage taking is prevalent Vehicles best suited for avoidance of kidnap threat and proposals for up-armoring an existing vehicle How to recognize immediate threats and precautions to be taken in assessing threat level The types of weapons most favored by kidnappers and their threat level Available bullet-resistant materials and their use ...

  1. The Bright Side of Threatened Narcissism: Improved Performance Following Ego Threat.

    Science.gov (United States)

    Nevicka, Barbora; Baas, Matthijs; Ten Velden, Femke S

    2016-12-01

    Narcissistic individuals have highly positive self-views and overestimate their abilities. Consequently, they tend to react aggressively whenever they receive information that does not match their high self-views (ego threat). We argue that focusing on aggression merely portrays a one-sided view of narcissistic individuals and the manner in which they counter ego threats. We propose that following ego threat, narcissism can also fuel performance. In four studies, we measured nonclinical narcissism and allocated Dutch undergraduate university students (N 1  = 175, N 2  = 142, N 3  = 159, N 4  = 174) to either an ego threat or a no ego threat condition. Ego threat involved negative feedback (Studies 1-2) or threat to uniqueness (Studies 3-4). We measured participants' intentions to complete a challenging task (Study 1), their creative performance (Studies 2-3), and their performance on an anagram task (Study 4). Across Studies 1-3, we consistently found that following ego threat, higher nonclinical narcissism was associated with greater willingness to perform tasks that enabled demonstration of abilities and enhanced creative performance. These results were confirmed using a meta-analysis. However, anagram performance was not enhanced following ego threat. We provide additional analyses that might help explain this. Our findings thus reveal a more positive side to the way narcissistic individuals manage threats to their self-image. © 2015 Wiley Periodicals, Inc.

  2. Viral Determinants and Vector Competence of Zika Virus Transmission

    Directory of Open Access Journals (Sweden)

    Hong-Wai Tham

    2018-05-01

    Full Text Available Zika virus (ZIKV has emerged as a new global health threat. Since its first discovery in Zika forest in Uganda, this virus has been isolated from several mosquito species, including Aedes aegypti and Aedes albopictus. The geographical distribution of these mosquito species across tropical and subtropical regions has led to several outbreaks, including the recent pandemic in Brazil, followed by the Pacific islands and other areas of North and South America. This has gained attention of the scientific community to elucidate the epidemiology and transmission of ZIKV. Despite its strong attention on clinical aspects for healthcare professionals, the relationships between ZIKV and its principal vectors, A. aegypti and A. albopictus, have not gained substantial interest in the scientific research community. As such, this review aims to summarize the current knowledge on ZIKV tropism and some important mechanisms which may be employed by the virus for effective strategies on viral survival in mosquitoes. In addition, this review identifies the areas of research that should be placed attention to, for which to be exploited for novel mosquito control strategies.

  3. Viral Determinants and Vector Competence of Zika Virus Transmission

    Science.gov (United States)

    Tham, Hong-Wai; Balasubramaniam, Vinod; Ooi, Man K.; Chew, Miaw-Fang

    2018-01-01

    Zika virus (ZIKV) has emerged as a new global health threat. Since its first discovery in Zika forest in Uganda, this virus has been isolated from several mosquito species, including Aedes aegypti and Aedes albopictus. The geographical distribution of these mosquito species across tropical and subtropical regions has led to several outbreaks, including the recent pandemic in Brazil, followed by the Pacific islands and other areas of North and South America. This has gained attention of the scientific community to elucidate the epidemiology and transmission of ZIKV. Despite its strong attention on clinical aspects for healthcare professionals, the relationships between ZIKV and its principal vectors, A. aegypti and A. albopictus, have not gained substantial interest in the scientific research community. As such, this review aims to summarize the current knowledge on ZIKV tropism and some important mechanisms which may be employed by the virus for effective strategies on viral survival in mosquitoes. In addition, this review identifies the areas of research that should be placed attention to, for which to be exploited for novel mosquito control strategies. PMID:29875751

  4. Enhancing poxvirus vectors vaccine immunogenicity.

    Science.gov (United States)

    García-Arriaza, Juan; Esteban, Mariano

    2014-01-01

    Attenuated recombinant poxvirus vectors expressing heterologous antigens from pathogens are currently at various stages in clinical trials with the aim to establish their efficacy. This is because these vectors have shown excellent safety profiles, significant immunogenicity against foreign expressed antigens and are able to induce protective immune responses. In view of the limited efficacy triggered by some poxvirus strains used in clinical trials (i.e, ALVAC in the RV144 phase III clinical trial for HIV), and of the restrictive replication capacity of the highly attenuated vectors like MVA and NYVAC, there is a consensus that further improvements of these vectors should be pursuit. In this review we considered several strategies that are currently being implemented, as well as new approaches, to improve the immunogenicity of the poxvirus vectors. This includes heterologous prime/boost protocols, use of co-stimulatory molecules, deletion of viral immunomodulatory genes still present in the poxvirus genome, enhancing virus promoter strength, enhancing vector replication capacity, optimizing expression of foreign heterologous sequences, and the combined use of adjuvants. An optimized poxvirus vector triggering long-lasting immunity with a high protective efficacy against a selective disease should be sought.

  5. Stable piecewise polynomial vector fields

    Directory of Open Access Journals (Sweden)

    Claudio Pessoa

    2012-09-01

    Full Text Available Let $N={y>0}$ and $S={y<0}$ be the semi-planes of $mathbb{R}^2$ having as common boundary the line $D={y=0}$. Let $X$ and $Y$ be polynomial vector fields defined in $N$ and $S$, respectively, leading to a discontinuous piecewise polynomial vector field $Z=(X,Y$. This work pursues the stability and the transition analysis of solutions of $Z$ between $N$ and $S$, started by Filippov (1988 and Kozlova (1984 and reformulated by Sotomayor-Teixeira (1995 in terms of the regularization method. This method consists in analyzing a one parameter family of continuous vector fields $Z_{epsilon}$, defined by averaging $X$ and $Y$. This family approaches $Z$ when the parameter goes to zero. The results of Sotomayor-Teixeira and Sotomayor-Machado (2002 providing conditions on $(X,Y$ for the regularized vector fields to be structurally stable on planar compact connected regions are extended to discontinuous piecewise polynomial vector fields on $mathbb{R}^2$. Pertinent genericity results for vector fields satisfying the above stability conditions are also extended to the present case. A procedure for the study of discontinuous piecewise vector fields at infinity through a compactification is proposed here.

  6. Transversals of Complex Polynomial Vector Fields

    DEFF Research Database (Denmark)

    Dias, Kealey

    Vector fields in the complex plane are defined by assigning the vector determined by the value P(z) to each point z in the complex plane, where P is a polynomial of one complex variable. We consider special families of so-called rotated vector fields that are determined by a polynomial multiplied...... by rotational constants. Transversals are a certain class of curves for such a family of vector fields that represent the bifurcation states for this family of vector fields. More specifically, transversals are curves that coincide with a homoclinic separatrix for some rotation of the vector field. Given...... a concrete polynomial, it seems to take quite a bit of work to prove that it is generic, i.e. structurally stable. This has been done for a special class of degree d polynomial vector fields having simple equilibrium points at the d roots of unity, d odd. In proving that such vector fields are generic...

  7. Personality, threat and affective responses to cultural diversity

    NARCIS (Netherlands)

    Van der Zee, K.I.; Van Der Gang, Ineke

    The present study tried to reconcile assumptions from Terror Management Theory that individual differences in openness to diversity are enhanced by existential threat with own recent findings suggesting that individual differences are diminished by threat. A model was supported assuming that it is

  8. An Examination of Stereotype Threat Effects on Girls' Mathematics Performance

    Science.gov (United States)

    Ganley, Colleen M.; Mingle, Leigh A.; Ryan, Allison M.; Ryan, Katherine; Vasilyeva, Marina; Perry, Michelle

    2013-01-01

    Stereotype threat has been proposed as 1 potential explanation for the gender difference in standardized mathematics test performance among high-performing students. At present, it is not entirely clear how susceptibility to stereotype threat develops, as empirical evidence for stereotype threat effects across the school years is inconsistent. In…

  9. Vector optimization set-valued and variational analysis

    CERN Document Server

    Chen, Guang-ya; Yang, Xiaogi

    2005-01-01

    This book is devoted to vector or multiple criteria approaches in optimization. Topics covered include: vector optimization, vector variational inequalities, vector variational principles, vector minmax inequalities and vector equilibrium problems. In particular, problems with variable ordering relations and set-valued mappings are treated. The nonlinear scalarization method is extensively used throughout the book to deal with various vector-related problems. The results presented are original and should be interesting to researchers and graduates in applied mathematics and operations research

  10. Implicit Real Vector Automata

    Directory of Open Access Journals (Sweden)

    Jean-François Degbomont

    2010-10-01

    Full Text Available This paper addresses the symbolic representation of non-convex real polyhedra, i.e., sets of real vectors satisfying arbitrary Boolean combinations of linear constraints. We develop an original data structure for representing such sets, based on an implicit and concise encoding of a known structure, the Real Vector Automaton. The resulting formalism provides a canonical representation of polyhedra, is closed under Boolean operators, and admits an efficient decision procedure for testing the membership of a vector.

  11. Vectoring of parallel synthetic jets

    Science.gov (United States)

    Berk, Tim; Ganapathisubramani, Bharathram; Gomit, Guillaume

    2015-11-01

    A pair of parallel synthetic jets can be vectored by applying a phase difference between the two driving signals. The resulting jet can be merged or bifurcated and either vectored towards the actuator leading in phase or the actuator lagging in phase. In the present study, the influence of phase difference and Strouhal number on the vectoring behaviour is examined experimentally. Phase-locked vorticity fields, measured using Particle Image Velocimetry (PIV), are used to track vortex pairs. The physical mechanisms that explain the diversity in vectoring behaviour are observed based on the vortex trajectories. For a fixed phase difference, the vectoring behaviour is shown to be primarily influenced by pinch-off time of vortex rings generated by the synthetic jets. Beyond a certain formation number, the pinch-off timescale becomes invariant. In this region, the vectoring behaviour is determined by the distance between subsequent vortex rings. We acknowledge the financial support from the European Research Council (ERC grant agreement no. 277472).

  12. Initiation of traditional birth attendants and their traditional and spiritual practices during pregnancy and childbirth in Ghana.

    Science.gov (United States)

    Aziato, Lydia; Omenyo, Cephas N

    2018-03-07

    Prior to the advent of modern obstetric services, traditional birth attendants (TBAs) have rendered services to pregnant women and women in labour for a long time. Although it is anticipated that women in contemporary societies will give birth in hospitals and clinics, some women still patronize the services of TBAs. The study therefore sought to gain an in-depth understanding of the initiation of TBAs and their traditional and spiritual practices employed during pregnancy and childbirth in Ghana. The design was an exploratory qualitative one using in-depth individual interviews. Data saturation was reached with 16 participants who were all of Christian faith. Interviews were conducted with a semi-structured interview guide, audiotaped and transcribed verbatim. Content analysis was employed to generate findings. The findings showed that TBAs were initiated through apprenticeship from family members who were TBAs and other non-family TBAs as well as through dreams and revelations. They practice using both spiritual and physical methods and their work was founded on spiritual directions, use of spiritual artefacts, herbs and physical examination. TBAs delay cutting of the cord and disposal of the placenta was associated with beliefs which indicated that when not properly disposed, it will have negative consequences on the child during adulthood. Although, TBAs like maternal health professionals operate to improve maternal health care, some of their spiritual practices and beliefs may pose threats to their clients. Nonetheless, with appropriate initiation and training, they can become useful.

  13. Does Stereotype Threat Affect Women in Academic Medicine?

    Science.gov (United States)

    Burgess, Diana Jill; Joseph, Anne; van Ryn, Michelle; Carnes, Molly

    2012-01-01

    Multiple complex factors contribute to the slow pace of women’s advancement into leadership positions in academic medicine. In this article, the authors propose that stereotype threat--under which individuals who are members of a group characterized by negative stereotypes in a particular domain perform below their actual abilities in that domain when group membership is emphasized--may play an important role in the underrepresentation of women in leadership positions in academic medicine. Research to objectively assess the impact of stereotype threat for women in academic medicine is feasible and necessary to confirm this hypothesis. Still, a number of conditions present in the academic medicine community today have been shown to trigger stereotype threat in other settings, and stereotype threat fits with existing research on gender in academic medicine. In the meantime, academic health centers should implement relatively simple measures supported by experimental evidence from other settings to reduce the risk of stereotype threat, including: (1) introducing the concept of stereotype threat to the academic medicine community; (2) engaging all stakeholders, male and female, to promote identity safety by enacting and making faculty aware of policies to monitor potential instances of discrimination, and training faculty to provide performance feedback that is free of gender bias; (3) counteracting the effects of sex segregation at academic health centers by increasing exposure to successful female leaders; (4) reducing gender stereotype priming by avoiding stereotypically male criteria for promotion, grants, and awards; and (5) building leadership efficacy among female physicians and scientists. PMID:22361794

  14. Vectorization in quantum chemistry

    International Nuclear Information System (INIS)

    Saunders, V.R.

    1987-01-01

    It is argued that the optimal vectorization algorithm for many steps (and sub-steps) in a typical ab initio calculation of molecular electronic structure is quite strongly dependent on the target vector machine. Details such as the availability (or lack) of a given vector construct in the hardware, vector startup times and asymptotic rates must all be considered when selecting the optimal algorithm. Illustrations are drawn from: gaussian integral evaluation, fock matrix construction, 4-index transformation of molecular integrals, direct-CI methods, the matrix multiply operation. A cross comparison of practical implementations on the CDC Cyber 205, the Cray-IS and Cray-XMP machines is presented. To achieve portability while remaining optimal on a wide range of machines it is necessary to code all available algorithms in a machine independent manner, and to select the appropriate algorithm using a procedure which is based on machine dependent parameters. Most such parameters concern the timing of certain vector loop kernals, which can usually be derived from a 'bench-marking' routine executed prior to the calculation proper

  15. Cognitive and affective components of challenge and threat states.

    Science.gov (United States)

    Meijen, Carla; Jones, Marc V; McCarthy, Paul J; Sheffield, David; Allen, Mark S

    2013-01-01

    We explored the cognitive and affective components of the Theory of Challenge and Threat States in Athletes (TCTSA) using a cross-sectional design. One hundred and seventy-seven collegiate athletes indicated how they typically approached an important competition on measures of self-efficacy, perceived control, achievement goals, emotional states and interpretation of emotional states. Participants also indicated to what extent they typically perceived the important competition as a challenge and/or a threat. The results suggest that a perception of challenge was not predicted by any of the cognitive components. A perception of threat was positively predicted by avoidance goals and negatively predicted by self-efficacy and approach goals. Both challenge and threat had a positive relationship with anxiety. Practical implications of this study are that an avoidance orientation appeared to be related to potentially negative constructs such as anxiety, threat and dejection. The findings may suggest that practitioners and researchers should focus on reducing an avoidance orientation, however the results should be treated with caution in applied settings, as this study did not examine how the combination of constructs exactly influences sport performance. The results provided partial support for the TCTSA with stronger support for proposed relationships with threat rather than challenge states.

  16. Properties of vector and axial-vector mesons from a generalized Nambu-Jona-Lasinio model

    International Nuclear Information System (INIS)

    Bernard, V.; Meissner, U.G.; Massachusetts Inst. of Tech., Cambridge; Massachusetts Inst. of Tech., Cambridge

    1988-01-01

    We construct a generalized Nambu-Jona-Lasinio lagrangian including scalar, pseudoscalar, vector and axial-vector mesons. We specialize to the two-flavor case. The properties of the structured vacuum as well as meson masses and coupling constants are calculated giving an overall agreement within 20% of the experimental data. We investigate the meson properties at finite density. In contrast to the mass of the scalar σ-meson, which decreases sharply with increasing density, the vector meson masses are almost independent of density. Furthermore, the vector-meson-quark coupling constants are also stable against density changes. We point out that these results imply a softening of the nuclear equation of state at high densities. Furthermore, we discuss the breakdown of the KFSR relation on the quark level as well as other deviations from phenomenological concepts such as universality and vector meson dominance. (orig.)

  17. Vector geometry

    CERN Document Server

    Robinson, Gilbert de B

    2011-01-01

    This brief undergraduate-level text by a prominent Cambridge-educated mathematician explores the relationship between algebra and geometry. An elementary course in plane geometry is the sole requirement for Gilbert de B. Robinson's text, which is the result of several years of teaching and learning the most effective methods from discussions with students. Topics include lines and planes, determinants and linear equations, matrices, groups and linear transformations, and vectors and vector spaces. Additional subjects range from conics and quadrics to homogeneous coordinates and projective geom

  18. Examining the Effects of Stereotype Threat on Test-Taking Behaviors

    Science.gov (United States)

    Scherbaum, Charles A.; Blanshetyn, Victoria; Marshall-Wolp, Elizabeth; McCue, Elizabeth; Strauss, Ross

    2011-01-01

    This study examines the relationship between stereotype threat and individual test-taking behaviors. Previous research has examined the impact of stereotype threat on test scores, but little research has examined the impact of stereotype threat on the test-taking behaviors impacting those scores. Using a pre-post experimental design, stereotype…

  19. 'NRBC' threat: is this concept still valid?

    International Nuclear Information System (INIS)

    Lacronique, J.F.

    2006-01-01

    About 10 years ago, after the Sarin attack in Tokyo, the world discover that terrorists could use again radio-nuclear, chemical or biological agents to launch attacks, just to cause terror and disruption of western economies. This has forged the acronym 'NRBC'. In terms of likelihood, nuclear and radiological attacks could be considered among the most easy to prepare, and some possible acts are listed in this paper. A considerable amount of work has been prepared for the preparedness against radio-nuclear attacks, during the last 3 years, by World Health Organization (WHO), International Atomic Energy Agency (IAEA), the Atomic Energy Agency (AEN) as well as by the International Commission of Radio Protection (ICRP). A series of documents have been issued from international cooperation. These documents shows specificities to the R/N threat in terms of health consequences, that make this threat less prone to international cooperative efforts than biological threats. In addition, the Ministers of Health of the G7 countries have created an 'Global Health Security Initiative' (GHSI) in 2002 to anticipate crisis such as the anthrax problem, or other possible NRBC threats

  20. Threat and efficacy in Malaysia’s cancer news coverage

    Directory of Open Access Journals (Sweden)

    Collin Jerome

    2017-12-01

    Full Text Available Background: The news media plays important roles not only in creating and disseminating health messages, but also in influencing people’s perceptions of health and their health behaviours. However, much more needs to be known about the creation process, particularly how health messages are created with the goal of raising awareness and knowledge, and changing people’s attitudes and behaviours. This paper presents a study aimed at examining cancer risk messages in Malaysia’s leading newspapers. Methods: Our search identified count the total 73 articles related to cancer which were published in three leading Malaysian English dailies in 2012 – September 2017. Of these, 10 were selected for a content analysis using the Extended Parallel Process (EPPM Model. The analysis focused on the presence and the levels of two important components required for designing effective health risk message: threat (severity and susceptibility and efficacy (responses efficacy and self-efficacy. The language used in the news articles was also analysed to see whether it helped enhance the threat-efficacy levels which are crucial for increasing message acceptance and yielding behaviour change. Results: Present study shows that the varying presence of threat and efficacy in the articles as evidenced by messages that focused on threat alone with no efficacy and messages that highlighted both threat and efficacy. Results also show contrasting levels of threat and efficacy as evidenced by messages that possessed high levels of threat and efficacy and messages that revealed a high level of threat and a low level of efficacy. Furthermore, the contents were composed differently in terms of language use: some articles used neutral language while others used vivid and descriptive language in addressing the topic and target audience. These have implication on message acceptance and behaviour change where high levels of threat and efficacy, and the ways in which vivid

  1. New Uses of Traditional Healing in Contemporary Irish Literature

    Directory of Open Access Journals (Sweden)

    Patricia A. Lynch

    2013-03-01

    Full Text Available This is a comparative study in two ways.  After a summary of the historical and cultural research into traditional healing which is relevant to this article, then some comments about the general usage of such themes in contemporary Irish literature, the article moves on to examine the role and function of traditional healing as a motif in four specific literary texts.  These are: two Irish plays, Brian Friel’s Faith Healer, and Jim Nolan’s Blackwater Angel, and two pieces of Irish fiction, P.J. Curtis’ novel The Lightning Tree and Claire Keegan’s short story “The Night of the Quicken Trees”.  Strong similarities are found on many fronts between the texts, especially in the acceptance of healing and the mystery associated with it.  However, differences also occur, depending on the artistic choices of the authors, the gender and community emphasis used, and the relative importance of healing in the context of the work.  Women healers seem to be more rooted and less tragic than their male counterparts, but all healers are seen paradoxically as both an asset and a potential threat to society. When these texts are compared with research into historical and cultural aspects of Irish folk medicine, they clearly draw on tradition for their plot elements, but only in the fiction and plays can the full dramatic potential of these life and death situations be explored.

  2. Behavioral and ERP measures of attentional bias to threat in the dot-probe task: Poor reliability and lack of correlation with anxiety

    Directory of Open Access Journals (Sweden)

    Emily S. Kappenman

    2014-12-01

    Full Text Available The dot-probe task is often considered a gold standard in the field for investigating attentional bias to threat. However, serious issues with the task have been raised. Specifically, a number of studies have demonstrated that the traditional reaction time measure of attentional bias to threat in the dot-probe task has poor internal reliability and poor test-retest reliability. In addition, although threatening stimuli capture attention in other paradigms, attentional bias to threat has not usually been found in typical research participants in the dot-probe task. However, when attention is measured in the dot-probe task with the N2pc component of the event-related potential (ERP waveform, substantial attentional orienting to threat is observed, and the internal reliability is moderate. To provide a rigorous comparison of the reliability of this N2pc measure and the conventional behavioral measure, as well as to examine the relationship of these measures to anxiety, the present study examined the N2pc in conjunction with reaction time in the dot-probe task in a large sample of participants (N = 96. As in previous studies, reaction time showed no bias to threatening images across the sample and exhibited poor internal reliability. Moreover, this measure did not relate to trait anxiety. By contrast, the N2pc revealed a significant initial shift of attention to threat, and this measure was internally reliable. However, the N2pc was not correlated with trait anxiety, indicating that it does not provide a meaningful index of individual differences in anxiety in the dot-probe task. Together, these results indicate a serious need to develop new tasks and methods to more reliably investigate attentional bias to threat and its relationship to anxiety in both clinical and non-clinical populations.

  3. Electroproduction and photoproduction of vector mesons and generalized vector meson dominance

    International Nuclear Information System (INIS)

    Fraas, H.; Kuroda, M.

    1977-05-01

    Using generalized vector meson dominance, electro- and photoproduction of vector mesons is studied. The unnatural parity exchange part of ω(1.2) production is estimated to be about one fourth of that of ω-production. The off diagonal transition model suggests the suppression of diffractive rho(1.2) and ω(1.2) production. (orig.) [de

  4. Towards an Enhancement of Organizational Information Security through Threat Factor Profiling (TFP) Model

    Science.gov (United States)

    Sidi, Fatimah; Daud, Maslina; Ahmad, Sabariah; Zainuddin, Naqliyah; Anneisa Abdullah, Syafiqa; Jabar, Marzanah A.; Suriani Affendey, Lilly; Ishak, Iskandar; Sharef, Nurfadhlina Mohd; Zolkepli, Maslina; Nur Majdina Nordin, Fatin; Amat Sejani, Hashimah; Ramadzan Hairani, Saiful

    2017-09-01

    Information security has been identified by organizations as part of internal operations that need to be well implemented and protected. This is because each day the organizations face a high probability of increase of threats to their networks and services that will lead to information security issues. Thus, effective information security management is required in order to protect their information assets. Threat profiling is a method that can be used by an organization to address the security challenges. Threat profiling allows analysts to understand and organize intelligent information related to threat groups. This paper presents a comparative analysis that was conducted to study the existing threat profiling models. It was found that existing threat models were constructed based on specific objectives, thus each model is limited to only certain components or factors such as assets, threat sources, countermeasures, threat agents, threat outcomes and threat actors. It is suggested that threat profiling can be improved by the combination of components found in each existing threat profiling model/framework. The proposed model can be used by an organization in executing a proactive approach to incident management.

  5. Reduced Stress Tensor and Dissipation and the Transport of Lamb Vector

    Science.gov (United States)

    Wu, Jie-Zhi; Zhou, Ye; Wu, Jian-Ming

    1996-01-01

    We develop a methodology to ensure that the stress tensor, regardless of its number of independent components, can be reduced to an exactly equivalent one which has the same number of independent components as the surface force. It is applicable to the momentum balance if the shear viscosity is constant. A direct application of this method to the energy balance also leads to a reduction of the dissipation rate of kinetic energy. Following this procedure, significant saving in analysis and computation may be achieved. For turbulent flows, this strategy immediately implies that a given Reynolds stress model can always be replaced by a reduced one before putting it into computation. Furthermore, we show how the modeling of Reynolds stress tensor can be reduced to that of the mean turbulent Lamb vector alone, which is much simpler. As a first step of this alternative modeling development, we derive the governing equations for the Lamb vector and its square. These equations form a basis of new second-order closure schemes and, we believe, should be favorably compared to that of traditional Reynolds stress transport equation.

  6. Vector (two-dimensional) magnetic phenomena

    International Nuclear Information System (INIS)

    Enokizono, Masato

    2002-01-01

    In this paper, some interesting phenomena were described from the viewpoint of two-dimensional magnetic property, which is reworded with the vector magnetic property. It shows imperfection of conventional magnetic property and some interested phenomena were discovered, too. We found magnetic materials had the strong nonlinearity both magnitude and spatial phase due to the relationship between the magnetic field strength H-vector and the magnetic flux density B-vector. Therefore, magnetic properties should be defined as the vector relationship. Furthermore, the new Barukhausen signal was observed under rotating flux. (Author)

  7. A Probabilistic Analysis Framework for Malicious Insider Threats

    DEFF Research Database (Denmark)

    Chen, Taolue; Kammuller, Florian; Nemli, Ibrahim

    2015-01-01

    Malicious insider threats are difficult to detect and to mitigate. Many approaches for explaining behaviour exist, but there is little work to relate them to formal approaches to insider threat detection. In this work we present a general formal framework to perform analysis for malicious insider...

  8. Investigating Hypervigilance for Social Threat of Lonely Children

    Science.gov (United States)

    Qualter, Pamela; Rotenberg, Ken; Barrett, Louise; Henzi, Peter; Barlow, Alexandra; Stylianou, Maria; Harris, Rebecca A.

    2013-01-01

    The hypothesis that lonely children show hypervigilance for social threat was examined in a series of three studies that employed different methods including advanced eye-tracking technology. Hypervigilance for social threat was operationalized as hostility to ambiguously motivated social exclusion in a variation of the hostile attribution…

  9. Towards Formal Analysis of Insider Threats for Auctions

    DEFF Research Database (Denmark)

    Kammueller, Florian; Kerber, Manfred; Probst, Christian W.

    2016-01-01

    is meaningful to prove correctness and scrutinize vulnerability to security and privacy attacks. Surveying the threats in auctions and insider collusions, we present an approach to model and analyze auction protocols for insider threats using the interactive theorem prover Isabelle. As a case study, we use...

  10. Risk of exposure to potential vector mosquitoes for rural workers in Northern Lao PDR.

    Directory of Open Access Journals (Sweden)

    Julie-Anne A Tangena

    2017-07-01

    Full Text Available One major consequence of economic development in South-East Asia has been a rapid expansion of rubber plantations, in which outbreaks of dengue and malaria have occurred. Here we explored the difference in risk of exposure to potential dengue, Japanese encephalitis (JE, and malaria vectors between rubber workers and those engaged in traditional forest activities in northern Laos PDR.Adult mosquitoes were collected for nine months in secondary forests, mature and immature rubber plantations, and villages. Human behavior data were collected using rapid participatory rural appraisals and surveys. Exposure risk was assessed by combining vector and human behavior and calculating the basic reproduction number (R0 in different typologies. Compared to those that stayed in the village, the risk of dengue vector exposure was higher for those that visited the secondary forests during the day (odds ratio (OR 36.0, for those living and working in rubber plantations (OR 16.2 and for those that tapped rubber (OR 3.2. Exposure to JE vectors was also higher in the forest (OR 1.4 and, similar when working (OR 1.0 and living in the plantations (OR 0.8. Exposure to malaria vectors was greater in the forest (OR 1.3, similar when working in the plantations (OR 0.9 and lower when living in the plantations (OR 0.6. R0 for dengue was >2.8 for all habitats surveyed, except villages where R0≤0.06. The main malaria vector in all habitats was Anopheles maculatus s.l. in the rainy season and An. minimus s.l. in the dry season.The highest risk of exposure to vector mosquitoes occurred when people visit natural forests. However, since rubber workers spend long periods in the rubber plantations, their risk of exposure is increased greatly compared to those who temporarily enter natural forests or remain in the village. This study highlights the necessity of broadening mosquito control to include rubber plantations.

  11. SECURITY THREATS IN CENTRAL ASIA

    Directory of Open Access Journals (Sweden)

    Çağla Gül Yesevi

    2013-07-01

    Full Text Available This study will analyze main security threats in Central Asia. It is obvious thatsince the end of Cold War, there have been many security threats in Central Asiaas internal weakness of Central Asian states, terrorism, transnational crime,economic insecurity, environmental issues, drug trafficking, ethnic violence,regional instability. This study will propose thatwith increasing interdependence,states need each other to solve these global security problems. In that sense,regional and sub-regional cooperation between Central Asian states and with otherregional actors has been witnessed. It is clear that the withdrawal of NATO fromAfghanistan will destabilize Central Asia. This study will investigate overallsecurity situation in Central Asia and affects andcontributions of regionalorganizations to Eurasian security

  12. Solutions to the new threats to academic freedom?

    Science.gov (United States)

    Tooley, Michael

    2014-05-01

    In my commentary on Francesca Minerva's article 'New Threats to Academic Freedom', I agree with her contention that the existence of the Internet has given rise to new and very serious threats to academic freedom. I think that it is crucial that we confront those threats, and find ways to eliminate them, which I believe can be done. The threats in question involve both authors and editors. In the case of authors, I argue that the best solution is not anonymous publication, but publication using pseudonyms, and I describe how that would work. In the case of editors, my proposal is a website that a number of journals would have access to, where papers that editors judge to be clearly worthy of publication, but whose publication seems likely to set off a firestorm of public and media protest, could be published without any indication of the journal that had accepted the paper for publication. © 2014 John Wiley & Sons Ltd.

  13. Quark-gluon plasma tomography by vector mesons

    International Nuclear Information System (INIS)

    Lovas, I.; Schram, Zs.; Csernai, L.P.; Hungarian Academy of Sciences, Budapest; Nyiri, A.

    2001-01-01

    The fireball formed in a heavy ion collision is characterized by the impact parameter vector b-vector, which can be determined from the multiplicity and the angular distribution of the reaction products. By appropriate rotations the b-vector vectors of each collision can be aligned into a fixed direction. Using the measured values of the momentum distributions independent integral equations can be formulated for the unknown emission densities (E M (r-vector)) and for the unknown absorption densities (Δμ(r-vector)) of the different vector mesons. (author)

  14. Prefrontal inhibition of threat processing protects working memory from interference.

    Directory of Open Access Journals (Sweden)

    Robert James Clarke

    2013-05-01

    Full Text Available Bottom-up processes can interrupt ongoing cognitive processing in order to adaptively respond to emotional stimuli of high potential significance, such as those that threaten wellbeing. However it is vital that this interference can be modulated in certain contexts to focus on current tasks. Deficits in the ability to maintain the appropriate balance between cognitive and emotional demands can severely impact on day-to-day activities. This fMRI study examined this interaction between threat processing and cognition; 18 adult participants performed a visuospatial working memory (WM task with two load conditions, in the presence and absence of anxiety induction by threat of electric shock. Threat of shock interfered with performance in the low cognitive load condition; however interference was eradicated under high load, consistent with engagement of emotion regulation mechanisms. Under low load the amygdala showed significant activation to threat of shock that was modulated by high cognitive load. A directed top-down control contrast identified two regions associated with top-down control; ventrolateral PFC and dorsal ACC. Dynamic causal modelling provided further evidence that under high cognitive load, top-down inhibition is exerted on the amygdala and its outputs to prefrontal regions. Additionally, we hypothesised that individual differences in a separate, non-emotional top-down control task would predict the recruitment of dorsal ACC and ventrolateral PFC during top-down control of threat. Consistent with this, performance on a separate dichotic listening task predicted dorsal ACC and ventrolateral PFC activation during high WM load under threat of shock, though activation in these regions did not directly correlate with WM performance. Together, the findings suggest that under high cognitive load and threat, top-down control is exerted by dACC and vlPFC to inhibit threat processing, thus enabling WM performance without threat

  15. A Quantitative Threats Analysis for the Florida Manatee (Trichechus manatus latirostris)

    Science.gov (United States)

    Runge, Michael C.; Sanders-Reed, Carol A.; Langtimm, Catherine A.; Fonnesbeck, Christopher J.

    2007-01-01

    The Florida manatee (Trichechus manatus latirostris) is an endangered marine mammal endemic to the southeastern United States. The primary threats to manatee populations are collisions with watercraft and the potential loss of warm-water refuges. For the purposes of listing, recovery, and regulation under the Endangered Species Act (ESA), an understanding of the relative effects of the principal threats is needed. This work is a quantitative approach to threats analysis, grounded in the assumption that an appropriate measure of status under the ESA is based on the risk of extinction, as quantified by the probability of quasi-extinction. This is related to the qualitative threats analyses that are more common under the ESA, but provides an additional level of rigor, objectivity, and integration. In this approach, our philosophy is that analysis of the five threat factors described in Section 4(a)(1) of the ESA can be undertaken within an integrated quantitative framework. The basis of this threats analysis is a comparative population viability analysis. This involves forecasting the Florida manatee population under different scenarios regarding the presence of threats, while accounting for process variation (environmental, demographic, and catastrophic stochasticity) as well as parametric and structural uncertainty. We used the manatee core biological model (CBM) for this viability analysis, and considered the role of five threats: watercraft-related mortality, loss of warm-water habitat in winter, mortality in water-control structures, entanglement, and red tide. All scenarios were run with an underlying parallel structure that allowed a more powerful estimation of the effects of the various threats. The results reflect our understanding of manatee ecology (as captured in the structure of the CBM), our estimates of manatee demography (as described by the parameters in the model), and our characterization of the mechanisms by which the threats act on manatees. As an

  16. The threats

    International Nuclear Information System (INIS)

    Brunel, S.; Touchard, P.; Ferrandery, J.L.

    2005-01-01

    Second chapter of the book on the geopolitics of the sustainable development, this chapter deals with the threats of the climatic change on the earth and the humans. the authors analyze the consequences of the climatic change on the developing countries of the South and the necessity of a sustainable development implementation in the North. They inform on the resources depletion, the water problem, the nuclear activities and the public health and the french government policy facing the sustainable management of the territory. (A.L.B.)

  17. Vector superconductivity in cosmic strings

    International Nuclear Information System (INIS)

    Dvali, G.R.; Mahajan, S.M.

    1992-03-01

    We argue that in most realistic cases, the usual Witten-type bosonic superconductivity of the cosmic string is automatically (independent of the existence of superconducting currents) accompanied by the condensation of charged gauge vector bosons in the core giving rise to a new vector type superconductivity. The value of the charged vector condensate is related with the charged scalar expectation value, and vanishes only if the latter goes to zero. The mechanism for the proposed vector superconductivity, differing fundamentally from those in the literature, is delineated using the simplest realistic example of the two Higgs doublet standard model interacting with the extra cosmic string. It is shown that for a wide range of parameters, for which the string becomes scalarly superconducting, W boson condensates (the sources of vector superconductivity) are necessarily excited. (author). 14 refs

  18. Brane vector phenomenology

    International Nuclear Information System (INIS)

    Clark, T.E.; Love, S.T.; Nitta, Muneto; Veldhuis, T. ter; Xiong, C.

    2009-01-01

    Local oscillations of the brane world are manifested as massive vector fields. Their coupling to the Standard Model can be obtained using the method of nonlinear realizations of the spontaneously broken higher-dimensional space-time symmetries, and to an extent, are model independent. Phenomenological limits on these vector field parameters are obtained using LEP collider data and dark matter constraints

  19. Bio-Terrorism Threat and Casualty Prevention

    Energy Technology Data Exchange (ETDEWEB)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  20. Distribution of Brugia malayi larvae and DNA in vector and non-vector mosquitoes: implications for molecular diagnostics

    Directory of Open Access Journals (Sweden)

    Christensen Bruce M

    2009-11-01

    Full Text Available Abstract Background The purpose of this study was to extend prior studies of molecular detection of Brugia malayi DNA in vector (Aedes aegypti- Liverpool and non-vector (Culex pipiens mosquitoes at different times after ingestion of infected blood. Results Parasite DNA was detected over a two week time course in 96% of pooled thoraces of vector mosquitoes. In contrast, parasite DNA was detected in only 24% of thorax pools from non-vectors; parasite DNA was detected in 56% of midgut pools and 47% of abdomen pools from non-vectors. Parasite DNA was detected in vectors in the head immediately after the blood meal and after 14 days. Parasite DNA was also detected in feces and excreta of the vector and non-vector mosquitoes which could potentially confound results obtained with field samples. However, co-housing experiments failed to demonstrate transfer of parasite DNA from infected to non-infected mosquitoes. Parasites were also visualized in mosquito tissues by immunohistololgy using an antibody to the recombinant filarial antigen Bm14. Parasite larvae were detected consistently after mf ingestion in Ae. aegypti- Liverpool. Infectious L3s were seen in the head, thorax and abdomen of vector mosquitoes 14 days after Mf ingestion. In contrast, parasites were only detected by histology shortly after the blood meal in Cx. pipiens, and these were not labeled by the antibody. Conclusion This study provides new information on the distribution of filarial parasites and parasite DNA in vector and non-vector mosquitoes. This information should be useful for those involved in designing and interpreting molecular xenomonitoring studies.

  1. Insecticide resistance in disease vectors from Mayotte: an opportunity for integrated vector management.

    Science.gov (United States)

    Pocquet, Nicolas; Darriet, Frédéric; Zumbo, Betty; Milesi, Pascal; Thiria, Julien; Bernard, Vincent; Toty, Céline; Labbé, Pierrick; Chandre, Fabrice

    2014-07-01

    Mayotte, a small island in the Indian Ocean, has been affected for many years by vector-borne diseases. Malaria, Bancroftian filariasis, dengue, chikungunya and Rift Valley fever have circulated or still circulate on the island. They are all transmitted by Culicidae mosquitoes. To limit the impact of these diseases on human health, vector control has been implemented for more than 60 years on Mayotte. In this study, we assessed the resistance levels of four major vector species (Anopheles gambiae, Culex pipiens quinquefasciatus, Aedes aegypti and Aedes albopictus) to two types of insecticides: i) the locally currently-used insecticides (organophosphates, pyrethroids) and ii) alternative molecules that are promising for vector control and come from different insecticide families (bacterial toxins or insect growth regulators). When some resistance was found to one of these insecticides, we characterized the mechanisms involved. Larval and adult bioassays were used to evaluate the level of resistance. When resistance was found, we tested for the presence of metabolic resistance through detoxifying enzyme activity assays, or for target-site mutations through molecular identification of known resistance alleles. Resistance to currently-used insecticides varied greatly between the four vector species. While no resistance to any insecticides was found in the two Aedes species, bioassays confirmed multiple resistance in Cx. p. quinquefasciatus (temephos: ~ 20 fold and deltamethrin: only 10% mortality after 24 hours). In An. gambiae, resistance was scarce: only a moderate resistance to temephos was found (~5 fold). This resistance appears to be due only to carboxyl-esterase overexpression and not to target modification. Finally, and comfortingly, none of the four species showed resistance to any of the new insecticides. The low resistance observed in Mayotte's main disease vectors is particularly interesting, because it leaves a range of tools useable by vector control

  2. A comparison of foamy and lentiviral vector genotoxicity in SCID-repopulating cells shows foamy vectors are less prone to clonal dominance

    Directory of Open Access Journals (Sweden)

    Elizabeth M Everson

    2016-01-01

    Full Text Available Hematopoietic stem cell (HSC gene therapy using retroviral vectors has immense potential, but vector-mediated genotoxicity limits use in the clinic. Lentiviral vectors are less genotoxic than gammaretroviral vectors and have become the vector of choice in clinical trials. Foamy retroviral vectors have a promising integration profile and are less prone to read-through transcription than gammaretroviral or lentiviral vectors. Here, we directly compared the safety and efficacy of foamy vectors to lentiviral vectors in human CD34+ repopulating cells in immunodeficient mice. To increase their genotoxic potential, foamy and lentiviral vectors with identical transgene cassettes with a known genotoxic spleen focus forming virus promoter were used. Both vectors resulted in efficient marking in vivo and a total of 825 foamy and 460 lentiviral vector unique integration sites were recovered in repopulating cells 19 weeks after transplantation. Foamy vector proviruses were observed less often near RefSeq gene and proto-oncogene transcription start sites than lentiviral vectors. The foamy vector group were also more polyclonal with fewer dominant clones (two out of six mice than the lentiviral vector group (eight out of eight mice, and only lentiviral vectors had integrants near known proto-oncogenes in dominant clones. Our data further support the relative safety of foamy vectors for HSC gene therapy.

  3. Adrenocortical responses to offspring-directed threats in two open-nesting birds.

    Science.gov (United States)

    Butler, Luke K; Bisson, Isabelle-Anne; Hayden, Timothy J; Wikelski, Martin; Romero, L Michael

    2009-07-01

    Dependent young are often easy targets for predators, so for many parent vertebrates, responding to offspring-directed threats is a fundamental part of reproduction. We tested the parental adrenocortical response of the endangered black-capped vireo (Vireo atricapilla) and the common white-eyed vireo (V. griseus) to acute and chronic threats to their offspring. Like many open-nesting birds, our study species experience high offspring mortality. Parents responded behaviorally to a predator decoy or human 1-2m from their nests, but, in contrast to similar studies of cavity-nesting birds, neither these acute threats nor chronic offspring-directed threats altered plasma corticosterone concentrations of parents. Although parents in this study showed no corticosterone response to offspring-directed threats, they always increased corticosterone concentrations in response to capture. To explain these results, we propose that parents perceive their risk of nest-associated death differently depending on nest type, with cavity-nesting adults perceiving greater risk to themselves than open-nesters that can readily detect and escape from offspring-directed threats. Our results agree with previous studies suggesting that the hypothalamic-pituitary-adrenal axis, a major physiological mechanism for coping with threats to survival, probably plays no role in coping with threats to offspring when risks to parents and offspring are not correlated. We extend that paradigm by demonstrating that nest style may influence how adults perceive the correlation between offspring-directed and self-directed threats.

  4. Advanced insider threat mitigation workshop instructional materials

    Energy Technology Data Exchange (ETDEWEB)

    Gibbs, Philip [Brookhaven National Lab. (BNL), Upton, NY (United States); Larsen, Robert [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); O Brien, Mike [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Edmunds, Tom [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2008-11-01

    Insiders represent a formidable threat to nuclear facilities. This set of workshop materials covers methodologies to analyze and approaches to mitigate the threat of an insider attempting abrupt and protracted theft of nuclear materials. This particular set of materials is a n update of a January 2008 version to add increased emphasis on Material Control and Accounting and its role with respect to protracted insider nuclear material theft scenarios.

  5. A Model for Situation and Threat Assessment

    Science.gov (United States)

    2006-12-01

    CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD 20855 UNITED STATES steinberg@cubrc.org A model is presented for situation and threat assessment...PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Subject Matter Expert (SME) Calspan-UB Research Center ( CUBRC , Inc.) 8151 Needwood #T103 Derwood, MD...1 A Model for Situation and Threat Assessment Alan Steinberg CUBRC , Inc. steinberg@cubrc.org November, 2005 2 Objectives • Advance the state-of

  6. The space between us: stereotype threat and distance in interracial contexts.

    Science.gov (United States)

    Goff, Phillip Atiba; Steele, Claude M; Davies, Paul G

    2008-01-01

    Four studies investigate the role that stereotype threat plays in producing racial distancing behavior in an anticipated conversation paradigm. It was hypothesized that the threat of appearing racist may have the ironic effect of causing Whites to distance themselves from Black conversation partners. In Study 1, participants distanced themselves more from Black partners under conditions of threat, and this distance correlated with the activation of a "White racist" stereotype. In Study 2, it was demonstrated that Whites' interracial distancing behavior was not predicted by explicit or implicit prejudice. Study 3 provides evidence that conceiving of interracial interactions as opportunities to learn may attenuate the negative consequences of threat for Whites. Study 4 found that Whites have conscious access to their experience of stereotype threat and that this awareness may mediate the relationship between threat and distance. These results are discussed within a broader discourse of racial distancing and the possibility that certain identity threats may be as important as prejudice in determining the outcomes of interracial interactions. Copyright 2008 APA, all rights reserved.

  7. Improving Insider Threat Training Awareness and Mitigation Programs at Nuclear Facilities.

    Energy Technology Data Exchange (ETDEWEB)

    Abbott, Shannon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-06-01

    In recent years, insider threat programs have become an important aspect of nuclear security, and nuclear security training courses. However, many nuclear security insider threat programs fail to address the insider threat attack and monitoring potential that exists on information technology (IT) systems. This failure is critical because of the importance of information technology and networks in today’s world. IT systems offer an opportunity to perpetrate dangerous insider attacks, but they also present an opportunity to monitor for them and prevent them. This paper suggests a number of best practices for monitoring and preventing insider attacks on IT systems, and proposes the development of a new IT insider threat tabletop that can be used to help train nuclear security practitioners on how best to implement IT insider threat prevention best practices. The development of IT insider threat best practices and a practical tabletop exercise will allow nuclear security practitioners to improve nuclear security trainings as it integrates a critical part of insider threat prevention into the broader nuclear security system.

  8. Introduction to Administrative Programs that Mitigate the Insider Threat

    Energy Technology Data Exchange (ETDEWEB)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  9. Interaction of threat and verbal working memory in adolescents.

    Science.gov (United States)

    Patel, Nilam; Vytal, Katherine; Pavletic, Nevia; Stoodley, Catherine; Pine, Daniel S; Grillon, Christian; Ernst, Monique

    2016-04-01

    Threat induces a state of sustained anxiety that can disrupt cognitive processing, and, reciprocally, cognitive processing can modulate an anxiety response to threat. These effects depend on the level of cognitive engagement, which itself varies as a function of task difficulty. In adults, we recently showed that induced anxiety impaired working memory accuracy at low and medium but not high load. Conversely, increasing the task load reduced the physiological correlates of anxiety (anxiety-potentiated startle). The present work examines such threat-cognition interactions as a function of age. We expected threat to more strongly impact working memory in younger individuals by virtue of putatively restricted cognitive resources and weaker emotion regulation. This was tested by examining the influence of age on the interaction of anxiety and working memory in 25 adolescents (10 to 17 years) and 25 adults (22 to 46 years). Working memory load was manipulated using a verbal n-back task. Anxiety was induced using the threat of an aversive loud scream and measured via eyeblink startle. Findings revealed that, in both age groups, accuracy was lower during threat than safe conditions at low and medium but not high load, and reaction times were faster during threat than safe conditions at high load but did not differ at other loads. Additionally, anxiety-potentiated startle was greater during low and medium than high load. Thus, the interactions of anxiety with working memory appear similar in adolescents and adults. Whether these similarities reflect common neural mechanisms would need to be assessed using functional neuroimaging. Published 2015. This article is a U.S. Government work and is in the public domain in the USA.

  10. Vector mesons on the light front

    International Nuclear Information System (INIS)

    Naito, K.; Maedan, S.; Itakura, K.

    2004-01-01

    We apply the light-front quantization to the Nambu-Jona-Lasinio model with the vector interaction, and compute vector meson's mass and light-cone wavefunction in the large N limit. Following the same procedure as in the previous analyses for scalar and pseudo-scalar mesons, we derive the bound-state equations of a qq-bar system in the vector channel. We include the lowest order effects of the vector interaction. The resulting transverse and longitudinal components of the bound-state equation look different from each other. But eventually after imposing an appropriate cutoff, one finds these two are identical, giving the same mass and the same (spin-independent) light-cone wavefunction. Mass of the vector meson decreases as one increases the strength of the vector interaction

  11. Tomorrow's vector vaccines for small ruminants.

    Science.gov (United States)

    Kyriakis, C S

    2015-12-14

    Inactivated and attenuated vaccines have contributed to the control or even the eradication of significant animal pathogens. However, these traditional vaccine technologies have limitations and disadvantages. Inactivated vaccines lack efficacy against certain pathogens, while attenuated vaccines are not always as safe. New technology vaccines, namely DNA and recombinant viral vector vaccines, are being developed and tested against pathogens of small ruminants. These vaccines induce both humoral and cellular immune responses, are safe to manufacture and use and can be utilized in strategies for differentiation of infected from vaccinated animals. Although there are more strict regulatory requirements for the safety standards of these vaccines, once a vaccine platform is evaluated and established, effective vaccines can be rapidly produced and deployed in the field to prevent spread of emerging pathogens. The present article offers an introduction to these next generation technologies and examples of vaccines that have been tested against important diseases of sheep and goats. Copyright © 2015 Elsevier B.V. All rights reserved.

  12. Age differences in the underlying mechanisms of stereotype threat effects.

    Science.gov (United States)

    Popham, Lauren E; Hess, Thomas M

    2015-03-01

    The goals of the present study were to (a) examine whether age differences exist in the mechanisms underlying stereotype threat effects on cognitive performance and (b) examine whether emotion regulation abilities may buffer against threat effects on performance. Older and younger adults were exposed to positive or negative age-relevant stereotypes, allowing us to examine the impact of threat on regulatory focus and working memory. Self-reported emotion regulation measures were completed prior to the session. Older adults' performance under threat suggested a prevention-focused approach to the task, indexed by increased accuracy and reduced speed. The same pattern was observed in younger adults, but the effects were not as strong. Age differences emerged when examining the availability of working memory resources under threat, with young adults showing decrements, whereas older adults did not. Emotion regulation abilities moderated threat effects in young adults but not in older adults. The results provide support for the notion that stereotype threat may lead to underperformance through somewhat different pathways in older and younger adults. Future research should further examine whether the underlying reason for this age difference is rooted in age-related improvements in emotion regulation. © The Author 2013. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  13. A Category Based Threat Evaluation Model Using Platform Kinematics Data

    Directory of Open Access Journals (Sweden)

    Mustafa Çöçelli

    2017-08-01

    Full Text Available Command and control (C2 systems direct operators to make accurate decisions in the stressful atmosphere of the battlefield at the earliest. There are powerful tools that fuse various instant piece of information and brings summary of those in front of operators. Threat evaluation is one of the important fusion method that provides these assistance to military people. However, C2 systems could be deprived of valuable data source due to the absence of capable equipment. This situation has a bad unfavorable influence on the quality of tactical picture in front of C2 operators. In this paper, we study on the threat evaluation model that take into account these deficiencies. Our method extracts threat level of various targets mostly from their kinematics in two dimensional space. In the meantime, classification of entities around battlefield is unavailable. Only, category of targets are determined as a result of sensors process, which is the information of whether entities belong to air or surface environment. Hereby, threat evaluation model is consist of three fundamental steps that runs on entities belongs to different environment separately: the extraction of threat assessment cues, threat selection based on Bayesian Inference and the calculation of threat assessment rating. We have evaluated performance of proposed model by simulating a set of synthetic scenarios.

  14. OBSERVATIONS (NEW AND OLD ON THE ARMED FORCES IN THE THE ATLANTIC WORLD: CURRENT AND FUTURE THREATS AND CHALLENGES IN HISTORICAL PERSPECTIVE

    Directory of Open Access Journals (Sweden)

    FREDERICK M. NUNN

    2017-12-01

    Full Text Available Confrontations with threats and challenges to the existence of governments and societies have marked the flow of time throughout history. Present and future threats associated, as they are, with historical and traditional challenge are, in many places, of such complexity that they already require new forms of relations between civilian authorities and the leadership of professional institutions dedicated to defense and security. These new relations will have to be based on an understanding of the processes of democratization and globalization as much as on the complex nature of conflicts that affect the security, sovereignty and stability of 21st century nation-states. As formidable as they appear, these threats and challenges may be considered current reiterations of others that mark our histories. In the Atlantic World, nowhere more so than in Latin America, the literature of the military profession has always demonstrated the recognition of lessons of the past applied to problems of the presentation aid in preparation for the future. A principal reason for this is that said literature is in and of itself the product of civil-military collaborations.

  15. NATIONAL SECURITY IMPLICATIONS OF CYBER THREATS

    Directory of Open Access Journals (Sweden)

    ALEJANDRO AMIGO TOSSI

    2017-09-01

    Full Text Available Cyber threat is one of the main risks for security in developing countries, as well in States on the development path, such as ours. This phenomena is a challenge to national security, that needs the adoption of a paramount approach in its analysis, that have to consider all the aspects that had transformed the actors and malevolent actions in this environment in one of the most important challenges to the security of governmental as well as private organizations all over the world. States, hackers, cyber activists, and cyber criminals have been main actors in several situations that had shaped a new dimension for international and national security. The purpose of this article is to propose topics that could be included in the national assessment of cyber threats to the Chilean national security, based upon several conceptual definitions, cyber attacks already executed to state and military organization’s in Chile, and lastly, considerations over cyber threats included in the National Security Strategies of some western powers.

  16. Cyber threat impact assessment and analysis for space vehicle architectures

    Science.gov (United States)

    McGraw, Robert M.; Fowler, Mark J.; Umphress, David; MacDonald, Richard A.

    2014-06-01

    This paper covers research into an assessment of potential impacts and techniques to detect and mitigate cyber attacks that affect the networks and control systems of space vehicles. Such systems, if subverted by malicious insiders, external hackers and/or supply chain threats, can be controlled in a manner to cause physical damage to the space platforms. Similar attacks on Earth-borne cyber physical systems include the Shamoon, Duqu, Flame and Stuxnet exploits. These have been used to bring down foreign power generation and refining systems. This paper discusses the potential impacts of similar cyber attacks on space-based platforms through the use of simulation models, including custom models developed in Python using SimPy and commercial SATCOM analysis tools, as an example STK/SOLIS. The paper discusses the architecture and fidelity of the simulation model that has been developed for performing the impact assessment. The paper walks through the application of an attack vector at the subsystem level and how it affects the control and orientation of the space vehicle. SimPy is used to model and extract raw impact data at the bus level, while STK/SOLIS is used to extract raw impact data at the subsystem level and to visually display the effect on the physical plant of the space vehicle.

  17. Support Vector Regression-Based Adaptive Divided Difference Filter for Nonlinear State Estimation Problems

    Directory of Open Access Journals (Sweden)

    Hongjian Wang

    2014-01-01

    Full Text Available We present a support vector regression-based adaptive divided difference filter (SVRADDF algorithm for improving the low state estimation accuracy of nonlinear systems, which are typically affected by large initial estimation errors and imprecise prior knowledge of process and measurement noises. The derivative-free SVRADDF algorithm is significantly simpler to compute than other methods and is implemented using only functional evaluations. The SVRADDF algorithm involves the use of the theoretical and actual covariance of the innovation sequence. Support vector regression (SVR is employed to generate the adaptive factor to tune the noise covariance at each sampling instant when the measurement update step executes, which improves the algorithm’s robustness. The performance of the proposed algorithm is evaluated by estimating states for (i an underwater nonmaneuvering target bearing-only tracking system and (ii maneuvering target bearing-only tracking in an air-traffic control system. The simulation results show that the proposed SVRADDF algorithm exhibits better performance when compared with a traditional DDF algorithm.

  18. Does the delta quench Gamow-Teller strength in (p,n)- and (p vector,p vector')-reactions

    International Nuclear Information System (INIS)

    Osterfeld, F.; Schulte, A.; Udagawa, T.; Yabe, M.

    1986-01-01

    Microscopic analyses of complete forward angle intermediate energy (p,n)-, ( 3 He,t)- and (p vector,p vector')-spin-flip spectra are presented for the reactions 90 Zr(p,n), 90 Zr( 3 He,t) and 90 Zr(p vector,p vector'). It is shown that the whole spectra up to high excitation energies (E X ∝50 MeV) are the result of correlated one-particle-one-hole (1p1h) spin-isospin transitions only. The spectra reflect, therefore, the linear spin-isospin response of the target nucleus to the probing external hadronic fields. Our results suggest that the measured (p,n)-, ( 3 He,t)- and (p vector,p vector')-cross sections are compatible with the transition strength predictions as obtained from random phase approximation (RPA) calculations. This means that the Δ isobar quenching mechanism is likely to be rather small. (orig.)

  19. 2D Vector Field Simplification Based on Robustness

    KAUST Repository

    Skraba, Primoz

    2014-03-01

    Vector field simplification aims to reduce the complexity of the flow by removing features in order of their relevance and importance, to reveal prominent behavior and obtain a compact representation for interpretation. Most existing simplification techniques based on the topological skeleton successively remove pairs of critical points connected by separatrices, using distance or area-based relevance measures. These methods rely on the stable extraction of the topological skeleton, which can be difficult due to instability in numerical integration, especially when processing highly rotational flows. These geometric metrics do not consider the flow magnitude, an important physical property of the flow. In this paper, we propose a novel simplification scheme derived from the recently introduced topological notion of robustness, which provides a complementary view on flow structure compared to the traditional topological-skeleton-based approaches. Robustness enables the pruning of sets of critical points according to a quantitative measure of their stability, that is, the minimum amount of vector field perturbation required to remove them. This leads to a hierarchical simplification scheme that encodes flow magnitude in its perturbation metric. Our novel simplification algorithm is based on degree theory, has fewer boundary restrictions, and so can handle more general cases. Finally, we provide an implementation under the piecewise-linear setting and apply it to both synthetic and real-world datasets. © 2014 IEEE.

  20. The threat of proliferation

    International Nuclear Information System (INIS)

    Palme, Olof.

    1986-01-01

    The paper on the threat of proliferation, is a keynote speech delivered to the Colloquium on Nuclear War, Nuclear Proliferation and their Consequences, Geneva, 1985. Topics discussed in the address include: nuclear weapons, nuclear war, terrorists, Non-Proliferation Treaty, nuclear disarmament, and leadership in world affairs. (UK)